mirror of
https://github.com/opsxcq/mirror-textfiles.com.git
synced 2025-08-08 23:27:28 +02:00
update
This commit is contained in:
351
textfiles.com/phreak/TRASHING/trash1.rdt
Normal file
351
textfiles.com/phreak/TRASHING/trash1.rdt
Normal file
@@ -0,0 +1,351 @@
|
|||||||
|
|
||||||
|
|
||||||
|
*** Dumpster Insights ***
|
||||||
|
|
||||||
|
Report #1 (NET/NYNEX)
|
||||||
|
|
||||||
|
|
||||||
|
by: ..oooOO Count Zero OOooo..
|
||||||
|
|
||||||
|
&
|
||||||
|
|
||||||
|
Brian Oblivion
|
||||||
|
|
||||||
|
|
||||||
|
: -=Restricted -=Data -=Transmissions :
|
||||||
|
: :
|
||||||
|
: "Truth is cheap, but information costs." :
|
||||||
|
|
||||||
|
(And *some* information you must DIG for...literally..)
|
||||||
|
|
||||||
|
Welcome to issue #1 of _Dumpster Insights_, the magazine that prints TRASH.
|
||||||
|
Yes, we at -=RDT have been 'dumpster diving' lately, and have found some
|
||||||
|
interesting tidbits of information. We intend to share some of these
|
||||||
|
findings in this issue and subsequent releases of _Dumpster Insights_. Of
|
||||||
|
course, the contents of each issue of _Dumpster Insights_ will vary according
|
||||||
|
to the contents of the DUMPSTERS! We can only print what we dig up.
|
||||||
|
|
||||||
|
Dumpster Diving is a thrill. Phrack #36 left out *one* important item in
|
||||||
|
the "REAL Cyberpunks" article:
|
||||||
|
|
||||||
|
REAL Cyberpunks aren't afraid to get their hands dirty.
|
||||||
|
|
||||||
|
Nuff said...here we go.
|
||||||
|
|
||||||
|
*** FAX Trash ***
|
||||||
|
|
||||||
|
Lots of faxes get tossed in NYNEX dumpsters. Currently, employee moral is
|
||||||
|
very low, with all the recent layoffs and employee/supervisor/union strife.
|
||||||
|
Around Christmas, we were delighted to find a number of faxes that illustrate
|
||||||
|
this nicely...
|
||||||
|
|
||||||
|
FAX transmission: Dec '91------------------------------------------------------
|
||||||
|
|
||||||
|
'TWAS A MONTH BEFORE CHRISTMAS
|
||||||
|
|
||||||
|
'Twas a month before Christmas and most managers agreed
|
||||||
|
What for Christmas this year we might get F M P'd!
|
||||||
|
The FMP forms were all carefully prepared,
|
||||||
|
In the hopes that, when time comes, our jobs would be spared.
|
||||||
|
There was Ranking and Rating and everyone was banded,
|
||||||
|
To make sure it was fair and not underhanded.
|
||||||
|
|
||||||
|
When one day in the office there arose such a clatter,
|
||||||
|
I sprang from my desk to se what was the matter.
|
||||||
|
A green letter was spreading unfortunate news,
|
||||||
|
Giving contract details and company views.
|
||||||
|
The new contract was settled a year in advance,
|
||||||
|
With full medical benefits - a real kick in the pants.
|
||||||
|
|
||||||
|
And they extented that sucker to nineteen ninety-five,
|
||||||
|
Which sent hopes for the future into a nosedive.
|
||||||
|
The atmosphere now was as cold as the snow,
|
||||||
|
And forget the morale - I've never seen it so low.
|
||||||
|
So we wait, and we work, but we're sad and angry,
|
||||||
|
That this "Family" company could treat us so badly.
|
||||||
|
|
||||||
|
When the president said, in a televised speech,
|
||||||
|
To reduce through attrition was a goad within reach.
|
||||||
|
But if layoffs become real, he said not to sob,
|
||||||
|
'Cause he'd set up a board that could get you a job.
|
||||||
|
Now he spoke with a tongue that was lively and quick,
|
||||||
|
And you knew in a moment that this man was a prick.
|
||||||
|
|
||||||
|
That feeling you had in your gut since the strike,
|
||||||
|
Like the Dutch boy whose finger was stuck in a dike,
|
||||||
|
Now became real as the whole "dam" thing falls,
|
||||||
|
And you realize the company has you by the balls.
|
||||||
|
Yeah, they talk about Quality and how it should work,
|
||||||
|
But they must think we're stupid - they take us for jerks.
|
||||||
|
|
||||||
|
For when push comes to shove, it's the union who's boss,
|
||||||
|
And they have the last to say, while we stand at a loss.
|
||||||
|
And I heard him exclaim as he turned off his mike,
|
||||||
|
Screw the management force, give union what they like.
|
||||||
|
|
||||||
|
-------------------------------------------------------------------------------
|
||||||
|
FAX transmission: Dec '91------------------------------------------------------
|
||||||
|
|
||||||
|
THE NYNEX TWELVE DAYS OF CHRISTMAS
|
||||||
|
|
||||||
|
ON THE TWELFTH DAY OF CHRISTMAS, NYNEX GAVE TO ME....
|
||||||
|
twelve buyout rumors
|
||||||
|
eleven nervous breakdowns
|
||||||
|
ten axes falling
|
||||||
|
nine lawsuits pending
|
||||||
|
eight RMC's closing
|
||||||
|
seven hundred layoffs
|
||||||
|
six officers indicted
|
||||||
|
five plus five
|
||||||
|
four force adjustments
|
||||||
|
three regions combining
|
||||||
|
two reorganizations and
|
||||||
|
** a head count that didn't include me! **
|
||||||
|
|
||||||
|
-------------------------------------------------------------------------------
|
||||||
|
FAX transmission: Jan '92------------------------------------------------------
|
||||||
|
|
||||||
|
New England Telephone EMPLOYEE SALE!!
|
||||||
|
|
||||||
|
SAVE up to 46%
|
||||||
|
|
||||||
|
That's right friends....you heard it here first.
|
||||||
|
We can't lay 'em off anymore, so we're SELLING 'em!
|
||||||
|
|
||||||
|
ALL OF THEM!
|
||||||
|
|
||||||
|
We have to downsize our new one-employee-per-business unit goal,
|
||||||
|
and you can help us do it.
|
||||||
|
|
||||||
|
YOU SAY YOU WANT NEW?...We've got 'em..employees with low mileage, high
|
||||||
|
performance, and a lot of good years left.
|
||||||
|
|
||||||
|
YOU SAY YOU WANT OLD RELIABLE?...We've got them, too. Their paint's a
|
||||||
|
little gray and they grumble a lot, but they've seen it all and keep
|
||||||
|
on working.
|
||||||
|
|
||||||
|
We've been thinking of the layoff business for months, and losing ALL that
|
||||||
|
severence pay will take it's TOLL. Now help us make a little money on the
|
||||||
|
deal!
|
||||||
|
|
||||||
|
So...come one, come all to the FIRST ANNUAL NEW ENGLAND TELEPHONE
|
||||||
|
EMPLOYEE SALE.
|
||||||
|
|
||||||
|
Don't miss a bargain!
|
||||||
|
|
||||||
|
SPECIAL - Buy TWO and get a FREE TOUCH TONE PHONE.
|
||||||
|
|
||||||
|
-------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
Yes, those were GENUINE faxes...funny stuff, but it really gets across the
|
||||||
|
current state of employee morale..."We're the one for you New England,
|
||||||
|
New England Telephone...part of the NYNEX Family"...swell.
|
||||||
|
|
||||||
|
Here's a little blurb culled from a NYNEX Signature Graphics Standards manual:
|
||||||
|
|
||||||
|
"This manual describes the proper use of NYNEX signatures - the
|
||||||
|
building blocks of our corporate identity. It is designed to
|
||||||
|
assist both employees and suppliers alike who are responsible for
|
||||||
|
implementing our corporate identity in all of its visual manifestations.
|
||||||
|
As NYNEX people dedicated to projecting a positive image of NYNEX,
|
||||||
|
to both the public and our fellow employees, it is essential that we
|
||||||
|
apply these standards in a consistent and proper manner.
|
||||||
|
|
||||||
|
The NYNEX corporate signature, consisting of *only* the name NYNEX,
|
||||||
|
is the keystone of our identification system. When shown in its
|
||||||
|
specially designed letterforms, it becomes more than just letters or
|
||||||
|
a name. It is a symbol with nuances built into it which allude to
|
||||||
|
the origins of our information company. *NY* represents New York,
|
||||||
|
*NE* signifies New England, and *X* stands for the excellence of our
|
||||||
|
people, our products and services, and our future. These components
|
||||||
|
joined together with lines extending from the E throught the X form a
|
||||||
|
unique signature which EVOKES THOUGHTS OF HIGH TECHNOLOGY, LINES OF
|
||||||
|
COMMUNICATION AND A SENSE OF UNITY, ORDER, AND STABILITY."
|
||||||
|
|
||||||
|
Ahhh...inspiring...words to build an Empire...
|
||||||
|
|
||||||
|
Here's a list of Public Service Center telephone numbers..these are
|
||||||
|
for New England Telephone/NYNEX in Massachusetts...
|
||||||
|
|
||||||
|
PUBLIC SERVICE CENTER
|
||||||
|
TELEPHONE REFERENCE LIST
|
||||||
|
|
||||||
|
PUBLIC SERVICE CENTER---------------------------------
|
||||||
|
Semi-Public
|
||||||
|
Customer # 1-555-1717
|
||||||
|
Manager 617-965-9030
|
||||||
|
Intra/Expediting 617-965-9018
|
||||||
|
Fax # 617-964-7012
|
||||||
|
|
||||||
|
Public
|
||||||
|
Customer # 800-446-7691
|
||||||
|
Manager 617-965-9035
|
||||||
|
Intra
|
||||||
|
617/508 617-965-9040
|
||||||
|
All others 800-446-7691
|
||||||
|
PTACS 800-446-7691
|
||||||
|
SOA's 617-965-9014
|
||||||
|
Service Order Room 617-969-9726
|
||||||
|
Fax # 617-969-9726
|
||||||
|
|
||||||
|
COCOT Service Center
|
||||||
|
Customer # 800-621-0033
|
||||||
|
Manager 617-965-7468
|
||||||
|
Intra # 800-621-0033
|
||||||
|
Fax # 617-969-9249
|
||||||
|
|
||||||
|
Centralized Repair Bureau (CRSAB)
|
||||||
|
Business 1-555-1515
|
||||||
|
Coin 1-555-1611
|
||||||
|
Residence 1-555-1611
|
||||||
|
|
||||||
|
Customer Names & Addresses (CNA)
|
||||||
|
617-787-2750
|
||||||
|
|
||||||
|
Customer Response Center (CRC)
|
||||||
|
800-555-5000
|
||||||
|
|
||||||
|
Data Base Update Group (DBUG)
|
||||||
|
508-762-1648
|
||||||
|
|
||||||
|
Directory Assist Data Base
|
||||||
|
617-367-9952
|
||||||
|
|
||||||
|
Legal Department
|
||||||
|
Accident/Claims 617-743-2763
|
||||||
|
Claims Information 617-743-2670
|
||||||
|
All Other Inquiries 617-743-7773
|
||||||
|
Final Bills/Bankruptcy 617-743-6773
|
||||||
|
|
||||||
|
|
||||||
|
Ever want to call a NYNEX/NET garage?
|
||||||
|
|
||||||
|
Garage Telephone Number
|
||||||
|
------ ----------------
|
||||||
|
Milton 802-863-8440
|
||||||
|
Methuen 508-683-1942
|
||||||
|
Conway 603-447-2754
|
||||||
|
South Kingstown 401-789-1088
|
||||||
|
Portland 207-774-4565
|
||||||
|
Medford-West 617-391-9928
|
||||||
|
Framingham 508-879-0775
|
||||||
|
Springfield 413-734-9983
|
||||||
|
Medford-East 617-391-9945
|
||||||
|
Boston 617-451-8295
|
||||||
|
Dedham 617-326-9901
|
||||||
|
E Providence 401-438-9391
|
||||||
|
Brockton 508-587-9912
|
||||||
|
Shrewsbury 508-842-1818
|
||||||
|
Manchester 603-645-2062
|
||||||
|
Bangor 207-945-9996
|
||||||
|
Weymouth 617-337-9969
|
||||||
|
Northampton 413-586-1943
|
||||||
|
Hyannis 508-775-0902
|
||||||
|
|
||||||
|
|
||||||
|
Other interesting trash-prizes include issues of "Inside Operations,"
|
||||||
|
a monthly newsletter for NET Operations employees. Here are excerpts from
|
||||||
|
December '91 and January '92:
|
||||||
|
|
||||||
|
Operations Forum
|
||||||
|
(To provide a forum for employee thoughts and ideas...)
|
||||||
|
|
||||||
|
"If you could change one thing about your job, what would it be?"
|
||||||
|
|
||||||
|
Employee response: "I would implement a better system to fix NET's
|
||||||
|
circuit troubles. I've been told that unless our
|
||||||
|
own internal troubles are escalated, some trouble
|
||||||
|
tickets don't even get looked at. SCC circuits, for
|
||||||
|
example, impact our daily operation because they're
|
||||||
|
the CO's only link to the SCC for 24-hour alarm
|
||||||
|
service. Priority circuits should be identified
|
||||||
|
and noted in CIMAP/TIRKS."
|
||||||
|
|
||||||
|
|
||||||
|
** Dial Tone Left at Home **
|
||||||
|
|
||||||
|
Installation and network employees in the Pawtucket/Providence, RI
|
||||||
|
area are involved in a six-month trial of the Left In Dial Tone (LIDT)
|
||||||
|
process. The trial, which began last November in Pawtucket and Buffalo, NY,
|
||||||
|
will evaluate the impacts of the LIDT process on more than 20 provisioning
|
||||||
|
systems.
|
||||||
|
LIDT is a key component of RediServ, a major corporate business plan
|
||||||
|
initiative to provide dial tone to a customer's location quickly, cost
|
||||||
|
effectively, and with minimal manual intervention.
|
||||||
|
LIDT leaves a restriced dial tone on a subscriber's line when service
|
||||||
|
is disconnected. When new occupants move into the LIDT location, they have
|
||||||
|
access to Emergency Services (911/E911) and their Residence Service Center.
|
||||||
|
All other callls from the restriced dial tone, including "0" operator calls,
|
||||||
|
are intercepted by a recording advising the customer of the dialing
|
||||||
|
capabilities of the line.
|
||||||
|
Since the process begins with a customer's disconnect order, Pawtucket
|
||||||
|
was selected for the trial because of its high customer turnover. About
|
||||||
|
700 lines in the area are now working with restricted dial tone.
|
||||||
|
Mechanized Loop Assignment Center (MLAC) line assigners have matched
|
||||||
|
customer addresses between databases, and verified that cables and pairs
|
||||||
|
are wired from the CO to these locations. In addition, they manually assign
|
||||||
|
any LIDT orders that do not flow directly through the provisioning system.
|
||||||
|
In the Recent Change Memory Administration Center (RCMAC) [Oh GOD..please..
|
||||||
|
...make these acronyms from HELL go AWAY!... -c0] most translations on
|
||||||
|
LIDT orders are automatically completed.
|
||||||
|
For CO technicians the trial has meant more dedicated wiring on the
|
||||||
|
frame, but less rewire work on subsequent installations. And for splice
|
||||||
|
service technicians (SST) LIDT should mean fewer dispatches on installation
|
||||||
|
orders. However, as with any pilot program, problems occur.
|
||||||
|
Early in the trial SSTs were dispatched unnecessarily for installations
|
||||||
|
at restricted dial tone locations. A vendor-supported system had caused a
|
||||||
|
local coding problem for clerks in the posting of completions on LIDT orders.
|
||||||
|
The problem has since been corrected, and according to Manager Linda
|
||||||
|
Briggs, the "No Premise Visit" (NPV) rate in Pawtucket should drastically
|
||||||
|
improve to meet or exceed the 99.3 percent NPV rate in Buffalo, NY.
|
||||||
|
"Once the LIDT process is fully deployed, installation work for
|
||||||
|
technicians will become the exception rather than the rule. As a result,
|
||||||
|
technicians can spend more time on maintenance and outside plant
|
||||||
|
rehabilitation which will increase service reliability and decrease NET's
|
||||||
|
cost per access line," says Briggs.
|
||||||
|
Another issue involving unnecessary police dispatch to LIDT locations
|
||||||
|
briefly occurred. Rhode Island's Public Service Administration Board
|
||||||
|
mistakenly understood that 911 operators would be able to call back an LIDT
|
||||||
|
location if the customer hung up. To correct the situation new LIDT messages
|
||||||
|
were recorded, expedited through legal channels, and implemented in Pawtucket
|
||||||
|
on January 17.
|
||||||
|
"Access to emergency services has been a lifesaver for some Pawtucket
|
||||||
|
customers who dialed 911 from an LIDT location in a tru emergency and had
|
||||||
|
the appropriate authorities respond immediately," says Frank Lanza, staff
|
||||||
|
manager.
|
||||||
|
Yet another benefit for customers in the LIDT process is service
|
||||||
|
reliability. Throughout the night all central office lines, including the
|
||||||
|
LIDT lines, are scanned and tested by a computer [Hrmmmm...mebbe *monitored*
|
||||||
|
too?...hrmmm... -c0]. As a result, troubles are repaired by the maintenance
|
||||||
|
center often before customers are even aware that a problem existed.
|
||||||
|
"For customers Left In Dial Tone will make NET easy to do business
|
||||||
|
with and will positively position the company in the competitive marketplace,"
|
||||||
|
says Briggs.
|
||||||
|
|
||||||
|
|
||||||
|
** Of Note... **
|
||||||
|
|
||||||
|
More than 2.4 million (49.8 percent) of NET's residence and simple
|
||||||
|
business customer records have been verified using the NYNEX Data Validation
|
||||||
|
System (NDVS). The system compares critical information from five key
|
||||||
|
databases - CRIS, COSMOS, LFACS, LMOS, and PREMIS - and reports discrepancies
|
||||||
|
for follow up by Mechanized Loop Assignment Centers (MLACs), central offices,
|
||||||
|
and other work groups.
|
||||||
|
In association with RediServ, a major company initiative to allow
|
||||||
|
faster service installation, data management groups at NET and TRG are
|
||||||
|
coordinating the line-by-line record verification effort. Employees often
|
||||||
|
identify inaccurate records as a source of service problems and frustration.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Well, that's it for now....nothing 'earth-shattering'....but interesting
|
||||||
|
and fun to read nevertheless....and since NET/NYNEX is so ANAL about giving
|
||||||
|
out information, the only way to get it is to *trash*...
|
||||||
|
|
||||||
|
Look for the next issue of "DI" to come out next month or so......
|
||||||
|
|
||||||
|
Till then...don't stop exploring....and don't be afraid to get your hands
|
||||||
|
a bit dirty....
|
||||||
|
|
||||||
|
..oooOO Count Zero OOooo.. *cDc* -=RDT
|
||||||
|
|
254
textfiles.com/phreak/TRASHING/trash2.txt
Normal file
254
textfiles.com/phreak/TRASHING/trash2.txt
Normal file
@@ -0,0 +1,254 @@
|
|||||||
|
THE ........ULTIMATE..........GUIDE........ON...........TRASHING
|
||||||
|
|
||||||
|
|
||||||
|
///\\\ IT's NOT FUN, IT's SCIENCE! ///\\\
|
||||||
|
|
||||||
|
DEFINITION: Trashing is the operation of recovering paper
|
||||||
|
documents, bills, checks etc. from the persons or companies garbage
|
||||||
|
cans(bags). Trashing is one of the the oldest and safest ways to get any
|
||||||
|
kind of information(if u know what r doing)
|
||||||
|
|
||||||
|
SAFETY: This is very safe method, because usually it
|
||||||
|
doesn't involve any illegal actions, except trespassing when it's nececery,
|
||||||
|
it is virtually impossible to get into serious trouble for trashing.
|
||||||
|
Here's the tip, with it u are never gonna get in any kind of trouble,
|
||||||
|
REMEMBER u should never look like u are searching for paper documents or
|
||||||
|
any other kind of private information, which can easily be considered
|
||||||
|
illegal.(will be explained later)
|
||||||
|
|
||||||
|
STRATEGY: Strategy is more important than most of u kids
|
||||||
|
think it is. Everybody should have his own strategy, but here are some
|
||||||
|
hints. It's very important to see three parts of the process which are
|
||||||
|
targeting, planning and action. Most of u clearly see the last part.
|
||||||
|
|
||||||
|
Targeting or choosing the object for your next mission is very important,
|
||||||
|
u wouldn't like to trash some supermarket or store, and then find out that
|
||||||
|
they don't even accept credit cards or bank where they shred all the
|
||||||
|
fucking paper, however usually it's not so hard to choose the right object,
|
||||||
|
a little bit of research and common sense, basically thats all!
|
||||||
|
|
||||||
|
Planning - the most important and probably the most difficult part, here
|
||||||
|
u should plan your mission considering everything: time, weather conditions,
|
||||||
|
location, security (surveillance and police patrolling), crime situation in
|
||||||
|
the area (in poor neighbourhoods, where robberies and usual crimes like
|
||||||
|
that are very frequent, police and people are very suspicious of every dude
|
||||||
|
walking around dressed in the black) , crowdness , "dress code" and of
|
||||||
|
course action itself.
|
||||||
|
|
||||||
|
Action completely depends on your physical abilities
|
||||||
|
(jumping over the fence, sneaking in to the backyard,etc) and abilities of
|
||||||
|
your tools. Also u should know that trashing takes a lot of patience,
|
||||||
|
sometimes u have to go for weeks to the same place, until u find what u r
|
||||||
|
looking for, so it's not a good idea to mess the site up or burn the
|
||||||
|
garbage cans to the ground, even though that can be phun!:-0)
|
||||||
|
|
||||||
|
TARGETING: There are two ways of targeting : RANDOM - when u
|
||||||
|
are basically guessing your future objects using your common sense, for
|
||||||
|
example most people know that banks throw out a lot of paper, so why
|
||||||
|
shouldn't i check one of them. Usually when u use that method u don't know
|
||||||
|
exactly what are u looking for, u r just browsing the paper, searching for
|
||||||
|
something that could interest u, like numbers, signatures, handwriting.
|
||||||
|
|
||||||
|
POINTED - is the other, more sufisticated method of trashing, that involves
|
||||||
|
some research. Here, the goal is to get as much information as u can about
|
||||||
|
organization and its activity. The best example, is the trashing of
|
||||||
|
the private sector, everybody knows that most of the credit card companies
|
||||||
|
send their statements at the end of the month, so the good idea to trash it
|
||||||
|
around this time to get the best results. Following the recycling days also a
|
||||||
|
good example of pointed trashing.
|
||||||
|
|
||||||
|
PLANNING: Remember the most important thing is to plan your
|
||||||
|
actions, so it will take u the least amount of time possible, without
|
||||||
|
getting a lot of attention.
|
||||||
|
|
||||||
|
TIME: of course the best time to go trashing is from 2-5 am
|
||||||
|
(in the big cities), however from my own experience u should do this 4-5 am
|
||||||
|
when it's not dark anymore but there are still no people on the
|
||||||
|
streets and your local police units seem to be more relaxed, waiting for
|
||||||
|
the opening of Dunkin Donuts. Don't be too late, though, if in your area
|
||||||
|
garbage squad works on any kind of schedule(hehe), u don't wanna come over
|
||||||
|
and see all the garbage collected! The best night for trashing is the night
|
||||||
|
before collecting, which u can easily find out by the signs on the street
|
||||||
|
that say :NO PARKING on particular days, recycling days really can be
|
||||||
|
helpful since all the paper and cardboard should be wrapped and left in
|
||||||
|
front of the house, to find out recycling days in your area u should
|
||||||
|
contact your local department of sanitation (212-219-8090 for NYC
|
||||||
|
(sanitation action center)) recycling days usually go with interval of 2
|
||||||
|
weeks (except holidays). By the way do not spend more than 10-15 minuts
|
||||||
|
trashing, 15 minutes should be more than enough!
|
||||||
|
|
||||||
|
WEATHER: of course it doesn't really matter, but
|
||||||
|
if it's raining and weather is shitty itself chances are u'll be doing your
|
||||||
|
thing without major interruptions. It good to start right after the rain has
|
||||||
|
started, that way u won't find most of the paper documents damaged!
|
||||||
|
|
||||||
|
LOCATION: Most of the backyards these days remind
|
||||||
|
concentration camps of the WWII, so u gonna need some skill to go through
|
||||||
|
those fancy fences. If don't have a lot of experience or u just don't
|
||||||
|
feel like breaking the law, choose target with an easy access so u won't
|
||||||
|
get a lot trouble getting in and out.
|
||||||
|
|
||||||
|
DRESS CODE: Get your old dark clothes from the closet and u
|
||||||
|
are set! However u can't look different from the people in the
|
||||||
|
neighbourhood! And of course no need for army stuff like camouflage pants,
|
||||||
|
black gloves and hats, don't get extreme, people will figure some serial
|
||||||
|
killer they were expecting all their life finally came in their
|
||||||
|
neighbourhoods, and will call the cops, just for the regular check up!
|
||||||
|
|
||||||
|
PEOPLE (amount): U should avoid usual hang outs
|
||||||
|
and places where a lot of people happen to like walking through in the
|
||||||
|
nighttime.In the daytime big crowds are you best allies, if u planning to
|
||||||
|
trash the cashier's garbage can, in your local WIZ or whatever, the best
|
||||||
|
hours are from 12 to 4 pm, when either the store is so crowded that you can
|
||||||
|
take the cashier machine with the papers or it's empty, and most of the
|
||||||
|
employees happened to take a lunch break or too lazy even to look around!
|
||||||
|
|
||||||
|
SURVEILLANCE: Of course u know today most of the
|
||||||
|
companies, i don't even talk about banks, armed with the latest pieces of
|
||||||
|
surveillance equipment, cameras in the backyard of course are the worst and
|
||||||
|
most common enemies of the trasher, so before diving in, look around,
|
||||||
|
chances are, theres something that can see u, a lot of private houses have the
|
||||||
|
movement detectors, u know this really annoying thing that lights up when
|
||||||
|
someone's walking around, one of my stupid neighbours put one outside his
|
||||||
|
house, now it goes off, everytime someone walks by the the house, just
|
||||||
|
break the bulb, and that shouldn't be a big problem.
|
||||||
|
|
||||||
|
ACTION: Ok, here we are ,everything is prepared, the date is
|
||||||
|
set, your new armani suit is waiting for you in the closet, u are ready to
|
||||||
|
go! U are gonna need some tools to help you finish everything faster and
|
||||||
|
safer, of course! What u have to know is that u cannot take anything that
|
||||||
|
will not be helpful or can reveal your identity if u loose it.
|
||||||
|
|
||||||
|
BLADE - one of the most important tool for u!
|
||||||
|
Remember those old razors where u had to replace the blade, well thats the
|
||||||
|
blade u need! I know it's pretty hard to get one today, but u definitely
|
||||||
|
should check your local pharmacy for it!
|
||||||
|
|
||||||
|
Utility knives : some people use them
|
||||||
|
because it's safer to carry on and u can use them for other things like
|
||||||
|
striping wires, but i don't like to use utility knives because they are
|
||||||
|
pretty big and it's pretty hard to get rid of when u have to, the other
|
||||||
|
thing is that it doesn't work for me that well! If u don't want
|
||||||
|
accidentally slash yourself u may consider put some iso-tape(electrical)
|
||||||
|
over it, and use it as a handle.
|
||||||
|
|
||||||
|
Rubber(latex) GLOVE(s) - here's another tool, for people
|
||||||
|
like me, who don't really enjoy going through somebodies leftovers or
|
||||||
|
whatever is in there! I use one glove, the technique is: i carry blade in
|
||||||
|
one hand and on the other i put the glove, to go through the actual trash.
|
||||||
|
When u get used to this technique, the work goes amazingly fast. After the
|
||||||
|
job is done the good idea would be not to put the glove in the same
|
||||||
|
garbage can!
|
||||||
|
|
||||||
|
FLASHLIGHT: I know it's a very important thing
|
||||||
|
to have with u, but here in New York i used it maybe twice going trashing, the
|
||||||
|
streets are so lighten up, i guess u can find a penny in the trash here
|
||||||
|
without using any portable source of light!
|
||||||
|
|
||||||
|
BAG(s): First of all u are gonna need a
|
||||||
|
bag to put all you foundings in it, the second bag can be very useful (see
|
||||||
|
SLASHING) My advice do not carry the bag while going through the trash. Put
|
||||||
|
it in the can with the rest of the trash, and only after finishing take the
|
||||||
|
bag and leave fast, otherwise u will cause brain damage to the cop or guard
|
||||||
|
when he will be thinking why is the guy searching for his watches or cans
|
||||||
|
has a bag full of documentation and other paper, and we wouldn't want to do anything
|
||||||
|
like this!
|
||||||
|
|
||||||
|
GOOD LINE (story): REMEMBER, really good line
|
||||||
|
that can explain your actions can save maybe not the life, but your ass for
|
||||||
|
sure, something like: I was today in this bank, and left my student ID on
|
||||||
|
the counter(wherever), and when i called them up they told me that someone
|
||||||
|
must have put it in the garbage, so i called the sanitation and they told
|
||||||
|
that today is the collecting night in that area and to search for the
|
||||||
|
wallet would cost me 70$, so i have decided to go and search for it by
|
||||||
|
myself! This is very good line, even security and cops have a heart, so
|
||||||
|
that can even explain trespassing, and shouldn't cause any problem at all,
|
||||||
|
maybe warning! Now here u want to keep in mind the situation u r in, if u
|
||||||
|
have a bag full of paper u should come up with explanation, which is not so
|
||||||
|
easy, to avoid this situation please refer to the paragraph on disguise!
|
||||||
|
|
||||||
|
* DISGUISE: It's extremely important to
|
||||||
|
include this in your "action pack", what can be considered as disguise, is
|
||||||
|
something that can support your great story, remember this old disguise, i'm
|
||||||
|
sure most of u use, put a couple of cans in your bag, now u can bull shit
|
||||||
|
security about collecting the cans for some competition or just for
|
||||||
|
yourself, very nice! But here something i made up myself, and it seems to
|
||||||
|
be working for me with any line i use: U know, a lot of old people actually
|
||||||
|
collect all the plastic bags, why would they buy new ones, so if u are
|
||||||
|
gonna put about 5 plastic bags in your bag, u can easily get of the hook,
|
||||||
|
claiming that your old grandma asked you to pick up some plastic bags on
|
||||||
|
your way, since she knows that your going to go through the garbage!
|
||||||
|
(for whatever reason u told the cops) Usually they ask u to take out what
|
||||||
|
u have in the bag, u just look inside your bag and find your lifesaving
|
||||||
|
plastic bags, here u go sir, if the cop is really pain in the ass and finds
|
||||||
|
out that u have paper in the bag as well, just tell him that it must have
|
||||||
|
been in the plastic bags u 've found, and u didn't want to take it out here,
|
||||||
|
because it's kind of embarrassing u know, if some of your friends see u
|
||||||
|
diving in the garbage can! hehe Yeah right, i guess that sounds nice! As i
|
||||||
|
said before cop too has a heart and a little bit of brain so if your story
|
||||||
|
sounds LOGIC u shouldn't have a lot of shit on you! hehe Thats idiom!
|
||||||
|
|
||||||
|
Another tip before u've started, don't hang around people's cars,
|
||||||
|
windows and other valuable stuff, u know people usually get pissed off
|
||||||
|
because of that!
|
||||||
|
|
||||||
|
PRIVATE HOUSING: trashing here can be very complicated, if u
|
||||||
|
don't know how to do it right. Here u are gonna have to deal with bags.
|
||||||
|
(see SLASHING) First of all u should think before doing this on the
|
||||||
|
site: it will take u a lot of time, trash here is usually very dirty and if
|
||||||
|
u live in your own house or know some quite place outside, a good
|
||||||
|
idea would be to bring a couple trash bags in your back yard. If u live in
|
||||||
|
apartment like i do, here what u can do: DEPARTMENT OF SANITATION
|
||||||
|
in the big cities is very strict and always make up some shit like
|
||||||
|
recycling or just sorting the trash! Well i guess thats all u need, in NYC
|
||||||
|
city looking for the papers u should check all the GREEN garbage cans,
|
||||||
|
where all the paper should be. U can go further and use you social
|
||||||
|
engineering skills to call up people in the house, posing as an employee of
|
||||||
|
the department of sanitation, and tell them that last time, workers found
|
||||||
|
in the their trash checks, bills and statements, which is illegal
|
||||||
|
to put with the regular paper, because they contain some chemical
|
||||||
|
(dEnopEroXId......whatever)(i'm not Mendeleyev, neither have to be u)
|
||||||
|
which is none recycble, and can cause serious damage to the
|
||||||
|
atmosphere :). SO next time please put all your checks, bills
|
||||||
|
(whatever u want them to) in the pink bag, u can also ask them to mark it,
|
||||||
|
something like "RADIOACTIVE" or "BODY PARTS", even can
|
||||||
|
specify the date when they should take it out! hehe. So next time u'll be
|
||||||
|
around u can easily determine where is everything u need. This
|
||||||
|
method will work in the big cities where SANITATION is very powerful and
|
||||||
|
strict, once i put my paper in the bag, and got ticket just because i
|
||||||
|
didn't wrap it up.
|
||||||
|
|
||||||
|
GOVERNMENT and COMPANIES structures: all the garbage they
|
||||||
|
usually keep in the back yards, however if u don't see any drive access to
|
||||||
|
the back yard they probably take it out on the garbage day(a lot of banks
|
||||||
|
in my neighbourhood do that, because of the limited space in the backyard,
|
||||||
|
or because they don't have a drive access to it, they have to take it out
|
||||||
|
anyway) Certainly this can be the easiest way to trash, just wait until the
|
||||||
|
garbage day, go there and here u go, in front of the bank or whatever, u
|
||||||
|
see 3 or 4 carefully tied bags. If u want to be there first, u should go
|
||||||
|
right after the closing, and don't worry to be late for it, no
|
||||||
|
selfrespectful sanitation department will pick up the garbage earlier than
|
||||||
|
the middle of the night.
|
||||||
|
|
||||||
|
SLASHING: Slashing the bags is the fastest way to open them,
|
||||||
|
right!? If u gonna trash one of those big metal trash cans, u can dive in
|
||||||
|
and leave whatever mess u want, it doesn't really matter those big garbage
|
||||||
|
trucks will take the whole can, but when u trash private house it's very
|
||||||
|
important not to leave any mess after you. All the garbage from houses and
|
||||||
|
streets those garbage men will pick up with their hands, and i don't think
|
||||||
|
they will be happy to see slashed bags with all this mess around, the owner
|
||||||
|
will definitely get a ticket for that. The solution is to take another bag
|
||||||
|
where u can put all your mess, without getting hardworking men angry. U
|
||||||
|
gonna get used to slash the bags in the right places, so u won't get too
|
||||||
|
dirty and finish the damn thing faster.
|
||||||
|
|
||||||
|
CAUTION : Right now, when u r reading this, someone can
|
||||||
|
easily be trashing you, so if u don't want to become victim of this
|
||||||
|
document, please do not throw away any papers that can reveal anything
|
||||||
|
from your personal data!
|
||||||
|
|
||||||
|
|
||||||
|
release date: 11/97 by :
|
||||||
|
|
||||||
|
|
||||||
|
::::::::::::::::::::::::: GOLDEN DUST ::::::::::::::::::::::::::
|
110
textfiles.com/phreak/TRASHING/trash3.phk
Normal file
110
textfiles.com/phreak/TRASHING/trash3.phk
Normal file
@@ -0,0 +1,110 @@
|
|||||||
|
>>>>> TRASHING TECHNIQUES <><<<<<<<<<<
|
||||||
|
|
||||||
|
////////////////////////////////
|
||||||
|
/ MORDOR AE - 528-6467 ZANDAR /
|
||||||
|
/ THE BASEMENT - 223-6404 /
|
||||||
|
////////////////////////////////
|
||||||
|
|
||||||
|
THE UNDERGROUND ALLIANCE RULES!!!!!!!
|
||||||
|
|
||||||
|
Ok guys...first,there has to be a bell telephone station near you or someone
|
||||||
|
close to your heart......
|
||||||
|
|
||||||
|
The best type to look for is known as a "VAULT" if you have seen one you know
|
||||||
|
why it is called just that... it has four walls, no windows, and most likely a
|
||||||
|
digital combination lock.
|
||||||
|
|
||||||
|
|
||||||
|
NEEDED EQUIPMENT
|
||||||
|
======================================
|
||||||
|
1:Sneakers(in case of cops)
|
||||||
|
2:Sheet of paper w/excuses if caught
|
||||||
|
3:Clean garbage bag(several)the ones you find in the dumpster reek like all
|
||||||
|
hell
|
||||||
|
4:One flashlight(good batteries)
|
||||||
|
5:Dark(possibly camouflage)clothes
|
||||||
|
6:A friend(trustworthy not a wimp)
|
||||||
|
7:One bottle of j.d.(just for the hell of it)
|
||||||
|
======================================
|
||||||
|
LIST OF EXCUSES
|
||||||
|
======================================
|
||||||
|
|
||||||
|
1:I forgot murder was against the law
|
||||||
|
2:I was lost..
|
||||||
|
3:I was hungry
|
||||||
|
6:Needed a place to sleep
|
||||||
|
5:Why not?
|
||||||
|
6:Lost something in the garbage
|
||||||
|
7:Needed wallpaper
|
||||||
|
8:Fuck off and die
|
||||||
|
9:Read me my rights first
|
||||||
|
10:It's the new fad..garbage pursuit
|
||||||
|
|
||||||
|
======================================
|
||||||
|
BE PREPARED FOR...
|
||||||
|
======================================
|
||||||
|
|
||||||
|
1:An immediate unforseen departure from the premises(w/the stuff!)
|
||||||
|
2:Zandar's law...for every piece of inorganic garbage there is an
|
||||||
|
equal and substatially worse smelling piece of organic shit!
|
||||||
|
3:Your friendly neighborhood cop
|
||||||
|
4:A shower when ya get home
|
||||||
|
5:A lot of garbage
|
||||||
|
6:Potholes and ditches that you never knew existed
|
||||||
|
|
||||||
|
======================================
|
||||||
|
WHAT TO LOOK FOR
|
||||||
|
======================================
|
||||||
|
|
||||||
|
1:Anything that looks dead...
|
||||||
|
2:Anything that looks like a computer printout(or manual)
|
||||||
|
3:Hardware(with a lot of luck)
|
||||||
|
4:Police(look do not find!!)
|
||||||
|
5:The garbage area
|
||||||
|
6:An escape route
|
||||||
|
7:An obscure and well hidden stash area as well as an obscure
|
||||||
|
approach
|
||||||
|
|
||||||
|
=======================================
|
||||||
|
WHAT NOT TO DO
|
||||||
|
=======================================
|
||||||
|
|
||||||
|
1:Get caught
|
||||||
|
2:Panic
|
||||||
|
3:Leave any sign of your presence
|
||||||
|
4:(clean the damn place up)
|
||||||
|
5:Make noise
|
||||||
|
6:Have more than two people
|
||||||
|
7:Forget where you live
|
||||||
|
8:Do not go to the near by restaurant or bar for a quickie
|
||||||
|
9:Do not do it in the daytime
|
||||||
|
10:Throw anything back just because you aren't sure what it is...
|
||||||
|
(chances are it is worth all the more 'cause only telco employees
|
||||||
|
can understand it)
|
||||||
|
|
||||||
|
=======================================
|
||||||
|
We believe that if you follow these instructions you too can screw over BELL
|
||||||
|
w/a little luck and half a brain................
|
||||||
|
=======================================
|
||||||
|
as a final note,find out when your local sanitation co. picks up the garbage
|
||||||
|
and go the night before.. also,if the bell place nearest you incinerates its
|
||||||
|
garbage forget it!
|
||||||
|
=======================================
|
||||||
|
written by:
|
||||||
|
|
||||||
|
zandar zan
|
||||||
|
&
|
||||||
|
the boogyman
|
||||||
|
=======================================
|
||||||
|
u
|
||||||
|
insinerates its garbage forget it!
|
||||||
|
|
||||||
|
=======================================
|
||||||
|
written by:
|
||||||
|
|
||||||
|
zandar zan
|
||||||
|
&
|
||||||
|
the boogyman
|
||||||
|
=======================================
|
||||||
|
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||||
|
|
80
textfiles.com/phreak/TRASHING/trashin2.txt
Normal file
80
textfiles.com/phreak/TRASHING/trashin2.txt
Normal file
@@ -0,0 +1,80 @@
|
|||||||
|
Advanced Trashing Techniques
|
||||||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||||||
|
|
||||||
|
By: Jimmy'z
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Introduction:
|
||||||
|
|
||||||
|
Trashing is the simple act of looking through other peoples
|
||||||
|
trash; to find interesting stuff. If you wonder why one would
|
||||||
|
ever want to consider doing such an act... Remember : One man's
|
||||||
|
garbage is another man's treasure.
|
||||||
|
|
||||||
|
The whole reason for trashing is to find INFORMATION. You
|
||||||
|
could be interested in getting credit card numbers, computer
|
||||||
|
system passwords, industrial secrets, blackmail material,
|
||||||
|
ANYTHING. 99 times out of 100 it'll be in their trash.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Trashing Techniques:
|
||||||
|
|
||||||
|
The best time for trashing is in the broad daylight *Unless
|
||||||
|
the place locks their trash* Remember, if you act really
|
||||||
|
inconspicuously, nobody will bother you. If by chance someone
|
||||||
|
asks you what the h*ll you're doing, tell them you're looking for
|
||||||
|
aluminum cans or something equally as stupid.
|
||||||
|
|
||||||
|
Remember to wear gloves, long sleeved shirts, and jeans of
|
||||||
|
some sort. I've jumped into a few dumpsters containing fiber
|
||||||
|
glass, nails, and even once : SHIT... It's a dirty business, BUT
|
||||||
|
IT CAN PAY OFF IF YOU DON'T GET DISCOURAGED. Last time I went, I
|
||||||
|
found over 500 TRW credit reports (Roughly 750 credit cards, plus
|
||||||
|
TRW accounts, and passwords.)
|
||||||
|
|
||||||
|
|
||||||
|
Best Places to Trash:
|
||||||
|
|
||||||
|
When thinking of a place to go trashing, you must first take
|
||||||
|
into account WHAT you are trying to find. (You don't want to
|
||||||
|
trash behind McDonalds if you are looking for credit card
|
||||||
|
numbers. I highly suggest you NOT trash at a McDonalds - why
|
||||||
|
look through all that crap. If you are looking for cards, the
|
||||||
|
best places are malls. Malls are good because they receive by
|
||||||
|
far THE MOST credit card payments. Trashing really requires
|
||||||
|
thought on the part of the trasher, and with a little help from
|
||||||
|
me, you'll be on the right track.
|
||||||
|
|
||||||
|
Flower shops are good places to trash. Most flower shops do
|
||||||
|
most or all of their business through credit (phone orders) And
|
||||||
|
besides, would you rather look through some smelly, shitty crap,
|
||||||
|
or dead flowers?! Another really cool place to trash is the
|
||||||
|
telephone company. If you have one of those big telephone
|
||||||
|
company buildings, you'd be surprised at the types of data they
|
||||||
|
throw away. Computer system's passwords, phone card numbers, the
|
||||||
|
list goes on.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Closing:
|
||||||
|
|
||||||
|
Trashing can prove to be very fun, interesting, AND
|
||||||
|
PROFITABLE! Just keep on doing it, and you'll stumble upon some
|
||||||
|
really interesting stuff. You never know when you'll find a
|
||||||
|
briefcase or something filled with cash, or drugs. Another
|
||||||
|
thing, when trashing - just jump right in there, leaning over one
|
||||||
|
of those dumpsters can start to hurt after a while!
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Disclaimer:
|
||||||
|
|
||||||
|
This file is for informational use only. I am simply
|
||||||
|
reserving my right to free Speech! I love The USA!
|
||||||
|
|
||||||
|
|
||||||
|
----------------------------[ J I M M Y ' Z]---------------------
|
134
textfiles.com/phreak/TRASHING/trashing.hac
Normal file
134
textfiles.com/phreak/TRASHING/trashing.hac
Normal file
@@ -0,0 +1,134 @@
|
|||||||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||||
|
% %
|
||||||
|
% Better Homes and Trashing %
|
||||||
|
% %
|
||||||
|
% Written by..... The Saint %
|
||||||
|
%%%%%%%%%%%%% %%%%%%%%%%%%%
|
||||||
|
% Thanx to Ares for his help! %
|
||||||
|
% %
|
||||||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||||
|
|
||||||
|
Intro:
|
||||||
|
|
||||||
|
This file is intended for informational purposes only!!!
|
||||||
|
|
||||||
|
The authors (The Saint and Ares) take no responsibility whatsoever for
|
||||||
|
any actions taken by anyone who reads the contents of this file.
|
||||||
|
|
||||||
|
Primarily, this file will discuss the general idea behind trashing, the
|
||||||
|
risks involved, and some general tips to make your trashing venture
|
||||||
|
successful.
|
||||||
|
|
||||||
|
Basics:
|
||||||
|
|
||||||
|
The basic reasons for trashing can vary, but are generally:
|
||||||
|
|
||||||
|
1> To obtain credit cards and/or carbons of credit cards.
|
||||||
|
2> To obtain any information that may be useful in the aid of phreaking.
|
||||||
|
|
||||||
|
When choosing a place to go trashing, one must keep in mind the following:
|
||||||
|
|
||||||
|
1> Location of dumpster
|
||||||
|
2> Security of property where dumpster is located
|
||||||
|
3> Type of trash that may be found
|
||||||
|
|
||||||
|
First, the location. You generally want to pick a place that is somewhat
|
||||||
|
isolated, where there will not be a lot (preferably none) of people. To
|
||||||
|
accomplish this, it is also best to do your trashing at night, as there
|
||||||
|
will not likely be any employees at the location, and it is easier to hide
|
||||||
|
and to not be seen by passers-by.
|
||||||
|
Second, the security. Places such as Telco buildings and large companies
|
||||||
|
often have security guards on duty 24 hours, and often keep their dumpsters
|
||||||
|
behind fences so as to discourage trespassing. Yes, you are trespassing when
|
||||||
|
you start looking in someone's garbage can!!! So it is a good idea to check
|
||||||
|
out the place you are going to trash for a day or so to get a feel for what
|
||||||
|
kind of security they have. This way, you can avoid walking in blindly to
|
||||||
|
some place and getting nabbed, or you can figure out where to park your car,
|
||||||
|
or where to hide, or how to avoid the security (rent-a-cops).
|
||||||
|
Places such as department stores and banks most likely will not have any
|
||||||
|
security for the outside of their buildings as they may not be able to
|
||||||
|
afford it or may not anticipate trashers. Also, they may not have anything
|
||||||
|
worth taking! So basically, check the place out before you just go and hit
|
||||||
|
it.
|
||||||
|
Case in point. One night, my friend and I casually pulled into the
|
||||||
|
parking lot of a Pacific Bell office, and before we knew what was
|
||||||
|
happening, a security guard had a giant spotlight glaring down on us.
|
||||||
|
We just casually made a u-turn as if we were just turning around to go the
|
||||||
|
other way. (More on what to do if you get caught later).
|
||||||
|
|
||||||
|
Third, you must pick a place where you know there will be trash that is of
|
||||||
|
use to you. Don't go trashing at some little deli, all you'll get is a
|
||||||
|
bunch of rotten food! (Unless of course you know for a fact that the deli
|
||||||
|
deals alot with credit cards). In searching for cards, pick places such as
|
||||||
|
department stores or places that sell alot of expensive stuff.
|
||||||
|
|
||||||
|
Also, the local telephone company is, of course the place to go to find
|
||||||
|
your basic phreaking info.
|
||||||
|
|
||||||
|
These have been some of the basics to keep in mind before you hit aplace.
|
||||||
|
Now for some techniques to use to help increase the efficiency of your
|
||||||
|
trashing endeavors.
|
||||||
|
|
||||||
|
Tips:
|
||||||
|
|
||||||
|
First of all, don't be afraid to actually go into the trash can. This is
|
||||||
|
almost always necessary to reach the good stuff. Also, when you are ducking
|
||||||
|
down inside a big dumpster, you cannot be seen by passing police cars or
|
||||||
|
security guards who happen to waltz by.
|
||||||
|
|
||||||
|
Second, always have a lookout somewhere to keep an eye out for cops or
|
||||||
|
employees who may be coming out to throw trash away. You may want to have
|
||||||
|
some kind if signal so that if you have advanced warning of security, you
|
||||||
|
can take evasive measures, like burying yourself in the trash.
|
||||||
|
|
||||||
|
Try not to spend too long in a given trash can. The longer you stay, the
|
||||||
|
more you put yourself at risk of getting caught. This means that you cannot
|
||||||
|
be too picky about what trash you take. There is plenty of time for that
|
||||||
|
after you bail the scene with the goods. You may want to have a knife handy,
|
||||||
|
however, to cut open boxes or bags, and a small flashlight is a good idea,
|
||||||
|
although if possible, avoid using to much light or making too much noise,
|
||||||
|
anything that could potentially attract someone.
|
||||||
|
|
||||||
|
A car is a good thing to have, if possible. This greatly increases the
|
||||||
|
range of places you can hit in one night. It is a good idea, if you are
|
||||||
|
accumulating alot of stuff, to stop somewhere secluded and well lit
|
||||||
|
(like a school or empty shopping center) and sort out the trash so you
|
||||||
|
can get rid of useless garbage like food, etc. Take all the useless
|
||||||
|
garbage and dump it into another dumpster.
|
||||||
|
|
||||||
|
You may want to wear old clothes that can get messed up, and gloves are not a
|
||||||
|
bad idea either, both to keep your hands clean, and to keep prints off of
|
||||||
|
anything in case the place discovers what you have done.
|
||||||
|
|
||||||
|
What to do if you get caught:
|
||||||
|
|
||||||
|
This is perhaps the most important thing to keep in mind when trashing.
|
||||||
|
What to do if you happen to be caught be someone and they want to know what
|
||||||
|
you are doing.
|
||||||
|
|
||||||
|
If you can, run like hell! Only do this if you have a clean getaway
|
||||||
|
and you think you can get away without too much problem. Keep in mind that
|
||||||
|
trying to escape may only make your situation worse. Only run if it looks
|
||||||
|
like they are gonna bust you.
|
||||||
|
|
||||||
|
In most cases, the people may just tell you to get out. They will probably
|
||||||
|
ask you some dumb questions, like "What are you doing in the trash?"
|
||||||
|
In this case, make up a story, like "Oh, my friend here threw a ball
|
||||||
|
in here and I was looking for it." If the guard believes you, he will
|
||||||
|
probably just tell you to get out with a strong warning.
|
||||||
|
|
||||||
|
If they are serious about nailing you, however, chances are you'll only
|
||||||
|
get charged with trespassing, which is not a major crime. In any case,
|
||||||
|
however, maintain an extremely high level of caution when trashing, and
|
||||||
|
always remain calm and collected. You can usually bullshit your way out
|
||||||
|
of just about anything if you play your cards right.
|
||||||
|
|
||||||
|
Hope this has helped you to gain some insight into how to go about gaining
|
||||||
|
that valuable information you always wanted.
|
||||||
|
|
||||||
|
Look for more informative files in the future from Better Homes and
|
||||||
|
Anarchy. And if you have any comments or anything to add, you can get hold
|
||||||
|
of me on the Electric Kingdom at (619) 484-5243. Please upload this to
|
||||||
|
many BBS's around the country to help your phellow phreakers!
|
||||||
|
|
||||||
|
DOWNLOADED FROM P-80 SYSTEMS......
|
67
textfiles.com/phreak/TRASHING/trashing.phk
Normal file
67
textfiles.com/phreak/TRASHING/trashing.phk
Normal file
@@ -0,0 +1,67 @@
|
|||||||
|
Uploaded By: PRIVATE PIRATE
|
||||||
|
---------------------------------------
|
||||||
|
Bell Trashing
|
||||||
|
By: The Dragyn
|
||||||
|
The Police Station
|
||||||
|
612-934-4880
|
||||||
|
|
||||||
|
|
||||||
|
The Phone Co. will go to extreams on occasions. In fact, unless you really
|
||||||
|
know what to expect from them, they will suprise the heck out of you with their
|
||||||
|
"unpublished tarriffs". Recently, a situation was brought to my attention that
|
||||||
|
up till then I had been totaly unaware of, least to mention, had any concern
|
||||||
|
about. It involved gar- bage! The phone co. will go as far as to prosecute
|
||||||
|
anyone who rumages through their garbage and helps himself to some.
|
||||||
|
|
||||||
|
Of course, they have their reasons for this, and no doubt benefit from such
|
||||||
|
action. But, why should they be so picky about garbage? The answer soon
|
||||||
|
became clear to me: those huge metal bins are filled up with more than waste
|
||||||
|
old food and refuse... Although it is Pacific Tele. policy to recycle paper
|
||||||
|
waste pro ducts, sometimes employees do overlook this sacred operation when sor
|
||||||
|
ting the garbage. Thus top-secret confidential Phone Co. records go to the
|
||||||
|
garbage bins instead of the paper shredders. Since it is constantly being
|
||||||
|
updated with "company memorandums, and supplied with extensive reference
|
||||||
|
material, the Phone co. must continualy dispose of the outdated materials.
|
||||||
|
Some phone companies are supplied each year with the complete "System
|
||||||
|
Practices" guide. This publication is an over 40 foot long library of
|
||||||
|
reference material about everything to do with telephones. As the new edition
|
||||||
|
arrives each year, the old version of "System Practices" must also be thrown
|
||||||
|
out.
|
||||||
|
|
||||||
|
I very quickly figured out where some local phone phreaks were getting their
|
||||||
|
material. They crawl into the garbage bins and remove selected items that are
|
||||||
|
of particular i nterest to them and their fellow phreaks. One phone phreak in
|
||||||
|
the Los Angeles area has salvaged the complete 1972 edition of "Bell System
|
||||||
|
Practices". It is so large and was out of order (the binders had been removed)
|
||||||
|
that it took him over a year to sort it out and create enough shelving for it
|
||||||
|
in his garage.
|
||||||
|
|
||||||
|
Much of this "Top Secret" information is so secret that most phone companies
|
||||||
|
have no idea what is in their files. They have their hands full simply
|
||||||
|
replacing everything each time a change in wording requires a new revision. It
|
||||||
|
seems they waste more paper than they can read!
|
||||||
|
|
||||||
|
It took quite a while for Hollywood Cal traffic manager to figure out how all
|
||||||
|
of the local phone phreaks constantly discovered the switchroom test numbers.
|
||||||
|
|
||||||
|
Whenever someone wanted to use the testboard, they found the local phone
|
||||||
|
phreaks on the lines talking to all points all over the world. It got to the
|
||||||
|
point where the local garbage buffs knew more about the office operations than
|
||||||
|
the employees themselves. One phreak went so far as to call in and tell a
|
||||||
|
switchman what his next daily assignment would be. This, however, proved to be
|
||||||
|
too much. The switchman traced the call and one phone phreak was denied the
|
||||||
|
tool of his trade.
|
||||||
|
|
||||||
|
In another rather humorous incident, a fellow phreak was rumaging through the
|
||||||
|
trash bin when he heard someone approaching. He pressed up against the side of
|
||||||
|
the bin and silently waited for the goodies to come. You can imagine his
|
||||||
|
surprise when the garbage from the lunchroom landed on his head. Most people
|
||||||
|
find evenings best for checking out their local telco trash piles. The only
|
||||||
|
thing necessary is a flashlight and, in the case mentioned above, possibly a
|
||||||
|
rain coat. A word of warning though, before you rush out and dive into the
|
||||||
|
trash heap. It is probably illegal, but no matter where you live, you
|
||||||
|
certainly won't get the local policeman to hold your flashlight for you.
|
||||||
|
|
||||||
|
---------------------------------------
|
||||||
|
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||||
|
|
170
textfiles.com/phreak/TRASHING/trashinguide.txt
Normal file
170
textfiles.com/phreak/TRASHING/trashinguide.txt
Normal file
@@ -0,0 +1,170 @@
|
|||||||
|
\Anti-Social Magazine
|
||||||
|
\ Issue 12 31/03/99
|
||||||
|
+------------------
|
||||||
|
=====================
|
||||||
|
Trashing - The Guide
|
||||||
|
By Crashd
|
||||||
|
=====================
|
||||||
|
|
||||||
|
Hey, Nice to be back again, This is my first interesting file in a long time,
|
||||||
|
And as far as I can tell (sorry if I'm wrong) this subject hasnt been covererd
|
||||||
|
at all (for the UK) Although I remeber some rather amusing incidents involving
|
||||||
|
trash :) Trashing, is basically just wading through bags of shit and rubbish,
|
||||||
|
looking for interesting things - documents, flopwarez, equipment etc..
|
||||||
|
|
||||||
|
This deal is split into 2 main areas, personal and business (just like the BT
|
||||||
|
phone book :)
|
||||||
|
|
||||||
|
Ok, i'm gonna deal with personal first, as this is probably the easiest.
|
||||||
|
|
||||||
|
|
||||||
|
1.\ Personal Trashing
|
||||||
|
=====================
|
||||||
|
|
||||||
|
Let's take target #1. He's maybe a businessman, you want his CC number,
|
||||||
|
mobile ESN, Girlfriends phone number, or just want to invade on the poor man's
|
||||||
|
private life. Well the best place to start, is find his home address, and
|
||||||
|
preferably the post code (if you cant find the latter, just knock at the few
|
||||||
|
houses around his, they will probably glady give you it, lie and say your new
|
||||||
|
to the neighbourhood) Now, phone the local council dude's, and ask when the
|
||||||
|
refuse collectors (garbage men :) pick up the trash/shit. Or just ask the
|
||||||
|
nice neighbours again.
|
||||||
|
|
||||||
|
The Night before the trash pick-up, be prepared. For clothes, I recommend
|
||||||
|
something warm, this is my standard atire:
|
||||||
|
|
||||||
|
* 1 heavy-duty flashlight
|
||||||
|
* 1 backpack lined with binbag
|
||||||
|
* 1 black beanie hat
|
||||||
|
* 1 pair of gardeners gloves
|
||||||
|
* 1 pair of latex gloves
|
||||||
|
* 1 Pair of lightweight bottoms
|
||||||
|
* 1 rain-coat, just in case
|
||||||
|
|
||||||
|
Now, go for a stroll, probably the best time is about 10 or 11. Walk past the
|
||||||
|
person's house, and check to see if he/she has left out their groovy wheely
|
||||||
|
bin (most houses in the UK have these, a gift from the Labour Government).
|
||||||
|
If so, walk straight past, towards say a shop or phone box, or whatever.
|
||||||
|
About 10 minutes later, stroll past again, and accidently shunt into the bin,
|
||||||
|
pick it up off of the ground, and walk away with it, take it down a
|
||||||
|
back-street or whatever. Open it up, and get searching, dont forget the
|
||||||
|
flashlight, dont shine it into cars going past or whatever. If you see
|
||||||
|
anything worth stealing, pop it into your nice bag.
|
||||||
|
Common stuff for stealing is:
|
||||||
|
|
||||||
|
* Phone Bill
|
||||||
|
* Receipts
|
||||||
|
* Business Cards
|
||||||
|
* Filo-Fax's
|
||||||
|
* Diary's (blackmail anyone?)
|
||||||
|
|
||||||
|
Most people tend not to chuck out Tv's etc..but if you find any electronical
|
||||||
|
junk, take it and salvage for components :) When your finished with this bin,
|
||||||
|
walk past nice and calm, make the drop off, turn a corner and walk slowly
|
||||||
|
home, along with your sack of delights :)
|
||||||
|
|
||||||
|
|
||||||
|
2.\ Business Trashing
|
||||||
|
=====================
|
||||||
|
|
||||||
|
Business Trashing is much more popular than the latter shit. Stuff you can
|
||||||
|
get from Companies include:
|
||||||
|
|
||||||
|
* Big Lists of ESN's
|
||||||
|
* Manuals for Computers etc..
|
||||||
|
* Journals (par example, the first Blue Box was derived from a technical
|
||||||
|
manual found in a bin in the US) [Correction, No it wasn't, it was built
|
||||||
|
using the tones published in a technical
|
||||||
|
journal, publically available though
|
||||||
|
not a well distributed one -Ed]
|
||||||
|
* Equipment no longer needed
|
||||||
|
|
||||||
|
Hmm, the atire should basically remain the same, nice and conspicous and most
|
||||||
|
of all old - it will take a little more than vanish to get rid of that Bad
|
||||||
|
smell :)
|
||||||
|
|
||||||
|
The only time to trash business's is at NIGHT. Make it a weekend (maybe friday
|
||||||
|
or saturday). Walk past Target company at about 10 to check out any security
|
||||||
|
measures that may harras you, such as watchmen, dog's or camera's. (A
|
||||||
|
favourite target of UK phreakers is BT's Exchanges/Offices. A lot of the MED
|
||||||
|
archives is supposedly found through trashing =) Pop back to your house and
|
||||||
|
pick up any decoy's or help you may need:
|
||||||
|
|
||||||
|
Example:
|
||||||
|
|
||||||
|
* Dog's - Mace (cruel) some fresh bloddy dripping meat (nice, but expensive
|
||||||
|
and short term)
|
||||||
|
OR
|
||||||
|
An Ultrasonice grenade (Schematic shown below..it works as
|
||||||
|
well...damn good.
|
||||||
|
|
||||||
|
* Camera's - Spray paint (good), blakck paper or just wear a lot of black and
|
||||||
|
hope to hell they aint infra-red.
|
||||||
|
|
||||||
|
* Watchmen - You will almost certainly need some friends to help, get them to
|
||||||
|
either phone the place in question, or create a decoy, ie:
|
||||||
|
harrasing him while you nip round the back.
|
||||||
|
|
||||||
|
Also, bring the bag, in it put some chain cutters, and a crowbar.
|
||||||
|
|
||||||
|
If there is chains, cut them. A door? Crowbars work wonders.
|
||||||
|
Once past the first obstacle, if there any of the above (dog, camera's etc..)
|
||||||
|
If it is a yard etc.. the bins are big green/grey plastic/metal effors,
|
||||||
|
probably chained, cut the chains and get rooting, try to have a look-out
|
||||||
|
keeping tabs for you.
|
||||||
|
|
||||||
|
Obvious items of interest (from experience in BT places) are:
|
||||||
|
* Big Chunks Manuals
|
||||||
|
* Any Reams of form-feed paper (usually phone bills or quotes)
|
||||||
|
* ANY Equipment, electrical or otherwise
|
||||||
|
|
||||||
|
Now, your trashing mission is complete, try and escape a different way to
|
||||||
|
your way of entry, and if you disturbed anything, for example the camera's,
|
||||||
|
leave them, Looks better in the long run.
|
||||||
|
|
||||||
|
If you repeat trash a place You will probably get caught quickly, sorry but
|
||||||
|
that's the long and short of it, so go trashing maybe once every 2 months,
|
||||||
|
and make it a nice big thorough inspection as you aint coming back for a
|
||||||
|
while
|
||||||
|
|
||||||
|
* Schematics For Ultrasonic grenade.
|
||||||
|
====================================
|
||||||
|
|
||||||
|
Ok, here's what you will need:
|
||||||
|
|
||||||
|
* 1 Gutted Tennis Ball
|
||||||
|
* Circuit Board - Bread-Board will do for this.
|
||||||
|
* 1 Ultrasonic Transducer (sender, not receiver), (Maplin, rapid, about <20>1)
|
||||||
|
* 1 555 Timer chip
|
||||||
|
* 2 resistors, preferably variable
|
||||||
|
* 2 capacitors - .1 Muf should do.
|
||||||
|
* 1 Mercury Tilt Switch
|
||||||
|
* 1 1 Normal SPDT switch
|
||||||
|
|
||||||
|
Ok, first, if you Cant set up a monostable timing circuit, please please
|
||||||
|
please dont bother trying to build this. Go check the web or ask a
|
||||||
|
electronics lecturer. Ok, for the input of the timing circuit(Chip's pin 1),
|
||||||
|
we want the mercury tilt switch, these are bi-polar. Have the timing circuit
|
||||||
|
on it's own little PCB, and between then battery and the circuit, have the
|
||||||
|
normal SPDT switch, cut out a small hole for this on the tennis ball. Also
|
||||||
|
cut out another one, about 2cm's in diameter, for our transducer. Now wire
|
||||||
|
the ultrasonice transducer as the output (pin 3) of the timing circuit. Glue
|
||||||
|
the transducer into the tennis ball, and close it up with a bit of
|
||||||
|
araldite/black tape/whatever.
|
||||||
|
|
||||||
|
Operation
|
||||||
|
=========
|
||||||
|
|
||||||
|
When you want to use this, throw the SPDT switch, and lob it at a wall, make
|
||||||
|
sure that it spins, or at least rolls. No dog/cat/bat for a good few meter's
|
||||||
|
will be able to come near it and if they do, they will be in a little pain.
|
||||||
|
|
||||||
|
IF you want the Proper PCB Schematics and FULL instructions for this (yes,
|
||||||
|
even how to build the fucking timer circuit) mail: crash_dave_1997@yahoo.com
|
||||||
|
|
||||||
|
Ok, thanks for reading, and if you havent..you've missed it all :)
|
||||||
|
Werd
|
||||||
|
Mail me:
|
||||||
|
crash_dave_1997@yahoo.com
|
||||||
|
ICQ UIN: 7538027
|
||||||
|
IRC: EFNET: #2600-uk, #phuk
|
119
textfiles.com/phreak/TRASHING/trashis.phk
Normal file
119
textfiles.com/phreak/TRASHING/trashis.phk
Normal file
@@ -0,0 +1,119 @@
|
|||||||
|
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
|
||||||
|
:% %:
|
||||||
|
:% BASIC TRASHING MANUAL %:
|
||||||
|
:% Written by: %:
|
||||||
|
:% The Blue Buccaneer %:
|
||||||
|
:% %:
|
||||||
|
:% The Rebel Alliance MegCatLine : [615] - 942 - 6670 %:
|
||||||
|
:% %:
|
||||||
|
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
|
||||||
|
|
||||||
|
|
||||||
|
This is an elementry manual on trashing. I don't think I am qualified to
|
||||||
|
do one on advanced trashing, so here are the basics:
|
||||||
|
|
||||||
|
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
|
||||||
|
|
||||||
|
Trashing is the act of sorting through trash captured from the garbage bins
|
||||||
|
and cans of your local MaBell office. The trash often contains many valuable
|
||||||
|
things which can range from office memos instructing an operator to carry out a
|
||||||
|
special task (trace someone's line..etc) to actual working phones! In addition
|
||||||
|
to those things, you are also very likely to pick up Bell manuals (they have
|
||||||
|
this habit of replacing them every time one word is revised)
|
||||||
|
|
||||||
|
The following is a list of suggested instructions and tips to follow when or
|
||||||
|
if you go trashing. Trashing can be quite profitable and fun, provided you do
|
||||||
|
it right and don't get smelly, dirty, or busted.
|
||||||
|
|
||||||
|
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
|
||||||
|
|
||||||
|
|
||||||
|
STEP #1: LOCATE YOUR TARGET
|
||||||
|
This involves deciding on where exactly the place is you want to
|
||||||
|
trash. The place you want to go trashing at is the Switching Office
|
||||||
|
since that's where everything happens. The easiest way to find the
|
||||||
|
S.O. is to look for a lot of microwave towers. (not too hard, eh?)
|
||||||
|
A good place for advanced trashing is your local COSMOS Office. To
|
||||||
|
find it, look for the place in your city which most resembles:
|
||||||
|
1. A Castle or Fort
|
||||||
|
2. A Bunker out of WWII.
|
||||||
|
3. Your local Federal Prison.
|
||||||
|
4. A Building with the slogan "The more you hear.." on it.
|
||||||
|
The security around these places is that of any of the 1, 2, or 3.
|
||||||
|
Other possible targets would include:
|
||||||
|
1. Relay stations.
|
||||||
|
1. Look for a medium to small size tower with a little shack.
|
||||||
|
2. Look for a big-ass tower with a house with AT&T on the door.
|
||||||
|
The little shacks are usually good to break into because they
|
||||||
|
are left with some really good stuff and are usually out in the
|
||||||
|
middle (maybe a little to the west) or nowhere.
|
||||||
|
I've never been into the houses. You can easily spot them
|
||||||
|
because of the towers in the backyard and the odd fact that they
|
||||||
|
have only one door (the front) and no (0) windows.
|
||||||
|
|
||||||
|
STEP #2: SCOUT THE TARGET AREA
|
||||||
|
One person should go out to the place you plan to trash and take a
|
||||||
|
good look around. He should look for: Doors, cameras, fences, dogs,
|
||||||
|
and the garbage bins. This is to minimize the amount of confusion
|
||||||
|
when you go trashing that night or whenever-the-hell you go.
|
||||||
|
The scout might want to make out a small map of the streets & stuff
|
||||||
|
in the area if the group is unfamiliar with it. You might also want
|
||||||
|
to use it for quick, safe escape routes.
|
||||||
|
|
||||||
|
STEP #3: GATHER EQUIPMENT
|
||||||
|
Here is a brief list of equipment you might want to take along:
|
||||||
|
MAP : Streets, doors, security guards/cameras, garbage bins, etc...
|
||||||
|
CAR : Doors and trunk open (lights off) Liscence Plate Covered
|
||||||
|
While the car is not necessary, it is helpful in quick getaways and
|
||||||
|
is easier than biking or walking.
|
||||||
|
PEOPLE: More than one; Less than six.
|
||||||
|
Almost never go trashing alone. And never bring more than five guys
|
||||||
|
along with you. It's a little obvious when you have six or seven
|
||||||
|
teenage guys with sacks, dark clothing, and flashlights.
|
||||||
|
The recommended group is three, but a duty chart shows more or less:
|
||||||
|
Number of people: 1 2 3 4 5 6
|
||||||
|
Number to search: 1 1 2 3 3 4
|
||||||
|
Number to watch : 0 1 1 1 2 2
|
||||||
|
--- BEST WAY ---: ^
|
||||||
|
EQUIP : Sack (each - nylon recommended as is light & easily washed/hidden)
|
||||||
|
FlashLight (each - with handkerchief)
|
||||||
|
Use the handkerchief to cover the lmght at all times.
|
||||||
|
(Light looks really unusual comming out of a garbage bin at 3am)
|
||||||
|
Sneakers (ratty as possible - it is, afterall, garbage)
|
||||||
|
Dark Clothing (no bright orange or other florecent materials)
|
||||||
|
<+- ADVANCED EQUIPMENT -+>
|
||||||
|
Nitefinder goggles
|
||||||
|
Ski Mask
|
||||||
|
Gloves
|
||||||
|
Walkie Talkies / CB Radio
|
||||||
|
Lockpicks
|
||||||
|
A word on the lockpicks:
|
||||||
|
Lockpicks are very handy to have if the garbage is locked up.
|
||||||
|
BUT DO NOT bring them if you don't know for a fact that there
|
||||||
|
are locks -or- if you don't know how to use them correctly.
|
||||||
|
Should you get caught, you don't want to have attempted breaking
|
||||||
|
and entry and shit like that trying to be pinned on you.
|
||||||
|
Diversion Equipment: Smoke, Gas, Bang, or Flame bombs
|
||||||
|
Bring only that- no pipe bombs, soda can bombs, or harmful stuff
|
||||||
|
like that. If you get caught with that stuff, they get nasty.
|
||||||
|
It is also tempting to level the garbage bin just before you
|
||||||
|
leave, which is not too wise.
|
||||||
|
|
||||||
|
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
|
||||||
|
|
||||||
|
AND NOW, THE EVER PRESENT: DOs and DON'Ts
|
||||||
|
|
||||||
|
|
||||||
|
If you're going advanced trashing, bring along a voltage meter to test fences,
|
||||||
|
doors, and stuff that might be electrically wired or monitored.
|
||||||
|
|
||||||
|
DO NOT go poking around anywhere other than the bins. There are probably
|
||||||
|
silent alarms on the doors and possibly hidden cameras watching those other
|
||||||
|
places you might feel tempted to go poking around.
|
||||||
|
|
||||||
|
DO NOT make a lot of noise. Tipping over the cans and telling dead baby jokes
|
||||||
|
is generally unwise.
|
||||||
|
|
||||||
|
// FILE ABRUPTLY ENDS //
|
||||||
|
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||||
|
|
138
textfiles.com/phreak/TRASHING/trashng.phk
Normal file
138
textfiles.com/phreak/TRASHING/trashng.phk
Normal file
@@ -0,0 +1,138 @@
|
|||||||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||||
|
% %
|
||||||
|
% Better Homes and Trashing %
|
||||||
|
% %
|
||||||
|
% Written by..... The Saint %
|
||||||
|
%%%%%%%%%%%%% %%%%%%%%%%%%%
|
||||||
|
% Thanx to Ares for his help! %
|
||||||
|
% %
|
||||||
|
% June 24, 1987 %
|
||||||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||||
|
|
||||||
|
Intro:
|
||||||
|
|
||||||
|
This file is intended for informational purposes only!!!
|
||||||
|
|
||||||
|
The authors (The Saint and Ares) take no responsibility whatsoever for any
|
||||||
|
actions taken by anyone who reads the contents of this file.
|
||||||
|
|
||||||
|
Primarily, this file will discuss the general idea behind trashing, the risks
|
||||||
|
involved, and some general tips to make your trashing venture successful.
|
||||||
|
|
||||||
|
Basics:
|
||||||
|
|
||||||
|
The basic reasons for trashing can vary, but are generally:
|
||||||
|
|
||||||
|
1> To obtain credit cards and/or carbons of credit cards.
|
||||||
|
2> To obtain any information that may be useful in the aid of phreaking.
|
||||||
|
|
||||||
|
When choosing a place to go trashing, one must keep in mind the following:
|
||||||
|
|
||||||
|
1> Location of dumpster
|
||||||
|
2> Security of property where dumpster is located
|
||||||
|
3> Type of trash that may be found
|
||||||
|
|
||||||
|
First, the location. You generally want to pick a place that is somewhat
|
||||||
|
isolated, where there will not be a lot (preferably none) of people. To
|
||||||
|
accomplish this, it is also best to do your trashing at night, as there will
|
||||||
|
not likely be any employees at the location, and it is easier to hide and to
|
||||||
|
not be seen by passers-by.
|
||||||
|
|
||||||
|
Second, the security. Places such as Telco buildings and large companies
|
||||||
|
often have security guards on duty 24 hours, and often keep their dumpsters
|
||||||
|
behind fences so as to discourage trespassing. Yes, you are trespassing when
|
||||||
|
you start looking in someone's garbage can!!! So it is a good idea to check
|
||||||
|
out the place you are going to trash for a day or so to get a feel for what
|
||||||
|
kind of security they have. This way, you can avoid walking in blindly to some
|
||||||
|
place and getting nabbed, or you can figure out where to park your car, or
|
||||||
|
where to hide, or how to avoid the security (rent-a-cops).
|
||||||
|
|
||||||
|
Places such as department stores and banks most likely will not have any
|
||||||
|
security for the outside of their buildings as they may not be able to afford
|
||||||
|
it or may not anticipate trashers. Also, they may not have anything worth
|
||||||
|
taking! So basically, check the place out before you just go and hit it.
|
||||||
|
|
||||||
|
Case in point. One night, my friend and I casually pulled into the parking
|
||||||
|
lot of a Pacific Bell office, and before we knew what was happening, a security
|
||||||
|
guard had a giant spotlight glaring down on us. We just casually made a u-turn
|
||||||
|
as if we were just turning around to go the other way. (More on what to do if
|
||||||
|
you get caught later).
|
||||||
|
|
||||||
|
Third, you must pick a place where you know there will be trash that is of
|
||||||
|
use to you. Don't go trashing at some little deli, all you'll get is a bunch
|
||||||
|
of rotten food! (Unless of course you know for a fact that the deli deals alot
|
||||||
|
with credit cards). In searching for cards, pick places such as department
|
||||||
|
stores or places that sell alot of expensive stuff.
|
||||||
|
|
||||||
|
Also, the local telephone company is, of course the place to go to find your
|
||||||
|
basic phreaking info.
|
||||||
|
|
||||||
|
These have been some of the basics to keep in mind before you hit aplace.
|
||||||
|
Now for some techniques to use to help increase the efficiency of your trashing
|
||||||
|
endeavors.
|
||||||
|
|
||||||
|
Tips:
|
||||||
|
|
||||||
|
First of all, don't be afraid to actually go into the trash can. This is
|
||||||
|
almost always necessary to reach the good stuff. Also, when you are ducking
|
||||||
|
down inside a big dumpster, you cannot be seen by passing police cars or
|
||||||
|
security guards who happen to waltz by.
|
||||||
|
|
||||||
|
Second, always have a lookout somewhere to keep an eye out for cops or
|
||||||
|
employees who may be coming out to throw trash away. You may want to have some
|
||||||
|
kind if signal so that if you have advanced warning of security, you can take
|
||||||
|
evasive measures, like burying yourself in the trash.
|
||||||
|
|
||||||
|
Try not to spend too long in a given trash can. The longer you stay, the
|
||||||
|
more you put yourself at risk of getting caught. This means that you cannot be
|
||||||
|
too picky about what trash you take. There is plenty of time for that after
|
||||||
|
you bail the scene with the goods. You may want to have a knife handy,
|
||||||
|
however, to cut open boxes or bags, and a small flashlight is a good idea,
|
||||||
|
although if possible, avoid using to much light or making too much noise,
|
||||||
|
anything that could potentially attract someone.
|
||||||
|
|
||||||
|
A car is a good thing to have, if possible. This greatly increases the range
|
||||||
|
of places you can hit in one night. It is a good idea, if you are accumulating
|
||||||
|
alot of stuff, to stop somewhere secluded and well lit (like a school or empty
|
||||||
|
shopping center) and sort out the trash so you can get rid of useless garbage
|
||||||
|
like food, etc. Take all the useless garbage and dump it into another
|
||||||
|
dumpster.
|
||||||
|
|
||||||
|
You may want to wear old clothes that can get messed up, and gloves are not a
|
||||||
|
bad idea either, both to keep your hands clean, and to keep prints off of
|
||||||
|
anything in case the place discovers what you have done.
|
||||||
|
|
||||||
|
What to do if you get caught:
|
||||||
|
|
||||||
|
This is perhaps the most important thing to keep in mind when trashing. What
|
||||||
|
to do if you happen to be caught be someone and they want to know what you are
|
||||||
|
doing.
|
||||||
|
|
||||||
|
If you can, run like hell! Only do this if you have a clean getaway and you
|
||||||
|
think you can get away without too much problem. Keep in mind that trying to
|
||||||
|
escape may only make your situation worse. Only run if it looks like they are
|
||||||
|
gonna bust you.
|
||||||
|
|
||||||
|
In most cases, the people may just tell you to get out. They will probably
|
||||||
|
ask you some dumb questions, like "What are you doing in the trash?" In this
|
||||||
|
case, make up a story, like "Oh, my friend here threw a ball in here and I was
|
||||||
|
looking for it." If the guard believes you, he will probably just tell you to
|
||||||
|
get out with a strong warning.
|
||||||
|
|
||||||
|
If they are serious about nailing you, however, chances are you'll only get
|
||||||
|
charged with trespassing, which is not a major crime. In any case, however,
|
||||||
|
maintain an extremely high level of caution when trashing, and always remain
|
||||||
|
calm and collected. You can usually bullshit your way out of just about
|
||||||
|
anything if you play your cards right.
|
||||||
|
|
||||||
|
Hope this has helped you to gain some insight into how to go about gaining
|
||||||
|
that valuable information you always wanted.
|
||||||
|
|
||||||
|
Look for more informative files in the future from Better Homes and Anarchy.
|
||||||
|
And if you have any comments or anything to add, you can get hold of me on the
|
||||||
|
Electric Kingdom at (619) 484-5243. Please upload this to many BBS's around
|
||||||
|
the country to help your phellow phreakers!
|
||||||
|
|
||||||
|
The Saint
|
||||||
|
Lunatic Labs (415) 278-7421
|
||||||
|
|
58
textfiles.com/phreak/TRASHING/trshdisk.ana
Normal file
58
textfiles.com/phreak/TRASHING/trshdisk.ana
Normal file
@@ -0,0 +1,58 @@
|
|||||||
|
*************************************************
|
||||||
|
* *
|
||||||
|
* BASICS OF TRASHING *
|
||||||
|
* PART I *
|
||||||
|
* *
|
||||||
|
* BY:THE GRIM TRASHER *
|
||||||
|
* *
|
||||||
|
*************************************************
|
||||||
|
|
||||||
|
IN THIS ARTICLE I WILL COVER THE VERY FIRST STEPS OF TRASHING. THE TRASHING
|
||||||
|
METHOD IS VERY SIMPLE SO I DO IT ALL THE TIME. HERE ARE THE STEPS:
|
||||||
|
|
||||||
|
STEP I:FIRST YOU TAKE A DISK YOU WANT TO TRASH AND BRING IT OVER TO THE
|
||||||
|
COMPUTER. THE DISK SHOULD HAVE SOMTHING VERY *IMPORTANT* ON IT (LIKE SOMTHING
|
||||||
|
YOU HAVE BEEN WORKING ON FOR 3 YEARS) OR A DISK THAT COST ABOUT $500.
|
||||||
|
|
||||||
|
WHEN YOU BRING THE DISK TO TRASH OVER TO THE COMPUTER *BE SURE* TO HOLD IN THE
|
||||||
|
*DISK PART*!
|
||||||
|
|
||||||
|
STEP II:THERE ARE A LOT OF WAYS TO TRASH A DISK BUT
|
||||||
|
|
||||||
|
HERE ARE A FEW TO GET THING GOING:
|
||||||
|
|
||||||
|
1--PUT THE DISK IN THE DRIVE AND GET TO COMMAND LEVEL THEN TYPE 'INIT'.
|
||||||
|
2--PUT A MAGNET TO THE *DISK PART*.
|
||||||
|
3--SET ON TOP OF THE DRIVE OR MONITOR AND LEAVE THERE FOR 1 HOUR.
|
||||||
|
4--TAKE SOMETHING SHARP LIKE A PENCIL ORKNIFE AND START TO SCRATCH THE SURFACE
|
||||||
|
OF THE DISK NICE AND HARD.
|
||||||
|
|
||||||
|
NOTE:YOU CAN USE MANY OF THESE TRASHINw TECHNIQUES TO MAKE ONE *ULTIMATE
|
||||||
|
TRASH!!*
|
||||||
|
|
||||||
|
CLASSIC TRASH--PUT THE DISK IN THE MICRO-WAVE!!
|
||||||
|
|
||||||
|
|
||||||
|
STEP III:WHEN YOU ARE ALL DONE WITH THE TRASHING PROCESS THEN LEAVE THE DISK
|
||||||
|
LAY IN A NICE DUST PILE AND BURY IT.COME BACK IN ABOUT 2 HOURS AND THE
|
||||||
|
|
||||||
|
TRASHING PROCESS IS COMPLETE!!
|
||||||
|
|
||||||
|
|
||||||
|
IN MY NEXT ARTICLES I WILL COVER THE MORE ADVANCED METHODS OF TRASHING BUT FOR
|
||||||
|
NOW JUST:
|
||||||
|
|
||||||
|
|
||||||
|
***K E E P O N T R A S H I N G***
|
||||||
|
|
||||||
|
|
||||||
|
NOTE:IF YOU OR ANY ONE OF YOUR FRIENDS WANT TO KNOW MORE ON TRASHING CALL MY
|
||||||
|
HOT-LINE AT:50-MAD-TRASH OR:62-EL-TRASHO.<-LOCAL NUMBER
|
||||||
|
|
||||||
|
|
||||||
|
THE ONE AND ONLY,
|
||||||
|
|
||||||
|
THE GRIM TRASHER
|
||||||
|
|
||||||
|
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||||
|
|
44
textfiles.com/phreak/VOICEMAIL.1
Normal file
44
textfiles.com/phreak/VOICEMAIL.1
Normal file
@@ -0,0 +1,44 @@
|
|||||||
|
<HTML>
|
||||||
|
<TITLE>T E X T F I L E S</TITLE>
|
||||||
|
<BODY BGCOLOR="#000000" TEXT="#00FF00" LINK="#00FF00" ALINK="#00AA00" VLINK="#00AA00">
|
||||||
|
<H1>Phone Phreaking: Voice Mail</H1>
|
||||||
|
<P>
|
||||||
|
<TABLE WIDTH=100%>
|
||||||
|
<TD BGCOLOR=#00FF00><FONT COLOR=#000000><B>Filename</B><BR></FONT></TD>
|
||||||
|
<TD BGCOLOR=#00DD00><FONT COLOR=#000000><B>Size</B><BR></FONT></TD>
|
||||||
|
<TD BGCOLOR=#00AA00><FONT COLOR=#000000><B>Description of the Textfile</B><BR></TD></TR>
|
||||||
|
|
||||||
|
<tab indent=60 id=T><br>
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/3rdpart1.txt">3rdpart1.txt</A> <tab to=T><TD> 5385<BR><TD> 3rd Party Fraud and Voicemail Systems
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/800vms.txt">800vms.txt</A> <tab to=T><TD> 1020<BR><TD> 1-800 Voice Mail Extenders
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/amhack.txt">amhack.txt</A> <tab to=T><TD> 12372<BR><TD> Hacking Answering Machines 1990 by Predat0r of the Blitzkrieg BBS
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/anmchhak.txt">anmchhak.txt</A> <tab to=T><TD> 1233<BR><TD> Hacking AT&T Answering Machines by old Buzzard (September 14, 1995)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/ans_exc.txt">ans_exc.txt</A> <tab to=T><TD> 2319<BR><TD> Answering Machine Stopper Gadger, by Jon Sreekanth
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/ansmache.xcl">ansmache.xcl</A> <tab to=T><TD> 3653<BR><TD> Making an Answering Machine Stopper Gadget by Jon Sreekanth (January 25, 1993)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/aspentut.txt">aspentut.txt</A> <tab to=T><TD> 8040<BR><TD> A Tutorial of Aspen Voice Mailbox Systems, by Slycath
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/at&t.txt">at&t.txt</A> <tab to=T><TD> 1234<BR><TD> Hacking AT&T Answering Machines Quick and Dirty by oleBuzzard (September 14, 1995)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/audexvp.txt">audexvp.txt</A> <tab to=T><TD> 19656<BR><TD> Hacking Guide to the Audex Voice Power, by Crazybyte
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/cinditut.txt">cinditut.txt</A> <tab to=T><TD> 12608<BR><TD> The CINDI (Voicemail System) Tutorial
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/hack6">hack6</A> <tab to=T><TD> 5241<BR><TD> Hacking Voice Mail Systems
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/hackam1990.txt">hackam1990.txt</A> <tab to=T><TD> 13065<BR><TD> Hacking Answering Machines in 1990 by Predat0r of Blitzkrieg BBS
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/hackvmb.txt">hackvmb.txt</A> <tab to=T><TD> 10057<BR><TD> Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/lol12.txt">lol12.txt</A> <tab to=T><TD> 10698<BR><TD> Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/phonhack.txt">phonhack.txt</A> <tab to=T><TD> 17674<BR><TD> Hacking Telephone Answering Machines by Doctor Pizz and Cybersperm
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/phreak8">phreak8</A> <tab to=T><TD> 5385<BR><TD> 3rd Party Calling and Voicemail Information
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/tollfree.txt">tollfree.txt</A> <tab to=T><TD> 1314<BR><TD> A Collection of Toll-Free Answering Services
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/unt-att1.txt">unt-att1.txt</A> <tab to=T><TD> 2610<BR><TD> Hacking AT&T Answering Machines by Aoflex of Karma Sutra
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmb.rl">vmb.rl</A> <tab to=T><TD> 3505<BR><TD> Renegade Legion Presents: Voice Mailbox Hacking by The Knight
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmb.txt">vmb.txt</A> <tab to=T><TD> 3296<BR><TD> Voice Mail Made Easy by Hagar of Phantom Networks
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmb_smc.txt">vmb_smc.txt</A> <tab to=T><TD> 15681<BR><TD> On the Essentials of Voice Mail Hacking by the Kryptic Night of SMC
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbh-rl.txt">vmbh-rl.txt</A> <tab to=T><TD> 3508<BR><TD> Renegade Legion Technical Reports: Voice Mail Box Hacking, by The Knight (February 1991)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbhack.hac">vmbhack.hac</A> <tab to=T><TD> 3918<BR><TD> Voice Mailbox Hacking, by the Knight of the Renegade Legion
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbhack.txt">vmbhack.txt</A> <tab to=T><TD> 2764<BR><TD> Zod's Voice Mailbox Hacker Doxs
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbhaq.txt">vmbhaq.txt</A> <tab to=T><TD> 32929<BR><TD> Voice Mail Hacking by Road Kill (March/April, 1994)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmblol.txt">vmblol.txt</A> <tab to=T><TD> 13996<BR><TD> Voice Mailbox Hacking by the Legions of Lucifer (1990)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbrl.txt">vmbrl.txt</A> <tab to=T><TD> 3920<BR><TD> Voice Mailbox Hacking by The Knight of Renegade Legion
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbs1.txt">vmbs1.txt</A> <tab to=T><TD> 3071<BR><TD> Voice Mail Boxes
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbzan.hac">vmbzan.hac</A> <tab to=T><TD> 4774<BR><TD> How to Have Your Own Voice Mailbox, by The Exorcist (July 24, 1991)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmx.txt">vmx.txt</A> <tab to=T><TD> 1101<BR><TD> Toll-Free Answering Services
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/voicmail.txt">voicmail.txt</A> <tab to=T><TD> 3753<BR><TD> Using Voice Mail on the Inner Sanctum by Jesters
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/xvmecinf.txt">xvmecinf.txt</A> <tab to=T><TD> 904<BR><TD> Xerox Voice Message Exchange Commands by The Lineman (August, 1986)
|
||||||
|
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 32 files for a total of 230,684 bytes.</SMALL></TABLE>
|
44
textfiles.com/phreak/VOICEMAIL/.windex.html
Normal file
44
textfiles.com/phreak/VOICEMAIL/.windex.html
Normal file
@@ -0,0 +1,44 @@
|
|||||||
|
<HTML>
|
||||||
|
<TITLE>T E X T F I L E S</TITLE>
|
||||||
|
<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#000000" ALINK="#004400" VLINK="#004400">
|
||||||
|
<H1>Phone Phreaking: Voice Mail</H1>
|
||||||
|
<P>
|
||||||
|
<TABLE WIDTH=100%>
|
||||||
|
<TD BGCOLOR=#000000><FONT COLOR=#FFFFFF><B>Filename</B><BR></FONT></TD>
|
||||||
|
<TD BGCOLOR=#002200><FONT COLOR=#FFFFFF><B>Size</B><BR></FONT></TD>
|
||||||
|
<TD BGCOLOR=#004400><FONT COLOR=#FFFFFF><B>Description of the Textfile</B><BR></TD></TR>
|
||||||
|
|
||||||
|
<tab indent=60 id=T><br>
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="3rdpart1.txt">3rdpart1.txt</A> <tab to=T><TD> 5385<BR><TD> 3rd Party Fraud and Voicemail Systems
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="800vms.txt">800vms.txt</A> <tab to=T><TD> 1020<BR><TD> 1-800 Voice Mail Extenders
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="amhack.txt">amhack.txt</A> <tab to=T><TD> 12372<BR><TD> Hacking Answering Machines 1990 by Predat0r of the Blitzkrieg BBS
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="anmchhak.txt">anmchhak.txt</A> <tab to=T><TD> 1233<BR><TD> Hacking AT&T Answering Machines by old Buzzard (September 14, 1995)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ans_exc.txt">ans_exc.txt</A> <tab to=T><TD> 2319<BR><TD> Answering Machine Stopper Gadger, by Jon Sreekanth
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ansmache.xcl">ansmache.xcl</A> <tab to=T><TD> 3653<BR><TD> Making an Answering Machine Stopper Gadget by Jon Sreekanth (January 25, 1993)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="aspentut.txt">aspentut.txt</A> <tab to=T><TD> 8040<BR><TD> A Tutorial of Aspen Voice Mailbox Systems, by Slycath
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="at&t.txt">at&t.txt</A> <tab to=T><TD> 1234<BR><TD> Hacking AT&T Answering Machines Quick and Dirty by oleBuzzard (September 14, 1995)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="audexvp.txt">audexvp.txt</A> <tab to=T><TD> 19656<BR><TD> Hacking Guide to the Audex Voice Power, by Crazybyte
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cinditut.txt">cinditut.txt</A> <tab to=T><TD> 12608<BR><TD> The CINDI (Voicemail System) Tutorial
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hack6">hack6</A> <tab to=T><TD> 5241<BR><TD> Hacking Voice Mail Systems
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackam1990.txt">hackam1990.txt</A> <tab to=T><TD> 13065<BR><TD> Hacking Answering Machines in 1990 by Predat0r of Blitzkrieg BBS
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackvmb.txt">hackvmb.txt</A> <tab to=T><TD> 10057<BR><TD> Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lol12.txt">lol12.txt</A> <tab to=T><TD> 10698<BR><TD> Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phonhack.txt">phonhack.txt</A> <tab to=T><TD> 17674<BR><TD> Hacking Telephone Answering Machines by Doctor Pizz and Cybersperm
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phreak8">phreak8</A> <tab to=T><TD> 5385<BR><TD> 3rd Party Calling and Voicemail Information
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tollfree.txt">tollfree.txt</A> <tab to=T><TD> 1314<BR><TD> A Collection of Toll-Free Answering Services
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="unt-att1.txt">unt-att1.txt</A> <tab to=T><TD> 2610<BR><TD> Hacking AT&T Answering Machines by Aoflex of Karma Sutra
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmb.rl">vmb.rl</A> <tab to=T><TD> 3505<BR><TD> Renegade Legion Presents: Voice Mailbox Hacking by The Knight
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmb.txt">vmb.txt</A> <tab to=T><TD> 3296<BR><TD> Voice Mail Made Easy by Hagar of Phantom Networks
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmb_smc.txt">vmb_smc.txt</A> <tab to=T><TD> 15681<BR><TD> On the Essentials of Voice Mail Hacking by the Kryptic Night of SMC
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbh-rl.txt">vmbh-rl.txt</A> <tab to=T><TD> 3508<BR><TD> Renegade Legion Technical Reports: Voice Mail Box Hacking, by The Knight (February 1991)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbhack.hac">vmbhack.hac</A> <tab to=T><TD> 3918<BR><TD> Voice Mailbox Hacking, by the Knight of the Renegade Legion
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbhack.txt">vmbhack.txt</A> <tab to=T><TD> 2764<BR><TD> Zod's Voice Mailbox Hacker Doxs
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbhaq.txt">vmbhaq.txt</A> <tab to=T><TD> 32929<BR><TD> Voice Mail Hacking by Road Kill (March/April, 1994)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmblol.txt">vmblol.txt</A> <tab to=T><TD> 13996<BR><TD> Voice Mailbox Hacking by the Legions of Lucifer (1990)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbrl.txt">vmbrl.txt</A> <tab to=T><TD> 3920<BR><TD> Voice Mailbox Hacking by The Knight of Renegade Legion
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbs1.txt">vmbs1.txt</A> <tab to=T><TD> 3071<BR><TD> Voice Mail Boxes
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbzan.hac">vmbzan.hac</A> <tab to=T><TD> 4774<BR><TD> How to Have Your Own Voice Mailbox, by The Exorcist (July 24, 1991)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmx.txt">vmx.txt</A> <tab to=T><TD> 1101<BR><TD> Toll-Free Answering Services
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="voicmail.txt">voicmail.txt</A> <tab to=T><TD> 3753<BR><TD> Using Voice Mail on the Inner Sanctum by Jesters
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="xvmecinf.txt">xvmecinf.txt</A> <tab to=T><TD> 904<BR><TD> Xerox Voice Message Exchange Commands by The Lineman (August, 1986)
|
||||||
|
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 32 files for a total of 230,684 bytes.</SMALL></TABLE>
|
103
textfiles.com/phreak/VOICEMAIL/3rdpart1.txt
Normal file
103
textfiles.com/phreak/VOICEMAIL/3rdpart1.txt
Normal file
@@ -0,0 +1,103 @@
|
|||||||
|
|
||||||
|
3RD PARTY FRAUD & VOICE MAIL SYSTEMS
|
||||||
|
============================================================================
|
||||||
|
|
||||||
|
3rd Party Dialing was first brought to my attention when it was listed
|
||||||
|
on my telephone bill. I was billed by some person(s) without my authorization.
|
||||||
|
This happened about 3 times on the same bill, and all of the times I got the
|
||||||
|
charges dropped.
|
||||||
|
|
||||||
|
A few weeks later, after paging through the telephone book for downtown
|
||||||
|
prefixes, I noticed information on 3rd Party Calling, which included:
|
||||||
|
|
||||||
|
HOW TO PLACE 0+ CALLS
|
||||||
|
|
||||||
|
Third-Number Calls
|
||||||
|
|
||||||
|
1. Dial "0" + Area Code (if needed) + telephone number.
|
||||||
|
|
||||||
|
2. If you hear a tone, ignore it, and a billing operator will come
|
||||||
|
on the line.
|
||||||
|
|
||||||
|
3. Tell the operator you are placing a third number billed called.
|
||||||
|
|
||||||
|
4. Give the Area Code and telephone number you with the charges billed to.
|
||||||
|
|
||||||
|
5. The operator will call that number to verify acceptance of the charges
|
||||||
|
on calls from coin pay phones. No verification on calls from
|
||||||
|
non-coin pay phones.
|
||||||
|
|
||||||
|
The line that caught my eye was like #5. This line pointed out that calls
|
||||||
|
from pay phones had to be verified, while non pay phones needed no
|
||||||
|
verification.
|
||||||
|
|
||||||
|
With experience, I found out that sometimes there is nothing a person can do
|
||||||
|
about unauthorized 3rd Party Calls billed to a another person's number. A lot
|
||||||
|
of the times, the operator you call to complain to will simply tell you there's
|
||||||
|
nothing they can do.
|
||||||
|
|
||||||
|
With this in mind, I realized that you could bill a call to anybody's number
|
||||||
|
and get away with it, and no charges directed to you. Although, as many of you
|
||||||
|
know by now...this not safe. For one, you are directing attention to yourself
|
||||||
|
as a Fraudist/Phreak. Secondly, on the person's bill that your billed the 3rd
|
||||||
|
Party Call to...that person has your number and where you called. Bell can
|
||||||
|
also use that information to take action if they feel it necessary.
|
||||||
|
|
||||||
|
One alternative would be to complete a 3rd Party Billed Call from a pay
|
||||||
|
phone. This however brings up a question. Who is going to accept the charges
|
||||||
|
if you don't want to pay for it in any way?
|
||||||
|
|
||||||
|
Here is what I came up with for 3rd Party Calling Fraud:
|
||||||
|
|
||||||
|
First, you need a (VMS) Voice Mail System/Box. You need a Centragram or
|
||||||
|
PhoneMail type VMS to handle the call. The reason you need these types of
|
||||||
|
VMS's, is because Centragram/PhoneMail type VMS's are direct dial. You don't
|
||||||
|
have to enter a process extension number such as 8509. These types of VMS's
|
||||||
|
bring you directly to the box.
|
||||||
|
|
||||||
|
You don't know what Voice Mail Systems are? Look for a file. But, here's a
|
||||||
|
layman's description of VMS's. You can say that VMS's are distance answering
|
||||||
|
services. They are usually set up in other prefixes you can dial in/directly
|
||||||
|
on to. They include instructions on how to use them, and have system
|
||||||
|
passwords. In respect, they are electronic mail devices...only they use voice
|
||||||
|
communications instead. You can find these by scanning, if you have one local.
|
||||||
|
|
||||||
|
Anyways, having a VMS handy...reset your System Greeting to say: "HELLO"
|
||||||
|
Pause for approximately 5-6 seconds...then say casually, "YEAH SURE."
|
||||||
|
In between the HELLO and YEAH SURE, the billing operator will say something
|
||||||
|
like, "JOHN DOE IS BILLING A CALL TO YOUR NUMBER, WILL YOU ACCEPT THE CHARGES?"
|
||||||
|
|
||||||
|
Now go to a pay phone and dial any number anywhere you want, in this
|
||||||
|
format: 0+612+555+1212. Ignore the tone you hear for calling card holders,
|
||||||
|
and wait for an operator to come on. The operator will announce her/his-self
|
||||||
|
as a billing operator and ask you how he/she can help you on billing the call.
|
||||||
|
Tell the operator, "THIS IS A 3RD PARTY CALL, MY NAME IS JOHN." Include a last
|
||||||
|
name if you wish, but it's not necessary. No real names of course also. The
|
||||||
|
operator will call the VMS and he/she will hear the previous recording of you
|
||||||
|
saying "HELLO" etc.
|
||||||
|
|
||||||
|
After the operator hears an affirmative from the VMS...the operator will say
|
||||||
|
thank you, then put the call through. The only person that gets billed for
|
||||||
|
the call is the business/person that owns the VMS that you used by hacking the
|
||||||
|
default password.
|
||||||
|
|
||||||
|
I've found out that you can dial overseas, and anywhere in the United States
|
||||||
|
this way, with no problems or bad connections. If you have a portable computer
|
||||||
|
with an acoustic couple...you can go online. It would be suggested to do this
|
||||||
|
in a car, so as not to draw attention during the day. I've tried to set up a
|
||||||
|
conference by the 800 Conference Operator and requesting to set up a
|
||||||
|
conference. You have to give her the person's numbers and names you want to
|
||||||
|
conference with...and the number you want to conference billed to. The
|
||||||
|
operator will verify this if you are at a pay phone. I have figured out what
|
||||||
|
the Conference Operator asked the 3rd Party as of yet...to time the responses
|
||||||
|
preset on the VMS, but if anyone can, it would prove to be very useful.
|
||||||
|
|
||||||
|
Another technique might be to bill 976's to your VMS if you into that.
|
||||||
|
Again, you need to attempt to time the perfect responses to the operator's
|
||||||
|
questions to the 3rd Party.
|
||||||
|
|
||||||
|
*A Word of Warning*: In most cases, the Operator you handle the 3rd party
|
||||||
|
call with will stay on the line. So it's good to have a conversation with
|
||||||
|
yourself on the VMS for about 30 seconds after connection if you are making a
|
||||||
|
collect call to the VMS.
|
||||||
|
|
31
textfiles.com/phreak/VOICEMAIL/800vms.txt
Normal file
31
textfiles.com/phreak/VOICEMAIL/800vms.txt
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
|
||||||
|
1-800 Voice Mail Systems
|
||||||
|
|
||||||
|
|
||||||
|
1-800-222-5275 VMS
|
||||||
|
1-800-222-9825 VMS Box:[9]+3 DIGITS
|
||||||
|
1-800-228-6423 VoiceBank Box:[4] *Another Dialup for 88-Voice*
|
||||||
|
1-800-262-8477 UniSys Answering Service Box:[4]
|
||||||
|
1-800-284-6245 Meridian Mail
|
||||||
|
1-800-323-3433 VMS
|
||||||
|
1-800-323-4555 Dexter Midland Box:[3]
|
||||||
|
1-800-323-3938 VMS Box:[4]
|
||||||
|
1-800-325-5554 VMS Box:[4]
|
||||||
|
1-800-331-1763 INNOVATIVE SOFTWARE BOX:[4]
|
||||||
|
1-800-333-6245 PHONE MAIL SYSTEM
|
||||||
|
1-800-342-6245 PHONE MAIL SYSTEM
|
||||||
|
1-800-346-5104 SECURITY LINK AND TELELINK BOX:[3]
|
||||||
|
1-800-423-7574 VMBS BOX:[4]
|
||||||
|
1-800-437-6100 PHONE MAIL SYSTEM
|
||||||
|
1-800-445-6245 PHONE MAIL SYSTEM
|
||||||
|
1-800-521-6245 VMBS
|
||||||
|
1-800-541-0641 VMBS BOX:[2]
|
||||||
|
1-800-545-6245 VMBS ID:[7], PASS:[8]
|
||||||
|
1-800-631-1146 VMBS
|
||||||
|
1-800-654-8692 SECURITY CN LIFE INSURANCE BOX:[4]
|
||||||
|
1-800-662-6245 VOICE MESSAGE EXCHANGE
|
||||||
|
1-800-678-6245 VMBS
|
||||||
|
1-800-759-5000 INGRAM SWITCHBOARD BOX:[4]
|
||||||
|
1-800-777-6245 MCI MAIL ID:[5], BOX:[7]
|
||||||
|
1-800-847-6181 WESTERN DIGITAL BOX:[4]
|
||||||
|
|
257
textfiles.com/phreak/VOICEMAIL/amhack.txt
Normal file
257
textfiles.com/phreak/VOICEMAIL/amhack.txt
Normal file
@@ -0,0 +1,257 @@
|
|||||||
|
|
||||||
|
|
||||||
|
*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
|
||||||
|
Hacking Answering Machines 1990
|
||||||
|
*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
|
||||||
|
by: Predat0r of Blitzkrieg Bbs 502/499-8933
|
||||||
|
|
||||||
|
|
||||||
|
AT&T reports that in the year 1990, 11 million people
|
||||||
|
will buy an answering machine for their home use. In 1989, 10
|
||||||
|
million machines were sold. Everyone has called up a person
|
||||||
|
at one time or another and got the old "leave your name at
|
||||||
|
the beep" message. With this increase in homes using these
|
||||||
|
machines there is also a new form of hacking developing. One
|
||||||
|
of hacking an answering machine.
|
||||||
|
|
||||||
|
Why would anyone even want to hack an answering machine
|
||||||
|
and for what purpose? There are many reasons and things you
|
||||||
|
can do once you have control of someone elses machine. If for
|
||||||
|
some reason you need to spy on a business or person you can
|
||||||
|
hack their machine and take control using the information for
|
||||||
|
your own personal use. There is also the old "change the
|
||||||
|
message" secret to make it say something to the effect of
|
||||||
|
this line accepts all toll charges so you can bill third
|
||||||
|
party calls to that number. You can also use an answering
|
||||||
|
machine for your own personal use, as in making it your own
|
||||||
|
voice mail type system for people to call. Only do this if
|
||||||
|
you know someone is out of town. If they come home from
|
||||||
|
shopping and find their machine changed it might cause
|
||||||
|
problems. With these basic ideas in mind you can see hacking
|
||||||
|
an answering machine could be very useful to certain
|
||||||
|
individuals.
|
||||||
|
|
||||||
|
How can a person hack an answering machine? Well most
|
||||||
|
answering machines built now have remote access features
|
||||||
|
which allow the owner, or anyone to call in and press a
|
||||||
|
security code to play their messages. This is where the fun
|
||||||
|
begins. Some older models don't have remote access so you
|
||||||
|
cannot do anything to them. Also if you know someone has a
|
||||||
|
machine but you call and it doesn't answer, let the phone
|
||||||
|
ring about 15 times. This will tell the machine to turn
|
||||||
|
itself on, so you can hack it. The actual number varies
|
||||||
|
between machines.
|
||||||
|
|
||||||
|
To practice hacking some machines i will show you how to
|
||||||
|
get remote access on a few models. Just look and see what
|
||||||
|
kind your friend has and hack it for starters.
|
||||||
|
|
||||||
|
Record a Call- Model 2120
|
||||||
|
-------------------------
|
||||||
|
Call in and during the message or after the beep tone to
|
||||||
|
leave a message enter the 3 digit security code. Which you
|
||||||
|
must find yourself. This will rewind the tape and play all
|
||||||
|
new messages. Press 2 to backspace and repeat the last
|
||||||
|
message. Press 3 to fast foward the tape.
|
||||||
|
|
||||||
|
Changing your message from remote. Call your phone and enter
|
||||||
|
the secret code. After several rapid beeps enter your secret
|
||||||
|
code again. After a short delay you will hear a long tone.
|
||||||
|
After the tone ends begin speaking your message which may be
|
||||||
|
17 seconds in length. When finished press the second digit of
|
||||||
|
your secret code to end. The machine will then save your
|
||||||
|
message and play it back. To turn the unit on from remote let
|
||||||
|
it ring 11 times then hangup. Or stay on and it will answer
|
||||||
|
so you can access the machine. For express calls or frequent
|
||||||
|
calls hit the second digit for two seconds to skip the out
|
||||||
|
going message announcement.
|
||||||
|
|
||||||
|
Goldstar- Models 6000/6100
|
||||||
|
--------------------------
|
||||||
|
Call and enter your 1 digit secret code after you hear the
|
||||||
|
out going message announcement. The machine will then play
|
||||||
|
back new messages. Hangup to save messages or after all
|
||||||
|
messages have been played the machine will give a double
|
||||||
|
beeptone, you may enter your code to erase all messages.
|
||||||
|
You cannot change the out going message on this unit.
|
||||||
|
|
||||||
|
Cobra- Model AN-8521
|
||||||
|
--------------------
|
||||||
|
For this machine there are 2 codes. Both are one digit in
|
||||||
|
length. The first one is the play code. The second is to
|
||||||
|
erase messages from remote. After the outgoing message and
|
||||||
|
beeptone press the play code for 2 seconds to play messages.
|
||||||
|
After each message ends there will be a single beep. At the
|
||||||
|
end of all message it will beep twice. You may then do the
|
||||||
|
following. Replay by pressing the play code again. Erase
|
||||||
|
messages by pressing the erase code. Hang-up and save
|
||||||
|
messages and continue to take additional calls. To turn this
|
||||||
|
unit on from remote you must let it ring 16 times before it
|
||||||
|
will activate. If it rings 10 times then you hear 3 beeps it
|
||||||
|
is full and messages need to be erased.
|
||||||
|
|
||||||
|
Uniden- Model AM 464
|
||||||
|
--------------------
|
||||||
|
This model is one of the more advanced when it comes to
|
||||||
|
remote capabilities. The factory preset security code is 747.
|
||||||
|
This can be changed to as many as five digits of your choice.
|
||||||
|
To gain access from remote type your security code while the
|
||||||
|
outgoing message is playing. Press 1 after hearing the tone
|
||||||
|
and the machine will rewind and play your messages. To fast
|
||||||
|
foward press 7, to resume normal playback press 8. To stop
|
||||||
|
the messages from playing press 8 again. Press 8 to restart
|
||||||
|
the messages or 1 to start from the beginning again. Press 9
|
||||||
|
to rewind and 8 to resume playing. If you rewind all the way
|
||||||
|
it will beep twice. You need to press 1 to play messages.To
|
||||||
|
save messages press 4. To erase press 6. To turn the machine
|
||||||
|
off from remote press 5 after all messages have been played
|
||||||
|
and the machine beeps twice. To turn the machine on from
|
||||||
|
remote let the phone ring 12 to 14 times. The machine will
|
||||||
|
beep and then you enter your remote code. This will then turn
|
||||||
|
your machine to answer mode. This machine also has room
|
||||||
|
monitor options. This allows you to listen to what is going
|
||||||
|
on in the room of the machine. To do this call the machine
|
||||||
|
enter your security code after the beep press 0. The monitor
|
||||||
|
stays on for 60 seconds. You will be warned with 2 beeps at
|
||||||
|
45 seconds. To continue press 0 again.To change the outgoing
|
||||||
|
message from remote erase all the messages. Then call back
|
||||||
|
and enter your code after the tone press 3. It will beep
|
||||||
|
again and you may then leave your new message. Press 3 when
|
||||||
|
finished. To change the security code from remote after the
|
||||||
|
beep press # then 1 after the next beep enter your new code
|
||||||
|
followed by the # again. There is also a call break through
|
||||||
|
where you enter 256 while the outgoing message is playing.
|
||||||
|
This will alarm the persons in the house someone is calling
|
||||||
|
with a series of loud beeps. Press the * key to stop.
|
||||||
|
|
||||||
|
Code-a-phone Model 930
|
||||||
|
----------------------
|
||||||
|
To access from remote call and enter your security code after
|
||||||
|
the announcement and tone. Press your code for 3 full
|
||||||
|
seconds. After the new messages have been played you will
|
||||||
|
hear 2 tones. You may then save messages by pressing your
|
||||||
|
code then hanging up. repeat by entering code wait for 4
|
||||||
|
tones then enter code again. To erase message hangup when the
|
||||||
|
tape is done playing. To turn the machine on from remote call
|
||||||
|
and let ring ten times. When the system answers it will have
|
||||||
|
a two second tone. Press your security code. You will hear
|
||||||
|
three double tones to let you know the system is on.
|
||||||
|
|
||||||
|
Unisonic- Model 8720
|
||||||
|
--------------------
|
||||||
|
One digit code entered after the outgoing message and tone
|
||||||
|
will allow you to hear messages. To change message wait till
|
||||||
|
all new messages have been played 2 beep tones will be heard.
|
||||||
|
Press code for four seconds. Two beeps will be heard then the
|
||||||
|
tape will rewind and beep again. Now leave the new message.
|
||||||
|
Press your code when finished to save new outgoing message.
|
||||||
|
New message will play for you to hear.
|
||||||
|
|
||||||
|
Panasonic- Model KX-T2427
|
||||||
|
-------------------------
|
||||||
|
Call and enter the three digit code during the outgoing
|
||||||
|
message. Machine will beep once, then beep amount of times
|
||||||
|
equal to messages. Then rewind and play messages. There will
|
||||||
|
be three beeps after the last message. Six beeps means the
|
||||||
|
tape is full. Press 2 to foward. Press 1 to rewind. Press 3
|
||||||
|
to reset machine and erase messages. To monitor the room
|
||||||
|
press 5 after the beeps indicating the number of messages the
|
||||||
|
machine has. Press 7 to change the outgoing message, it will
|
||||||
|
beep a few quick times rewind then a long beep will be heard.
|
||||||
|
Leave new message press 9 when finished. Press 0 right after
|
||||||
|
the beep tones to shut the machine off. To turn the machine
|
||||||
|
on let it ring 15 times then hangup after machine turns on.
|
||||||
|
|
||||||
|
Panasonic- Model KX-T2385d
|
||||||
|
--------------------------
|
||||||
|
During the outgoing message enter the 1 digit code. This will
|
||||||
|
playback messages. Press the code again to rewind. After the
|
||||||
|
messages have played the machine will beep three times. Press
|
||||||
|
your code again and it will reset the machine. For remote
|
||||||
|
turn on let phone ring 15 times. Then after the outgoing
|
||||||
|
message hangup.
|
||||||
|
|
||||||
|
AT&T- Model 1504
|
||||||
|
----------------
|
||||||
|
Enter 2 digit code before or after announcement. System will
|
||||||
|
beep after each message and five times when messages are
|
||||||
|
done. Press the # key anytime to pause. Hanging up will save
|
||||||
|
messages. Press 7 and it will rewind and play messages again.
|
||||||
|
Press 5 to fast foward. Press 2 to rewind. Press 33 after all
|
||||||
|
messages have been played to reset without saving messages.
|
||||||
|
To record onto the tape press * after the system answers.
|
||||||
|
This will then beep and you may leave a four minute message
|
||||||
|
on the tape. Press # when done. This is not an outgoing
|
||||||
|
message announcement, only a memo. To turn on from remote let
|
||||||
|
ring ten times press 0 when system answers. To turn the
|
||||||
|
system off dial and enter your code. Press 88 and it will
|
||||||
|
shut the machine down.
|
||||||
|
|
||||||
|
Phonemate- Model 4050
|
||||||
|
---------------------
|
||||||
|
Enter your 3 digit code during the outgoing message. Pressing
|
||||||
|
* or # will allow you to scan through the messages. When
|
||||||
|
finished pressing 1 will replay the messages. Pressing 2 will
|
||||||
|
erase them. To turn on from remote let ring for 15 times.
|
||||||
|
Then proceed with remote operations.
|
||||||
|
|
||||||
|
Phonemate- Model 7200
|
||||||
|
---------------------
|
||||||
|
Enter 1 digit code during of after the outgoing message. A
|
||||||
|
voice will tell you how many messages you have, then play
|
||||||
|
them back for you. To rewind press your code and hold it for
|
||||||
|
however long you want to rewind. Let go and it will resume
|
||||||
|
playing. After the last message a voice will prompt you with
|
||||||
|
a list of options. You have five seconds to respond or it
|
||||||
|
will proceed to the next option. These are as follows. The
|
||||||
|
first is hanging up to save messages. Next is enter code to
|
||||||
|
replay messages. Next enter code to erase messages. Last is
|
||||||
|
enter code to change greeting. Follow the voice and it will
|
||||||
|
give you complete directions on exact steps to follow. To
|
||||||
|
turn on from remote let ring ten times then hang up. If tape
|
||||||
|
is full it will say sorry tape is full, enter code and erase
|
||||||
|
messages.
|
||||||
|
|
||||||
|
Spectra Phone- Model ITD300
|
||||||
|
---------------------------
|
||||||
|
Enter your 1 digit code after the greeting. Messages will
|
||||||
|
play back. Hanging up will save them. Or wait for four beeps
|
||||||
|
and press your code to replay them. To erase press your code
|
||||||
|
after 2 beeps. To turn the machine on from remote let it ring
|
||||||
|
10 times.
|
||||||
|
|
||||||
|
Notes: Outgoing message and greeting is what you hear when
|
||||||
|
you first call. Code is your personal security code.
|
||||||
|
|
||||||
|
Hacking answering machines can be very easy. It can also help
|
||||||
|
you obtain valuable information. If you have a targeted
|
||||||
|
machine you can try going to a store and saying you just
|
||||||
|
bought one and it didn't have instructions in the box. They
|
||||||
|
will usually give you a set or make copies for you. This
|
||||||
|
basic guide is just to introduce you to answering machine
|
||||||
|
hacking and changing the outgoing message and listening to
|
||||||
|
messages left by callers. To keep your own machine safe
|
||||||
|
purchase one with a changeable security code of 3 or more
|
||||||
|
digits. Most home machines are of the 1 digit type and are
|
||||||
|
easy to hack. I have no knwoledge of the laws concerning
|
||||||
|
hacking into someones answering machine. I am sure once it
|
||||||
|
becomes more common we will find out. Of course this article
|
||||||
|
is for informational purposes only so you would never have to
|
||||||
|
find out the actual laws.
|
||||||
|
|
||||||
|
Taken from TAP Magazine Issue #100
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
|
||||||
|
Another file downloaded from: NIRVANAnet(tm)
|
||||||
|
|
||||||
|
& the Temple of the Screaming Electron Jeff Hunter 510-935-5845
|
||||||
|
Burn This Flag Zardoz 408-363-9766
|
||||||
|
realitycheck Poindexter Fortran 510-527-1662
|
||||||
|
My Dog Bit Jesus Suzanne d'Fault 510-658-8078
|
||||||
|
New Dork Sublime Demented Pimiento 415-864-DORK
|
||||||
|
The Shrine Tom Joseph 408-747-0778
|
||||||
|
|
||||||
|
"Raw Data for Raw Nerves"
|
||||||
|
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
|
33
textfiles.com/phreak/VOICEMAIL/anmchhak.txt
Normal file
33
textfiles.com/phreak/VOICEMAIL/anmchhak.txt
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
Hacking AT&T Answering Machines
|
||||||
|
Quick and Dirty by oleBuzzard
|
||||||
|
Written Today / 14-SEP-95
|
||||||
|
(c) 1995 <k0p> Communications
|
||||||
|
|
||||||
|
|
||||||
|
1. Dial telephone and wait for AT&T Answering Machine to answer.
|
||||||
|
2. Quickly Enter the following string.
|
||||||
|
|
||||||
|
1234567898765432135792468642973147 (btw: this is the shortest
|
||||||
|
4193366994488552277539596372582838 string for entering every
|
||||||
|
491817161511026203040506070809001 possible 2-digit combo.)
|
||||||
|
|
||||||
|
3. You'll know you hit the code because the messages will start playing.
|
||||||
|
4. Heres a list of TouchTone(c) Commands
|
||||||
|
|
||||||
|
|
||||||
|
Listen to messages: 7
|
||||||
|
Listen to new messages: 6
|
||||||
|
Stop: #
|
||||||
|
Rewind Tape: 2
|
||||||
|
Advance Tape: 5
|
||||||
|
Clear Messages: 3,3
|
||||||
|
Record memo: *
|
||||||
|
Record Announcement: 4,*
|
||||||
|
Play Announcement: 4,1
|
||||||
|
Turn System On: 0
|
||||||
|
Turn System Off: 8,8
|
||||||
|
|
||||||
|
****************************************************************************
|
||||||
|
*** oleBuzzard's kn0wledge phreak ** kn0wledge phreak World Wide Web Site **
|
||||||
|
** AC 719.578.8288 / 28.8oo-24oo ** http://www.uccs.edu/~abusby/k0p.html ***
|
||||||
|
****************************************************************************
|
62
textfiles.com/phreak/VOICEMAIL/ans_exc.txt
Normal file
62
textfiles.com/phreak/VOICEMAIL/ans_exc.txt
Normal file
@@ -0,0 +1,62 @@
|
|||||||
|
|
||||||
|
This is the schematic I traced for an answering machine stopper
|
||||||
|
gadget : it cuts off the answering machine in case any line is picked
|
||||||
|
up. Some answering machines have this feature built-in; the older or
|
||||||
|
inexpensive ones don't. The gadget is called Message Stopper (R), by
|
||||||
|
Design Tech International Inc., Springfield, VA. Several other mfrs
|
||||||
|
make this kind of gadget, so this is just one I happened to buy.
|
||||||
|
Cost, roughly $10.
|
||||||
|
|
||||||
|
The gadget is in the same form factor as a wall-plug-in Y-splitter.
|
||||||
|
That is, it plugs into the wall RJ11 outlet, and has two RJ11 outlets
|
||||||
|
on it, one marked TEL, the other marked ANS. There are two LED's, the
|
||||||
|
green one on top of the ANS outlet, the red one on top of the TEL outlet.
|
||||||
|
|
||||||
|
The two outer wires of the three RJ11's are wired in parallel. The
|
||||||
|
schematic for the center two wires is :
|
||||||
|
|
||||||
|
|
||||||
|
.-------------- phone
|
||||||
|
.-----------------
|
||||||
|
| |
|
||||||
|
C1 ----|
|
||||||
|
C2 -| |
|
||||||
|
| |
|
||||||
|
| |
|
||||||
|
| '----------------- answering machine
|
||||||
|
|
|
||||||
|
+--|<--+--|<--->|----
|
||||||
|
| | two zeners
|
||||||
|
+-->|--+
|
||||||
|
two leds
|
||||||
|
|
||||||
|
Top led is green, bottom is red.
|
||||||
|
|
||||||
|
It turns out the leds are basically idiot lights. The outside design
|
||||||
|
makes it look like the green should light up when the ANS is offhook,
|
||||||
|
and the red when TEL is offhook, but actually, depending on the line
|
||||||
|
polarity, only one will glow, and only when the ANS outlet is offhook.
|
||||||
|
If a load is connected on the ANS outlet, both leds will glow when
|
||||||
|
ring voltage comes through.
|
||||||
|
|
||||||
|
I could not read the zener voltage off the diodes, but I measured 11V
|
||||||
|
across one of them when operating.
|
||||||
|
|
||||||
|
The theory of operation is straightforward. All telephone extensions
|
||||||
|
in the house are in parallel with each other, and with any device connected
|
||||||
|
on the TEL outlet. If any of these devices is offhook, the phone line
|
||||||
|
voltage is expected to drop below 12V or so, at which point the zeners
|
||||||
|
isolate the ANS outlet from the line.
|
||||||
|
|
||||||
|
It's a fairly simplistic design, and will not work in all situations,
|
||||||
|
but it mostly works.
|
||||||
|
|
||||||
|
----
|
||||||
|
|
||||||
|
Regards,
|
||||||
|
|
||||||
|
/ Jon Sreekanth
|
||||||
|
|
||||||
|
Assabet Valley Microsystems, Inc. | Fax and PC products
|
||||||
|
5 Walden St #3, Cambridge, MA 02140 | (617) 876-8019
|
||||||
|
jon_sree@world.std.com |
|
BIN
textfiles.com/phreak/VOICEMAIL/ansmache.xcl
Normal file
BIN
textfiles.com/phreak/VOICEMAIL/ansmache.xcl
Normal file
Binary file not shown.
275
textfiles.com/phreak/VOICEMAIL/aspentut.txt
Normal file
275
textfiles.com/phreak/VOICEMAIL/aspentut.txt
Normal file
@@ -0,0 +1,275 @@
|
|||||||
|
|
||||||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||||
|
* *
|
||||||
|
* A Tutorial Of: ASPEN VOICE MAILBOX SYSTEMS *
|
||||||
|
* *
|
||||||
|
* Written by: SLYCATH *
|
||||||
|
* *
|
||||||
|
* Greetz to: Firefly, Adam, Sintax, Voltage and *
|
||||||
|
* *
|
||||||
|
* Everyone who knows me.... Happy Hacking.. *
|
||||||
|
* *
|
||||||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||||
|
|
||||||
|
|
||||||
|
Intro:
|
||||||
|
Well you may be thinking that, Oh! yes I've read tutorials
|
||||||
|
before and they are about as helpful as a dead parrot.....
|
||||||
|
I thought it was about time to write a little series of
|
||||||
|
textfiles on how to use (and abuse) Mailbox systems.
|
||||||
|
This series will NOT just cover Hacking and scanning of mail
|
||||||
|
systems but also the facilities used on each................
|
||||||
|
|
||||||
|
Start:
|
||||||
|
O.K. After recently coming across an ASPEN system which I
|
||||||
|
successfully managed to hack a couple of mailboxes for my
|
||||||
|
personal use, I didn't realise all the many facilities
|
||||||
|
available to the (Ab)user. I have collated the following
|
||||||
|
information myself I hope it will be of some help to U.
|
||||||
|
|
||||||
|
Assuming that you already have a mailbox on the system:
|
||||||
|
|
||||||
|
When Entering your mailbox number and passcode the system
|
||||||
|
will tell you if you have any new (or saved) messages.
|
||||||
|
Let's assume you have ONE new message.
|
||||||
|
|
||||||
|
You may select the following options:
|
||||||
|
|
||||||
|
Push:
|
||||||
|
----- 1 - Recieve Messages
|
||||||
|
2 - Send a message
|
||||||
|
3 - Check Reciept
|
||||||
|
4 - Personal Options
|
||||||
|
|
||||||
|
Option chosen:
|
||||||
|
--------------
|
||||||
|
|
||||||
|
1:
|
||||||
|
"" Whilst message is playing you have a sub-menu of options.
|
||||||
|
|
||||||
|
1: Rewind Message Ten Seconds
|
||||||
|
11: Rewind To Start Of Message
|
||||||
|
2: Pause Message (Press Again To Unpause)
|
||||||
|
3: Fast Forward Message Ten seconds
|
||||||
|
33: Fast Forward To End Of Message
|
||||||
|
|
||||||
|
4: Decrease Playing Speed (Slow Down)
|
||||||
|
6: Increase Playing Speed (Speed Up)
|
||||||
|
|
||||||
|
8: Decrease Volume
|
||||||
|
9: Increase Volume
|
||||||
|
|
||||||
|
After listening to the message you may select one of these.
|
||||||
|
|
||||||
|
4: Replay Message
|
||||||
|
5: Envelope Message (Find Source Mailbox+Time+Date+Length)
|
||||||
|
6: Send On Message To Another Subscriber - Record Intro Msg.
|
||||||
|
7: ERASE Message
|
||||||
|
8: Reply To Message
|
||||||
|
9: Save Message In Archives (For Later Listening)
|
||||||
|
|
||||||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||||
|
|
||||||
|
2:
|
||||||
|
"" Send a Message will ask you to speak whilst it records you.
|
||||||
|
|
||||||
|
Press # to stop recording then enter Destination Mailbox.
|
||||||
|
|
||||||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||||
|
|
||||||
|
3:
|
||||||
|
"" Check reciept of messages sent.
|
||||||
|
|
||||||
|
This will allowyou to check if a message has been read and
|
||||||
|
also if a message has been saved.
|
||||||
|
There are other uses for this function (See L8ter)
|
||||||
|
|
||||||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||||
|
|
||||||
|
4:
|
||||||
|
"" Personal Options. Good fun can be had by all !!
|
||||||
|
|
||||||
|
1: Change Your Passwords
|
||||||
|
------------------------
|
||||||
|
|
||||||
|
This Section Refers To Guest Box Control.
|
||||||
|
If you are Strapped for boxes then you can assign
|
||||||
|
Guest Boxes so you can send messages to each other even
|
||||||
|
if One person doesn't have a mailbox.
|
||||||
|
|
||||||
|
1: Change Guest 1's Password
|
||||||
|
|
||||||
|
Guest Can Leave AND Recieve Messages
|
||||||
|
|
||||||
|
2: Change Guest 2's Password
|
||||||
|
|
||||||
|
Guest Can Leave AND Recieve Messages
|
||||||
|
|
||||||
|
3: Change Home Password
|
||||||
|
|
||||||
|
Guest Can Leave AND Recieve Messages
|
||||||
|
|
||||||
|
4: Change Secretary Password
|
||||||
|
|
||||||
|
Can Check How Many Messages You Have +
|
||||||
|
Recieve Messages
|
||||||
|
|
||||||
|
5: Change Mailbox Password (MAIN)
|
||||||
|
|
||||||
|
This is your password. DON'T FORGET IT
|
||||||
|
~~~~
|
||||||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||||
|
|
||||||
|
2: Change Your Greetings
|
||||||
|
------------------------
|
||||||
|
|
||||||
|
1: Change Your Name
|
||||||
|
|
||||||
|
This is the name which people hear when
|
||||||
|
sending you messages from other boxes.
|
||||||
|
i.e. "Your message will be sent to xxxxxx"
|
||||||
|
|
||||||
|
2: Change Your Greeting
|
||||||
|
|
||||||
|
This is what Non-Subscribers who are leaving
|
||||||
|
you mail will hear.
|
||||||
|
|
||||||
|
3: Change Your Extended Abscence Greeting
|
||||||
|
|
||||||
|
This is the same as the ordinary greeting but
|
||||||
|
people leaving messages will be alerted that
|
||||||
|
you may not be back for some time.
|
||||||
|
|
||||||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||||
|
|
||||||
|
3: Distribution Lists
|
||||||
|
---------------------
|
||||||
|
|
||||||
|
Distribution lists are so you can record a message and have
|
||||||
|
it automatically sent to all users on your list.
|
||||||
|
|
||||||
|
i.e. Your list could contain EVERYONE'S number
|
||||||
|
Or All Your M8s On the system.
|
||||||
|
|
||||||
|
1: Create Distribution Lists
|
||||||
|
|
||||||
|
2: Edit Distribution Lists
|
||||||
|
|
||||||
|
3: Delete Distribution Lists
|
||||||
|
|
||||||
|
4: Find Names Of People On Lists
|
||||||
|
|
||||||
|
|
||||||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||||
|
|
||||||
|
OK ENUFF OF THE OPTIONS NOW ONTO THE HACK STUFF.
|
||||||
|
|
||||||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||||
|
|
||||||
|
Passwords:
|
||||||
|
~~~~~~~~~~
|
||||||
|
|
||||||
|
Defaults For ASPEN Are:
|
||||||
|
|
||||||
|
(E.G. Box is 888)
|
||||||
|
|
||||||
|
-------------------------------
|
||||||
|
Passcode | Example
|
||||||
|
-------------------------------
|
||||||
|
Box number - 888
|
||||||
|
Box number + 1 - 889
|
||||||
|
Box number & 1 - 8881
|
||||||
|
1 & Box number - 1888
|
||||||
|
Box number + 0 - 8880
|
||||||
|
0 & Box number - 0888
|
||||||
|
|
||||||
|
-------------------------------
|
||||||
|
Use Normal Hacking Techniques:
|
||||||
|
-------------------------------
|
||||||
|
i.e.
|
||||||
|
1111
|
||||||
|
|
|
||||||
|
\|/
|
||||||
|
9999
|
||||||
|
1234
|
||||||
|
4321
|
||||||
|
-------------------------------
|
||||||
|
|
||||||
|
|
||||||
|
Scanning:
|
||||||
|
~~~~~~~~~
|
||||||
|
|
||||||
|
Once you have found a NEW Mailbox, or even a used one.
|
||||||
|
|
||||||
|
.-------------------------,
|
||||||
|
/ DON'T CHANGE JACK SHIT /
|
||||||
|
`-------------------------'
|
||||||
|
|
||||||
|
Press '3' from the main menu.
|
||||||
|
This Checks for Reciept of messages (See Previous)
|
||||||
|
|
||||||
|
Enter Mailbox Number: xxxx
|
||||||
|
|
||||||
|
When entered number the system will say one of the following:
|
||||||
|
|
||||||
|
1: The Mailbox Users Name
|
||||||
|
2: "xxxx Is not a Valid Number"
|
||||||
|
3: "xxxx"
|
||||||
|
|
||||||
|
Start at 0000 then move up to 9999 making a note as follows:
|
||||||
|
|
||||||
|
If you get :
|
||||||
|
|
||||||
|
1. Ignore and enter the next number.
|
||||||
|
2. Ignore and enter the next number.
|
||||||
|
3. Jump up and down and go WHOOOOPPPEEEEE , you may be in luck.
|
||||||
|
|
||||||
|
When You Have finished you should have a list of POSSIBLE
|
||||||
|
Hackable Mailboxes.
|
||||||
|
______
|
||||||
|
/ \
|
||||||
|
/ THEN: /
|
||||||
|
\ /
|
||||||
|
`----'
|
||||||
|
|
||||||
|
1. Hang Up And call back the system.
|
||||||
|
2. Press '#'
|
||||||
|
3. Enter One of Numbers on the list.
|
||||||
|
4. If it says 'Enter Password' You can either try and hack it
|
||||||
|
but isn't gonna be a VIRGIN mailbox.
|
||||||
|
5. If it says 'This is a voice messaging bollox.... blahh blahh.'
|
||||||
|
then it will come to a point where it says,
|
||||||
|
'Please enter the temporary password assigned by your System
|
||||||
|
Manager'.
|
||||||
|
6. Enter Default Passwords.
|
||||||
|
Defaults Are most likely to be the same for all the other VIRGIN
|
||||||
|
voice mail boxes if not, try the other ones.
|
||||||
|
7. If It hangs up then GOTO 1.
|
||||||
|
8. If it allows you access then play with the options (See Previous)
|
||||||
|
|
||||||
|
|
||||||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||||
|
Thanx For Reading All Of This Text File.
|
||||||
|
I Hope That It Will Be Of Some Use To You.
|
||||||
|
|
||||||
|
And See Ya All In
|
||||||
|
----------------------------
|
||||||
|
" The Guide To CINDI Systems "
|
||||||
|
----------------------------
|
||||||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||||
|
Extra Greeting: Thanx To FIREFLY For Alerting Me To
|
||||||
|
Some Of The Extra Options Which I Hadn't Previously
|
||||||
|
Noticed When Playing Around With It. THANX M8.
|
||||||
|
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||||
|
/ \
|
||||||
|
*-+-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-+-*
|
||||||
|
| |
|
||||||
|
| I Expect The Next Bit Will Get Adverts Stuck To It! |
|
||||||
|
| |
|
||||||
|
`-----------------------------------------------------'
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
33
textfiles.com/phreak/VOICEMAIL/at&t.txt
Normal file
33
textfiles.com/phreak/VOICEMAIL/at&t.txt
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
Hacking AT&T Answering Machines
|
||||||
|
Quick and Dirty by oleBuzzard
|
||||||
|
Written Today / 14-SEP-95
|
||||||
|
(c) 1995 <k0p> Communications
|
||||||
|
|
||||||
|
|
||||||
|
1. Dial telephone and wait for AT&T Answering Machine to answer.
|
||||||
|
2. Quickly Enter the following string.
|
||||||
|
|
||||||
|
1234567898765432135792468642973147 (btw: this is the shortest
|
||||||
|
4193366994488552277539596372582838 string for entering every
|
||||||
|
491817161511026203040506070809001 possible 2-digit combo.)
|
||||||
|
|
||||||
|
3. You'll know you hit the code because the messages will start playing.
|
||||||
|
4. Heres a list of TouchTone(c) Commands
|
||||||
|
|
||||||
|
|
||||||
|
Listen to messages: 7
|
||||||
|
Listen to new messages: 6
|
||||||
|
Stop: #
|
||||||
|
Rewind Tape: 2
|
||||||
|
Advance Tape: 5
|
||||||
|
Clear Messages: 3,3
|
||||||
|
Record memo: *
|
||||||
|
Record Announcement: 4,*
|
||||||
|
Play Announcement: 4,1
|
||||||
|
Turn System On: 0
|
||||||
|
Turn System Off: 8,8
|
||||||
|
|
||||||
|
****************************************************************************
|
||||||
|
*** oleBuzzard's kn0wledge phreak ** kn0wledge phreak World Wide Web Site **
|
||||||
|
** AC 719.578.8288 / 28.8oo-24oo ** http://www.uccs.edu/~abusby/k0p.html ***
|
||||||
|
****************************************************************************
|
432
textfiles.com/phreak/VOICEMAIL/audexvp.txt
Normal file
432
textfiles.com/phreak/VOICEMAIL/audexvp.txt
Normal file
@@ -0,0 +1,432 @@
|
|||||||
|
AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDE
|
||||||
|
UDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX
|
||||||
|
DEX- DEX-
|
||||||
|
EX-A HACKING GUIDE TO THE EX-A
|
||||||
|
X-AU X-AU
|
||||||
|
-AUD AUDEX VOICE POWER -AUD
|
||||||
|
AUDE AUDE
|
||||||
|
UDEX WRITTEN BY UDEX
|
||||||
|
DEX- DEX-
|
||||||
|
EX-A --==>> CRAZYBYTE <<==-- EX-A
|
||||||
|
X-AU X-AU
|
||||||
|
-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUD
|
||||||
|
AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDE
|
||||||
|
UDEX UDEX
|
||||||
|
DEX- CALL SIN CITY: +32-3-8252274 DEX-
|
||||||
|
EX-A EX-A
|
||||||
|
X-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AU
|
||||||
|
-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUD
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/\/--> DISCLAIMER <--\/\
|
||||||
|
------------------------
|
||||||
|
Ohooh... I'm scared as shit so I accept no responsibility for any actions
|
||||||
|
taken by readers... blahblah NOOOOOOO...
|
||||||
|
This text is written with the intention that readers of this text hack
|
||||||
|
Audex Voice Power vmb's, and I sure as hell hope that as from now on every
|
||||||
|
fucking Audex Voice Power in the galaxy gets abused by hackers.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/\/--> INTRODUCTION <--\/\
|
||||||
|
--------------------------
|
||||||
|
The Audex Voice Power is the predecessor of the Audex we all know just under
|
||||||
|
the name Audex today. There aren't that much of this older system around,
|
||||||
|
but the few I found were fucking easy to hack. And again: vmb's are fun to
|
||||||
|
have, you can trade them for xxx (fill this in), they lower your phone
|
||||||
|
bill,... (you've heard this shit before).
|
||||||
|
Anyway, lets get down to business...
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/\/--> IDENTIFYING THE AUDEX VOICE POWER VMB <--\/\
|
||||||
|
----------------------------------------------------
|
||||||
|
Well, you can't recognize them from the first greeting, but the greeting
|
||||||
|
will probably contain the usual 'press the ext. of the person you want to
|
||||||
|
reach' and the (special for Audex Voice Power) 'if you want to transfer
|
||||||
|
using names instead, press the pound (#) key'.
|
||||||
|
To REALLY be sure it's an Audex Voice Power: press *7, if it responds with:
|
||||||
|
'Welcome to Audex Voice Power, please enter extension and # sign' you've
|
||||||
|
got yourself an easy-to-hack Audex Voice Power vmb.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/\/--> LOGGING IN <--\/\
|
||||||
|
------------------------
|
||||||
|
Press *7, you are asked to enter your box number, these are can be 3 or 4
|
||||||
|
digits, but I haven't found a mixture of the two on one system so far.
|
||||||
|
After you've entered the box number, press #, enter your password and press
|
||||||
|
# again. If you entered and incorrect box number or password, it will say
|
||||||
|
'Login incorrect, please try again,...'. On the systems I found you could
|
||||||
|
try 4 times to login before you get disconnected. When you get disconnected
|
||||||
|
it will say: 'Contact administrator for help, please disconnect... goodbye'.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/\/--> FINDING A VALID BOX AND PASSWORD <--\/\
|
||||||
|
----------------------------------------------
|
||||||
|
The boxes are grouped, and they will usually be in 2XX or 2XXX. The default
|
||||||
|
password is the same as the box number, just like on allmost all other VMB
|
||||||
|
systems.
|
||||||
|
|
||||||
|
There are two easy ways to find boxes (and one difficult, and another one
|
||||||
|
if you really want a box but had extremely bad luck):
|
||||||
|
|
||||||
|
1. On the two systems I'm using right now, the attendant-extension (0)
|
||||||
|
has 0 as password, and on one of those two, the options at the login-menu
|
||||||
|
have also got the same password as their extension number (1 for xxx, 2
|
||||||
|
for yyy,...). So first thing to do is trying 0 -> 9, if you can't get in
|
||||||
|
with these, read 2.
|
||||||
|
|
||||||
|
2. So you couldn't get in by trying extensions 0 -> 9.
|
||||||
|
Most systems have a directory where you can transfer to people's
|
||||||
|
extensions by entering the first letters of their last name.
|
||||||
|
To find the directory, just listen to the first greeting you hear when
|
||||||
|
you call the VMB. (you know, 'welcome to xxx... if you need assistance
|
||||||
|
press 0, otherwise press the extension of...'). Usually you have to
|
||||||
|
press # at the login menu. Now, when you enter the directory option,
|
||||||
|
the system will respond with: 'Please enter the last name of the person
|
||||||
|
you want to reach'. Don't enter a complete name, just press 5 or somtehing
|
||||||
|
and the # sign. By the way: lots of VMB systems have some sort of
|
||||||
|
directory, and allmost every VMB system I found had users with last names
|
||||||
|
'Smith' or 'Jones' (some popular names in the US, and characters from a
|
||||||
|
stupid TV series). Well, lets continue with Audex Voice Power. After you've
|
||||||
|
pressed #, the system will say 'to select blahblah press x' and will
|
||||||
|
start saying names. Now a lot of users also say their box number, so
|
||||||
|
a lot of these names will be like 'John Doe, extension xxxx'. Just
|
||||||
|
write these down. If you found how many digits the box numbers are,
|
||||||
|
and where they are grouped, hang up and call again.
|
||||||
|
Now start trying the box numbers you just found, you probably will get
|
||||||
|
in using the box number as password the 2nd or 3rd time you call, since
|
||||||
|
a lot of people don't use their VMB's, or don't know shit about it, so
|
||||||
|
haven't changed their password.
|
||||||
|
|
||||||
|
3. Couldn't get in with one of the above methods ? Never happened to me,
|
||||||
|
but I guess it's possible. Here's what I would do in such a situation.
|
||||||
|
Don't use the login (*7) options to scan for boxes because then you don't
|
||||||
|
even know if it's a valid box. Just transfer to them from the main menu,
|
||||||
|
so you know how much digits the boxes are, and where they're located
|
||||||
|
(since they 'live' in groups). There's a 90% chance the boxes are located
|
||||||
|
in 2xx(x). If you entered an invalid box number, it will first try to
|
||||||
|
transfer you, and then it will say something like 'your transfer couldn't
|
||||||
|
be completed'. Since you don't have to press # after entering an extension
|
||||||
|
to transfer to, it's possible that f.e. after pressing only one digit you
|
||||||
|
will get transfered (read point 1 of this paragraph). When you've located
|
||||||
|
an area that contains lots of valid extensions, try to hack a box in that
|
||||||
|
area with the login (*7) option.
|
||||||
|
|
||||||
|
4. Still didn't find a box ??? Well, the best thing you could do in this
|
||||||
|
case is bullshit to the operator. If you couldn't find the area that
|
||||||
|
contains the boxes, and there's no directory, ask her for the extension
|
||||||
|
of f.e. Smith and say you don't know anything else about this Smith.
|
||||||
|
If bullshitting the operator didn't work either, just try to transfer to
|
||||||
|
an extension, and ask the person that picks up the phone for their
|
||||||
|
password. You could say that you're from maintenance, and are installing
|
||||||
|
a new option in the boxes so that people are able to use outside lines
|
||||||
|
from within their boxes or something.
|
||||||
|
|
||||||
|
5. You still couldn't get a box ? Well, give up on this system and scan for
|
||||||
|
another VMB system. I NEVER found a system I couldn't get a box after
|
||||||
|
about ten minutes using the method in points 1 and 2 so you are trying to
|
||||||
|
hack a system that has allready been badly abused by hackers or otherwise
|
||||||
|
you are EXTREMELY dumb.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/\/--> OK, YOU'RE IN A BOX, WHAT NOW ??? <--\/\
|
||||||
|
------------------------------------------------
|
||||||
|
Well, use press 2 to listen to the messages, but only listen to the dates they
|
||||||
|
were created. So press # every time to skip to the next message.
|
||||||
|
If it contains new messages from 3 months ago, then it means that the legit
|
||||||
|
user didn't use his box in 3 months. You can safely listen to the messages
|
||||||
|
and use this box without the risk of loosing it in 2 days.
|
||||||
|
If it contains no messages it could be possible that the user checks the VMB
|
||||||
|
regulary, or that it has never been used in which case you got yourself a
|
||||||
|
good box again. There's no quick way to find out if it's unused or often used
|
||||||
|
in this case, just use this box to scan for other ones (look below), or check
|
||||||
|
regulary if there are new messages and if they get deleted afterwards.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/\/--> SCANNING FOR OTHER BOXES <--\/\
|
||||||
|
---------------------------------------
|
||||||
|
There are different ways of scanning for other boxes, but the quickest is
|
||||||
|
the following:
|
||||||
|
First choose option 5 from the main menu, then press 1 to create a
|
||||||
|
distribution list. You will be asked for an ID for the list, just press 1
|
||||||
|
or something followed by #. Now start entering box numbers, followed by #.
|
||||||
|
If the box is valid, the system will respond with the name of the owner, or
|
||||||
|
when you're lucky, the system will sa: 'Extension xxx', in which case you
|
||||||
|
should write the number down because you've got a 99% chance this is an
|
||||||
|
unused box. If the box is not valid, the system will say 'Extension xxx not
|
||||||
|
valid'. When you've collected some numbers, press *# and then *3 to delete
|
||||||
|
the list. Now hang up, call again and try what boxes have the same passwords
|
||||||
|
as their box numbers.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/\/--> OPTIONS AND COMMANDS <--\/\
|
||||||
|
----------------------------------
|
||||||
|
From the main menu you've got the following options:
|
||||||
|
|
||||||
|
1. Record a message
|
||||||
|
2. Listen to messages
|
||||||
|
3. Administer name or greeting
|
||||||
|
5. Administer password and distribution lists
|
||||||
|
6. Change outcalling info (INTERESTING)
|
||||||
|
*8. Transfer to another extension
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
1. RECORDING MESSAGES :
|
||||||
|
|
||||||
|
You will hear a beep, record your message after the beep. When
|
||||||
|
finished recording, press 1. Now you've got the following options:
|
||||||
|
|
||||||
|
21: Re-record : Your message will be deleted and you can record
|
||||||
|
it again.
|
||||||
|
|
||||||
|
23: Playback : Just as it says: your just-recorded message will
|
||||||
|
be played back.
|
||||||
|
|
||||||
|
*3: Delete : Your message will be deleted
|
||||||
|
|
||||||
|
*#: Approve : Now enter the boxes you wish to send your message
|
||||||
|
to, followed by #. When finished type *#. To delete
|
||||||
|
the last entry (box), type *3.
|
||||||
|
|
||||||
|
|
||||||
|
2. LISTENING TO MESSAGES :
|
||||||
|
|
||||||
|
When there are no messages, you will go back to the main menu.
|
||||||
|
Otherwise you will hear the date and time the actual message was
|
||||||
|
delivered, and the name (if specified) of the sender.
|
||||||
|
Options:
|
||||||
|
|
||||||
|
0 : Listen : Listen to actual message
|
||||||
|
While listening you can use these commands:
|
||||||
|
2 : Rewind message. If you press it again you will go to
|
||||||
|
the previous message.
|
||||||
|
3 : Pause. Press 3 again to continue playing.
|
||||||
|
5 : Rewind and play
|
||||||
|
6 : Goto end of message
|
||||||
|
|
||||||
|
# : Skip : go to next message
|
||||||
|
|
||||||
|
*3: Delete : actual message will be deleted
|
||||||
|
|
||||||
|
1 : Respond/forward message
|
||||||
|
1 : Reply : Send an answer to the sender
|
||||||
|
2 : Forward : Record a comment before the message and send
|
||||||
|
it to someone else.
|
||||||
|
4 : Record new : Record a new message. This does exactly the
|
||||||
|
same as option 1 from the main menu.
|
||||||
|
|
||||||
|
|
||||||
|
3. ADMINISTERING OF NAME AND GREETING :
|
||||||
|
|
||||||
|
This submenu will enable you to record name and greeting, and to
|
||||||
|
specify what greeting will be used.
|
||||||
|
Options:
|
||||||
|
|
||||||
|
1 : Greeting : The message that will be heard whenever someone
|
||||||
|
wants to leave a message in your box.
|
||||||
|
1 : Record : Record after the beep the greeting that should
|
||||||
|
be played. Press 1 to end recording.
|
||||||
|
2 : Listen : Listen to your greeting.
|
||||||
|
*#: Select which greeting should answer.
|
||||||
|
9 : Personal greeting.
|
||||||
|
6 : Standard system greeting.
|
||||||
|
|
||||||
|
2 : Name : The message that is heard when someone sends or
|
||||||
|
reveices messages to/from your box.
|
||||||
|
0 : Listen : Listen to name.
|
||||||
|
1 : Record : Record name.
|
||||||
|
|
||||||
|
|
||||||
|
5. CREATING DISTRIBUTION LISTS AND CHANGING YOUR PASSWORD :
|
||||||
|
|
||||||
|
Distribution lists are used when you regulary need to send messages to
|
||||||
|
several people, and don't want to waste time with typing all their
|
||||||
|
boxes.
|
||||||
|
|
||||||
|
1 : Create : Creates a new distribution list. First you will be
|
||||||
|
asked for an ID for the list. Now enter f.e. 1 followed
|
||||||
|
by #. You can now enter a box number followed by #,
|
||||||
|
repeat this untill you inputed all the box numbers for
|
||||||
|
the distribution list. If you entered a wrong number,
|
||||||
|
just press *3 to delete the last entry. When finished
|
||||||
|
press *#.
|
||||||
|
|
||||||
|
2 : Scan : With this option all distribution lists ( If you got
|
||||||
|
any ) will be said, and after saying the ID of the
|
||||||
|
list, you've got the following options:
|
||||||
|
*3: Delete : Delete this distribution list.
|
||||||
|
# : Skip : Go to the next distribution list.
|
||||||
|
|
||||||
|
3 : Review : This option will allow you to change other users' or
|
||||||
|
your own distribution lists. First enter the box number
|
||||||
|
followed by #, or for your own box, just press #.
|
||||||
|
Now enter the ID of the distribution list followed
|
||||||
|
by #. The system will say how much entries there are in
|
||||||
|
the list, and name them one by one, giving you the
|
||||||
|
following options after naming each entry:
|
||||||
|
# : Skip : Go to the next box.
|
||||||
|
*3: Delete : Delete this box.
|
||||||
|
1 : Add : Add a box.
|
||||||
|
*#: Quit : Stop review of the entries in the list.
|
||||||
|
|
||||||
|
4 : Change PW : Enter your new password followed by #. After
|
||||||
|
entering it, you have to enter it again followed
|
||||||
|
by # to check if you didn't enter it wrong the
|
||||||
|
first time. The password can be 1 till 9 digits.
|
||||||
|
If you just press # when you're asked to enter it,
|
||||||
|
no passwords will be assigned to your box.
|
||||||
|
|
||||||
|
|
||||||
|
6. CHANGE OUTCALLING INFORMATION :
|
||||||
|
|
||||||
|
The outcalling option is quite fun. Not everyone is allowed to do it,
|
||||||
|
but if you find boxes allowing outcalling, you can use them to call
|
||||||
|
friends, boards or even alliance... I wouldn't suggest putting your
|
||||||
|
own number there, but it would be quite fun that when someone calls
|
||||||
|
you up using the VMB (on a tollfree number ???), and you don't answer,
|
||||||
|
he can leave a message and stuff...
|
||||||
|
|
||||||
|
Options:
|
||||||
|
|
||||||
|
1 : Change : Enter the number your calls should be transfered to,
|
||||||
|
followed by #. To exit press *#.
|
||||||
|
|
||||||
|
3 : Info : Will give you instructions on how to enter the number
|
||||||
|
with option 1. If you want to insert a pause in the
|
||||||
|
dial string, use * to pause for 4 seconds. If your
|
||||||
|
number needs to be ended with a #, start your dialing
|
||||||
|
string with ##. Normally you can't end with a #
|
||||||
|
because if you do that, the system thinks that it's
|
||||||
|
the end of the dialing string. This is usefull for
|
||||||
|
pagers and other stuff (use your imagination).
|
||||||
|
|
||||||
|
6 : Disable : Turn outcalling off.
|
||||||
|
|
||||||
|
9 : Period : Specify the outcalling period.
|
||||||
|
1 : Outcalling allowed during the system administration hours.
|
||||||
|
F.e.: Only between 8 AM and 6 PM.
|
||||||
|
2 : Outcalling allowed 24 hours a day.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/\/--> GREETINGS <--\/\
|
||||||
|
-----------------------
|
||||||
|
And last but not least some greetings to:
|
||||||
|
(A-Z to avoid 'why did ya put X before me ?')
|
||||||
|
|
||||||
|
|
||||||
|
Analog: Forget that I told you to kick off Flaming Chaos as a CO.
|
||||||
|
Making a new BBS proggy ?
|
||||||
|
|
||||||
|
Apollo: Hope your exams are better than mine... nice talking to ya
|
||||||
|
over the VMB.
|
||||||
|
|
||||||
|
A.R.U.P.: For having such a nice and virgin Audex Voice Power VMB.
|
||||||
|
|
||||||
|
Cops (the): FUCK OFF !!! I EXTREMELY HATE ALL COPS... I WOULD KILL ALL
|
||||||
|
COPS IF I HAD THE CHANCE (same goes for all kind of security
|
||||||
|
personnel and the endless amount of lamers on this planet).
|
||||||
|
|
||||||
|
Donald Duck: Where R you ? Is your girlfriend SO interesting ? We miss
|
||||||
|
your expertise...
|
||||||
|
|
||||||
|
Einstein: You're lame and you know it. Hah, I puke on guys like you.
|
||||||
|
I'm not a violent guy, but I swear I'll smash your head when
|
||||||
|
I ever meet you.
|
||||||
|
|
||||||
|
Flaming Chaos: Sorry I offended you dude, but I didn't know about that '|',
|
||||||
|
so I thought the message was specifically written for me.
|
||||||
|
|
||||||
|
Invalid Media: Quite nice board... too bad you had to make it codefree.
|
||||||
|
|
||||||
|
Jules: Your board is OK, but why is it down so much ?
|
||||||
|
|
||||||
|
Larry: You're a lamer and your problem is that you won't admit it.
|
||||||
|
|
||||||
|
Oink: Hmmm... so you agree that HP3000's are Boooring... Unixes are
|
||||||
|
1000 times more phun...
|
||||||
|
|
||||||
|
Ralph: Been fucking around on the nets lately ???
|
||||||
|
|
||||||
|
Sintax: Happy now that I put some greets in ? Don't you ever get bored
|
||||||
|
of CIS ?
|
||||||
|
|
||||||
|
Slycath: Nice texts, continue your good work...
|
||||||
|
btw: I LUV Robbie Robot... (and his frog puppet)
|
||||||
|
|
||||||
|
Predat0r: Your board is the living proof that a board doesn't need an
|
||||||
|
HST to be one of the best.
|
||||||
|
|
||||||
|
Thor: How is army ? Why don't you do something usefull while you're
|
||||||
|
there and look for their computer dialups (if they're using
|
||||||
|
any (hehe)).
|
||||||
|
|
||||||
|
Trap Zer0: Nice texts about the VMB's. Getting active again ?
|
||||||
|
|
||||||
|
Vinny: You probably won't read this, hehe... your handle is with 'V'
|
||||||
|
so you're last... anyways, THANKS for everything you 'teached'
|
||||||
|
me, THANKS for the job you can get me, GOOD LUCK with the PC.
|
||||||
|
|
||||||
|
???: To all guys who call me when I'm sleeping: FUCK OFF.
|
||||||
|
|
||||||
|
|
||||||
|
And... to all guys I forgot and also the few cool guys I know among all the
|
||||||
|
lamers in the lame Amiga scene. Only greets here to guys I know involved
|
||||||
|
in HPA, this will be the first and the last time I put up such a greetings
|
||||||
|
list...
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/\/--> RECOMMENDED READING <--\/\
|
||||||
|
---------------------------------
|
||||||
|
- All texts about Night Ranger, he's the VMB expert.
|
||||||
|
- Texts about Aspen and Cindi systems written by Slycath.
|
||||||
|
- Texts about the IADS and Message Centers by Trap Zer0.
|
||||||
|
- Ofcourse all texts written by me (hehe).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/\/--> OTHER TEXTS WRITTEN BY ME <--\/\
|
||||||
|
---------------------------------------
|
||||||
|
- Unix command overview
|
||||||
|
- Hacking Meridian Mail
|
||||||
|
- HP3000 quick command reference
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
/\/--> TEXTS TO WATCH OUT FOR <--\/\
|
||||||
|
-------------------------------------
|
||||||
|
- Maybe a text about the IADS coz I think it's the best VMB ever made.
|
||||||
|
- Text about Audex (the new Audex Voice Power system).
|
||||||
|
- Probably some texts about hacking Unix or the MPE XL or V OS on HP3000's.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
L8R ALLIG8R
|
||||||
|
|
||||||
|
User CRAZYBYTE ending interactive session at 17:02.
|
||||||
|
|
||||||
|
NO CARRIER
|
||||||
|
|
||||||
|
|
361
textfiles.com/phreak/VOICEMAIL/cinditut.txt
Normal file
361
textfiles.com/phreak/VOICEMAIL/cinditut.txt
Normal file
@@ -0,0 +1,361 @@
|
|||||||
|
. + . . .
|
||||||
|
+ ___/\ /\_/\_______________________/\________
|
||||||
|
. /\__\/\/ /_________________________/ /________\ . +
|
||||||
|
. . / / __\ \/_________/\_____ _______/ /_________/ .
|
||||||
|
. \/ / /\ \/ // \ / \ / / /\ / /
|
||||||
|
. + . \ \ / /\ // /\// /\ \ / / / / / / . .
|
||||||
|
. ________________/\ / / / // / \/\/ // / / /__/ / . +.
|
||||||
|
/\_______________\/ \ \/ / \ \_/\ / // / / / / / .
|
||||||
|
\/_________________/ \ / \___/ / / \/ \/ / / .
|
||||||
|
. / \ . / / . . \/ .
|
||||||
|
. + . . . \/\/ . \/ +
|
||||||
|
|
||||||
|
. IS PROUD TO PRESENT TO YOU:
|
||||||
|
. ___________________________
|
||||||
|
/\_________________________/\
|
||||||
|
/ / \ \
|
||||||
|
/ / * CINDI SYSTEM TUTORIAL * \ \
|
||||||
|
\/\___________________________/\/
|
||||||
|
|
||||||
|
YO GUYZ, I'M BACK AS PROMISED WITH ANOTHER TUTORIAL.
|
||||||
|
LEAVE ME MAIL IF YOU NEED HELP WITH SOMETHING.
|
||||||
|
YOU CAN CATCH ME ON:
|
||||||
|
|
||||||
|
BORDERLINE: +61 (0) 4987-4875
|
||||||
|
SIN CITY: +32 (0) 3825-2274
|
||||||
|
CONSPIRACY: +44 (0) 633-894-490
|
||||||
|
ULTIMATE DREAM: +44 (0) 222-495-919
|
||||||
|
|
||||||
|
MEGA GREETZ GO TO THESE GUYZ:
|
||||||
|
|
||||||
|
.--------------------------------------.
|
||||||
|
| FIREFLY, TAS, SINTAX, OINK, VOLTAGE, |
|
||||||
|
| HYBRID, PUNISHER, CRAZYBYTE, GRAFFITI|
|
||||||
|
| AND OF COURSE EVERYONE WHO KNOWS ME, |
|
||||||
|
| AND ARE ALSO COOL HACKER - PHREAKERS |
|
||||||
|
`-.----------------------------------.-'
|
||||||
|
/ CAN SOMEONE DO ME A COOL ANSI ? TA.\
|
||||||
|
\____________________________________/
|
||||||
|
|
||||||
|
ARE YOU SITTING COMFORTABLY ?
|
||||||
|
-----------------------------
|
||||||
|
|
||||||
|
THEN I'LL BEGIN.
|
||||||
|
|
||||||
|
-----------------------------------------
|
||||||
|
1. Identifying Voice Mail System As CINDI
|
||||||
|
-----------------------------------------
|
||||||
|
|
||||||
|
When you have connected to your System, upon pressing #,
|
||||||
|
You should get a voice saying :
|
||||||
|
|
||||||
|
"Please enter the persons name using your touchtone keypad, last
|
||||||
|
name followed by first. To enter a Q or a Z push 1... etc etc.."
|
||||||
|
|
||||||
|
Also when you get kicked off the message will be:
|
||||||
|
|
||||||
|
"Thank You, Good-Day."
|
||||||
|
|
||||||
|
One of the most common phrases you are likely to hear will be:
|
||||||
|
|
||||||
|
"If you'd like to speak with someone press zero"
|
||||||
|
|
||||||
|
This is contained in almost all instruction lists.
|
||||||
|
|
||||||
|
----------------------------------------------
|
||||||
|
2. Ok So It's CINDI... So How Do I Find A Box?
|
||||||
|
----------------------------------------------
|
||||||
|
|
||||||
|
Mailboxes Are Going To Be Either 3 or 4 Digits.
|
||||||
|
|
||||||
|
The CINDI Mailboxes Mostly come in Blocks...
|
||||||
|
|
||||||
|
e.g. 860,861,862,865 etc
|
||||||
|
|
||||||
|
So When You Find One Person You Can Find Lots Of Others.
|
||||||
|
|
||||||
|
When Looking For Boxes The System Will Kick You Off If You Get A Box Number
|
||||||
|
Wrong After Three Tries.
|
||||||
|
|
||||||
|
The Three Possibilities For Mailboxes Are:
|
||||||
|
|
||||||
|
1: Invalid Box "Mailbox XXX Does Not Exist !"
|
||||||
|
2: The Greeting Of The Owner Will Play
|
||||||
|
3: It Will Say "Mailbox XXX"
|
||||||
|
|
||||||
|
Once You Have At Least One Valid Box Number Everything Is sooo EASY!
|
||||||
|
|
||||||
|
Upon Second Failure (Of Invalid Mailbox Number)Press Hash To Enter
|
||||||
|
Another Box Number. Now Enter A Valid Box Number.
|
||||||
|
If You Don't Want That Box You Can Press '0'
|
||||||
|
Then Instead Of entering Password You Can Press '#' To Enter Another Box
|
||||||
|
Number, Now There Is No Fear Of Being Cut Off.
|
||||||
|
|
||||||
|
Admin Boxes Are Found At Numbers Like 991, 900, 100, 101 although
|
||||||
|
Some Systems Require You To Press '0' As Soon As Connected.......
|
||||||
|
This Will Then Give You An 'Enter Passcode' Prompt.
|
||||||
|
|
||||||
|
----------------------------------------------------
|
||||||
|
3. Strategic Hacking Using The 'Fault' Of The System.
|
||||||
|
----------------------------------------------------
|
||||||
|
|
||||||
|
The easiest method to hack a box is as follows:
|
||||||
|
|
||||||
|
e.g. Mailbox you want to hack is 1000.
|
||||||
|
|
||||||
|
a. When the system asks you to enter your mailbox number enter: 1000.
|
||||||
|
b. When the message starts playing you can press '0' to stop.
|
||||||
|
c. The system will then ask you for a password.
|
||||||
|
d. The Default Password on a CINDI system is (LAME) '0'
|
||||||
|
Most Users will have passwords of:
|
||||||
|
|
||||||
|
Mailbox number.
|
||||||
|
'123 (4)'
|
||||||
|
1, 2, 3, --> 9..
|
||||||
|
|
||||||
|
Passwords Are 3/4 Digits...
|
||||||
|
|
||||||
|
Odds are at Least 1/8 Of users will have passwords like these..
|
||||||
|
|
||||||
|
e. If Password was wrong, then try another..
|
||||||
|
f. Upon 2nd Failed Attempt press '#' - This causes the system to give you
|
||||||
|
an 'Enter Mailbox' Prompt... You can repeat this Over, and Over...
|
||||||
|
The System Doesn't Kick You Off and you can find Them Boxes...
|
||||||
|
|
||||||
|
**** Nice Little Bug In The Software METHINKS!!!! ****
|
||||||
|
|
||||||
|
---------------------------------------------------------
|
||||||
|
4. WOW! That Was Easy... What Can I Do With My New BOX ??
|
||||||
|
---------------------------------------------------------
|
||||||
|
|
||||||
|
The Full Commands Available Are As Follows:
|
||||||
|
|
||||||
|
Upon Entering Yor Box You Can Select:
|
||||||
|
|
||||||
|
0 - TRANSFER TO ATTENDANT
|
||||||
|
1 - PLACE A CALL (To another mailbox)
|
||||||
|
2 - RECIEVE MESSAGES
|
||||||
|
3 - MESSAGE FORWARDING
|
||||||
|
4 - CALL PLACEMENTS
|
||||||
|
5 - GROUP MESSAGES
|
||||||
|
6 - CERTIFIED MESSAGES
|
||||||
|
7 - GUEST ACCOUNTS
|
||||||
|
8 - PERSONALISE MAILBOX
|
||||||
|
* - VOLUME. Quiet, Medium OR Loud.
|
||||||
|
====
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------
|
||||||
|
___
|
||||||
|
| |
|
||||||
|
| 0 | WILL ALMOST ALWAYS TAKE YOU TO THE ATTENDANT / OPERATOR
|
||||||
|
|___|
|
||||||
|
|
||||||
|
Lots Of CINDI System Operators Are Quite Stupid...
|
||||||
|
Don't Ask Me Why But This Is Fact....
|
||||||
|
Wind Them Up And Make Their Life Hell.
|
||||||
|
Or If Your Kind, Just Worm Info About Other Country Dialups Etc..
|
||||||
|
Use Your Imagination.
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------
|
||||||
|
___
|
||||||
|
| |
|
||||||
|
| 1 | PLACE A CALL
|
||||||
|
|___|
|
||||||
|
|
||||||
|
This Will Prompt You To Enter A Mailbox Number...
|
||||||
|
Then You Just Start Recording Your Message.
|
||||||
|
The Point Of This Is So That You Can Reply To Messages..
|
||||||
|
i.e. They Will Have Your Mailbox Number Recorded With Them
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------
|
||||||
|
___
|
||||||
|
| |
|
||||||
|
| 2 | RECIEVE MESSAGES
|
||||||
|
|___|
|
||||||
|
|
||||||
|
Yup, The Whole Point Of A VMB Is To Transfer Messages..
|
||||||
|
So Lets Look At The Available Options.
|
||||||
|
|
||||||
|
1 - Keep Message
|
||||||
|
2 - Repeat Message
|
||||||
|
3 - -10 Seconds
|
||||||
|
4 - +10 Seconds
|
||||||
|
5 - Skip Message
|
||||||
|
6 - Stop playback for 30secs.
|
||||||
|
7 - Take Action
|
||||||
|
---------------------------------------
|
||||||
|
PRESS:
|
||||||
|
|
||||||
|
1 - Copy Message With Comments
|
||||||
|
2 - Copy Message Without Comments
|
||||||
|
6 - Relay Info To Another Mailbox
|
||||||
|
7 - Respond To Sender
|
||||||
|
9 - Take NO Action
|
||||||
|
---------------------------------------
|
||||||
|
8 - Delete Message
|
||||||
|
9 - End Recieving
|
||||||
|
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------
|
||||||
|
___
|
||||||
|
| |
|
||||||
|
| 3 | MESSAGE FORWARDING
|
||||||
|
|___|
|
||||||
|
|
||||||
|
This Sends All New Messages To A Given Telephone Number.
|
||||||
|
Allows You To Enter Date, Time.. And How Often To Call.
|
||||||
|
|
||||||
|
1 - Enable Message Forwarding
|
||||||
|
2 - Review Message Forwarding Status
|
||||||
|
8 - Cancel Message Forwarding
|
||||||
|
9 - Exit
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------
|
||||||
|
___
|
||||||
|
| |
|
||||||
|
| 4 | CALL PLACEMENTS
|
||||||
|
|___|
|
||||||
|
|
||||||
|
This Allows You To Send A Message To A Telephone Number.
|
||||||
|
The Format For Entering Number Will Allow You To Enter Pauses,
|
||||||
|
Stars, and '#'. This Enables You To Call A PBX Using A Long String Of
|
||||||
|
Commands, And Get The System To Give You A Wake Up Call At Home,
|
||||||
|
Even If You Are Not In USA.....
|
||||||
|
|
||||||
|
One Thing To Remember Is, Once Call Has Been Made Or Not, Check Up
|
||||||
|
On The Status Of Messages And If A Call Couldn't Be Completed Then
|
||||||
|
Kill It As To Avoid Leaving Your Number On The System..
|
||||||
|
|
||||||
|
( Note On Some Systems Call Placement May Be Off Or Only Available
|
||||||
|
On Specific Mailboxes. Find Admin. Box And Turn It ON !)
|
||||||
|
|
||||||
|
1 - Place A Call
|
||||||
|
|
||||||
|
This Will Ask You To Enter The Telephone Number You Wish To Leave
|
||||||
|
A Message For.. The Systems I Have Found Only Call USA But This Is
|
||||||
|
Adequate Enough. You Can Enter Pauses ( ), '*' And '#'
|
||||||
|
|
||||||
|
You Will Then Be Prompted To Enter A Password For The Message.
|
||||||
|
This Is So That When The Number You Are Calling Answers They Have
|
||||||
|
To Enter A Password To Allow Them To Hear The Message..
|
||||||
|
If No Password Is Required Then Enter '0' As The Password.
|
||||||
|
|
||||||
|
2 - To Check Status Of Calls
|
||||||
|
9 - Exit
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------
|
||||||
|
___
|
||||||
|
| |
|
||||||
|
| 5 | GROUP MESSAGES
|
||||||
|
|___|
|
||||||
|
|
||||||
|
Allows You To Send A Message To Lots Of People At Once. If You Have
|
||||||
|
A Group With Everyone Listed In It The Chances Are That When You Send
|
||||||
|
A Message The System Will Crash.. (Mention No Names: TAS)
|
||||||
|
|
||||||
|
1 - Record A Group Message
|
||||||
|
3 - Add Members To A Group
|
||||||
|
4 - List A Group
|
||||||
|
8 - Delete A Group
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------
|
||||||
|
___
|
||||||
|
| |
|
||||||
|
| 6 | CERTIFIED MESSAGES
|
||||||
|
|___|
|
||||||
|
|
||||||
|
These Are Messages Which Once Read Will Cause The System To Send
|
||||||
|
The Sender A Message Which Says The Message Sent To:.. On ...
|
||||||
|
Has Been Recieved.
|
||||||
|
|
||||||
|
1 - Send A Certified Message
|
||||||
|
2 - Check Delivery Status Of A Message
|
||||||
|
8 - Cancel Notification Of A Message
|
||||||
|
This Stops The System From Sending A Message Once The Sent
|
||||||
|
Message Has Been Read.
|
||||||
|
|
||||||
|
9 - Exit
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------
|
||||||
|
___
|
||||||
|
| |
|
||||||
|
| 7 | GUEST ACCOUNTS
|
||||||
|
|___|
|
||||||
|
|
||||||
|
These Allow You To Record And Recieve Messages To And From Non
|
||||||
|
Subscribers (Heheh) To The System.
|
||||||
|
|
||||||
|
1 - Record A Guest Message
|
||||||
|
2 - Check Status Of A Message
|
||||||
|
3 - Open New Guest Account
|
||||||
|
4 - List Your Guests
|
||||||
|
8 - Delete A Guest
|
||||||
|
|
||||||
|
-----------------------------------------------------------------------
|
||||||
|
___
|
||||||
|
| |
|
||||||
|
| 8 | PERSONALISE MAILBOX
|
||||||
|
|___|
|
||||||
|
|
||||||
|
1 - Change Personal Greeting
|
||||||
|
2 - Change Password
|
||||||
|
3 - Change Name
|
||||||
|
4 - Recover System Bulletin
|
||||||
|
This Will Recover System Defaults For The Box.
|
||||||
|
|
||||||
|
5 - Check Message Waiting Notification Status
|
||||||
|
This Will Tell You If You Have New Messages.
|
||||||
|
-----------------------------
|
||||||
|
Press:
|
||||||
|
1 - Change
|
||||||
|
9 - Exit
|
||||||
|
|
||||||
|
-----------------------------
|
||||||
|
6 - Change Call Management Level
|
||||||
|
This Will Allow Your Calls To Be Screened.
|
||||||
|
|
||||||
|
-----------------------------
|
||||||
|
Press:
|
||||||
|
1 - Change
|
||||||
|
9 - Exit
|
||||||
|
|
||||||
|
-----------------------------
|
||||||
|
7 - Change Order Of Message Retrieval
|
||||||
|
-----------------------------
|
||||||
|
Press:
|
||||||
|
1 - Change
|
||||||
|
Last In First Out +
|
||||||
|
First In First Out
|
||||||
|
-----------------------------
|
||||||
|
9 - Exit.
|
||||||
|
-----------------------------------------------------------------------
|
||||||
|
|
||||||
|
CINDI Systems Are Fun.. Especially For OutDialling Messages....
|
||||||
|
If You Are ALONE ! (awww!) You Can Get The System To Send All Messages
|
||||||
|
At A Specific Time To One Side Of A Loop.. Where You Will Be Waiting
|
||||||
|
On The Other Side... The Possibilities Are Endless... Wake Up Calls.. etc.
|
||||||
|
|
||||||
|
|
||||||
|
I Hope This Was As/More Helpful Than The ASPENTUT.TXT, If You
|
||||||
|
Don't Have That Then Download It NOW From One Of The Boards Listed
|
||||||
|
At the Top Of This TextFile...
|
||||||
|
|
||||||
|
Good Luck And HAPPY HACKING !!!!!!!!!!!!!!
|
||||||
|
.. ..
|
||||||
|
\ /
|
||||||
|
/\/\/\/\
|
||||||
|
| ## |
|
||||||
|
[| .. |] ROBBIE THE ROBOT SAY'S HELLLOOOOOOOOOOOO.
|
||||||
|
|________|
|
||||||
|
\|-|-|-|-/ <In A Monotone Sort Of Voice >
|
||||||
|
--------
|
||||||
|
___|--|___ ..
|
||||||
|
/ \ {<>} < Do You Like His Frog Puppet ? >
|
||||||
|
/ | /\/\ | \/ /
|
||||||
|
/ / | \/\/ | \ /
|
||||||
|
-----------------------------------------------------------------------
|
||||||
|
The Next Bit Is Where The TEXT ADDERS Do Their Worst:
|
||||||
|
-----------------------------------------------------------------------
|
||||||
|
|
||||||
|
|
||||||
|
|
87
textfiles.com/phreak/VOICEMAIL/hack6
Normal file
87
textfiles.com/phreak/VOICEMAIL/hack6
Normal file
@@ -0,0 +1,87 @@
|
|||||||
|
Hacking Voice Mail Systems
|
||||||
|
|
||||||
|
Voice Mail is a relatively new concept and not much has been said about it.
|
||||||
|
It is a very useful tool for the business person and the phreak. The way it
|
||||||
|
works is that somebody wishing to get in touch with you calls a number,
|
||||||
|
usually a 1-800, and punches in on his touch-pad your mailbox number and then
|
||||||
|
he is able to leave a message for you. Business experts report that this
|
||||||
|
almost totally eliminates telephone tag. When a person wishes to pick up his
|
||||||
|
message all he needs to do is call the number enter a certain code and he can
|
||||||
|
hear his messages, transfer them, and do other misc. mailbox utilities.
|
||||||
|
|
||||||
|
Most VMSs are similar in the way they work. There are a few different ways
|
||||||
|
the VMSs store the voice. One way is that the voice is recorded digitally and
|
||||||
|
compressed and when heard it is reproduced back into the voice that recorded
|
||||||
|
it. Another method that is slower and uses more space, but costs less, stores
|
||||||
|
the voice on magnetic tape, the same type that is used to store data on a
|
||||||
|
computer, and then runs the tape at a slow speed. Using this method the voice
|
||||||
|
does not need to be reproduced in any way and will sound normal as long as the
|
||||||
|
tape is running at a constant speed. On some of the newer VMSs the voice is
|
||||||
|
digitally recorded and is transformed from the magnetic tape at about 2400
|
||||||
|
bits per second.
|
||||||
|
|
||||||
|
There are many different types and versions of voice mail systems. Some of
|
||||||
|
the best and easiest to get on will be discussed.
|
||||||
|
|
||||||
|
Centagram
|
||||||
|
---------
|
||||||
|
These are direct dial (you don't have to enter a box number). To get on one
|
||||||
|
of these, first have a number to any box on the system. All of the other
|
||||||
|
boxes will be on the same prefix; just start scanning them until you find one
|
||||||
|
that has a message saying that person you are calling is not available. This
|
||||||
|
usually means that the box has not been assigned to anybody yet. Before the
|
||||||
|
nice lady's voice tells you to leave the message, hit #. You will then be
|
||||||
|
prompted for your password. The password will usually be the same as the last
|
||||||
|
four digits of the box's number or a simple number like 1000, 2000, etc. Once
|
||||||
|
you get on, they are very user friendly and will prompt you with a menu of
|
||||||
|
options. If you can't find any empty boxes or want to do more, you can hack
|
||||||
|
but the system administrators box, which will usually be 9999 on the same
|
||||||
|
prefix as the other boxes, will allow you to hear anybody's messages and
|
||||||
|
create and delete boxes.
|
||||||
|
|
||||||
|
Sperry Link
|
||||||
|
-----------
|
||||||
|
These systems are very nice. They will usually be found on an 800 number.
|
||||||
|
These are one of the hardest to get a box on because you must hack out a user
|
||||||
|
ID (different from the person's box number) and a password. When it answers,
|
||||||
|
if it says, "This is a Sperry Link voice station. Please enter your user ID,"
|
||||||
|
you will have to start trying to find a valid user ID. On most Sperrys it
|
||||||
|
will be a five digit number. If it answers and says, "This is an X answering
|
||||||
|
service," you first have to hit *# to get the user number prompt. Once you
|
||||||
|
get a valid user number will have to guess the password on most systems, it
|
||||||
|
will be 4 digits. Once you get in, these are also very user friendly and have
|
||||||
|
many different options available.
|
||||||
|
|
||||||
|
RSVP
|
||||||
|
----
|
||||||
|
This is probably one of the worst VMSs but it is by far the easiest to get
|
||||||
|
yourself a box. When it answers you can hit * for a directory of the boxes on
|
||||||
|
it (it will only hold 23). If you hit # you will be given a menu of options
|
||||||
|
and when you choose an option you will then be prompted for your ID number.
|
||||||
|
The ID number on an RSVP system will just about always be the same as the
|
||||||
|
mailbox number, which are always only 2 digits.
|
||||||
|
|
||||||
|
A.S.P.E.N.
|
||||||
|
----------
|
||||||
|
The Aspen voice message systems made by Octel Telecommunications is in my
|
||||||
|
opinion the BEST VMS made. To get a box on an Aspen, you need to find an
|
||||||
|
empty box. To find an empty box, scan the box numbers and if one says, "You
|
||||||
|
entered XXXX. Please leave a message at the tone," then this is an empty box.
|
||||||
|
You next just press # and when prompted for your box number enter the number
|
||||||
|
of the empty box and friendly voice of the nice lady will guide you through
|
||||||
|
all of the steps of setting up your box. She first tells you what you can do
|
||||||
|
with the box and then will prompt you with, "Please enter the temporary
|
||||||
|
password assigned to you by your system manager." This password will usually
|
||||||
|
be 4 digits long and the same as the box number like 1000, etc. Once you get
|
||||||
|
on their are many things you can do. You can make a distribution list where
|
||||||
|
if you want to leave a certain message to more than one person, you can enter
|
||||||
|
the list number and all of the boxes on the list will get the message. You can
|
||||||
|
also have the system call you and notify you that you have new messages. These
|
||||||
|
systems also have what they call "Information center mailboxes" that are
|
||||||
|
listen only and can also have a password on them so the person calling has to
|
||||||
|
enter the password before he hears the greeting message. Aspen VMSs have a
|
||||||
|
system managers mailbox that will just about give you total control of the
|
||||||
|
whole system and let you listen to people's mail, create and delete boxes, and
|
||||||
|
many other things.
|
||||||
|
|
||||||
|
|
265
textfiles.com/phreak/VOICEMAIL/hackam1990.txt
Normal file
265
textfiles.com/phreak/VOICEMAIL/hackam1990.txt
Normal file
@@ -0,0 +1,265 @@
|
|||||||
|
|
||||||
|
*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
|
||||||
|
Hacking Answering Machines 1990
|
||||||
|
*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
|
||||||
|
by: Predat0r of Blitzkrieg Bbs 502/499-8933
|
||||||
|
|
||||||
|
|
||||||
|
AT&T reports that in the year 1990, 11 million people
|
||||||
|
will buy an answering machine for their home use. In 1989, 10
|
||||||
|
million machines were sold. Everyone has called up a person
|
||||||
|
at one time or another and got the old "leave your name at
|
||||||
|
the beep" message. With this increase in homes using these
|
||||||
|
machines there is also a new form of hacking developing. One
|
||||||
|
of hacking an answering machine.
|
||||||
|
|
||||||
|
Why would anyone even want to hack an answering machine
|
||||||
|
and for what purpose? There are many reasons and things you
|
||||||
|
can do once you have control of someone elses machine. If for
|
||||||
|
some reason you need to spy on a business or person you can
|
||||||
|
hack their machine and take control using the information for
|
||||||
|
your own personal use. There is also the old "change the
|
||||||
|
message" secret to make it say something to the effect of
|
||||||
|
this line accepts all toll charges so you can bill third
|
||||||
|
party calls to that number. You can also use an answering
|
||||||
|
machine for your own personal use, as in making it your own
|
||||||
|
voice mail type system for people to call. Only do this if
|
||||||
|
you know someone is out of town. If they come home from
|
||||||
|
shopping and find their machine changed it might cause
|
||||||
|
problems. With these basic ideas in mind you can see hacking
|
||||||
|
an answering machine could be very useful to certain
|
||||||
|
individuals.
|
||||||
|
|
||||||
|
How can a person hack an answering machine? Well most
|
||||||
|
answering machines built now have remote access features
|
||||||
|
which allow the owner, or anyone to call in and press a
|
||||||
|
security code to play their messages. This is where the fun
|
||||||
|
begins. Some older models don't have remote access so you
|
||||||
|
cannot do anything to them. Also if you know someone has a
|
||||||
|
machine but you call and it doesn't answer, let the phone
|
||||||
|
ring about 15 times. This will tell the machine to turn
|
||||||
|
itself on, so you can hack it. The actual number varies
|
||||||
|
between machines.
|
||||||
|
|
||||||
|
To practice hacking some machines i will show you how to
|
||||||
|
get remote access on a few models. Just look and see what
|
||||||
|
kind your friend has and hack it for starters.
|
||||||
|
|
||||||
|
Record a Call- Model 2120
|
||||||
|
-------------------------
|
||||||
|
Call in and during the message or after the beep tone to
|
||||||
|
leave a message enter the 3 digit security code. Which you
|
||||||
|
must find yourself. This will rewind the tape and play all
|
||||||
|
new messages. Press 2 to backspace and repeat the last
|
||||||
|
message. Press 3 to fast foward the tape.
|
||||||
|
|
||||||
|
Changing your message from remote. Call your phone and enter
|
||||||
|
the secret code. After several rapid beeps enter your secret
|
||||||
|
code again. After a short delay you will hear a long tone.
|
||||||
|
After the tone ends begin speaking your message which may be
|
||||||
|
17 seconds in length. When finished press the second digit of
|
||||||
|
your secret code to end. The machine will then save your
|
||||||
|
message and play it back. To turn the unit on from remote let
|
||||||
|
it ring 11 times then hangup. Or stay on and it will answer
|
||||||
|
so you can access the machine. For express calls or frequent
|
||||||
|
calls hit the second digit for two seconds to skip the out
|
||||||
|
going message announcement.
|
||||||
|
|
||||||
|
Goldstar- Models 6000/6100
|
||||||
|
--------------------------
|
||||||
|
Call and enter your 1 digit secret code after you hear the
|
||||||
|
out going message announcement. The machine will then play
|
||||||
|
back new messages. Hangup to save messages or after all
|
||||||
|
messages have been played the machine will give a double
|
||||||
|
beeptone, you may enter your code to erase all messages.
|
||||||
|
You cannot change the out going message on this unit.
|
||||||
|
|
||||||
|
Cobra- Model AN-8521
|
||||||
|
--------------------
|
||||||
|
For this machine there are 2 codes. Both are one digit in
|
||||||
|
length. The first one is the play code. The second is to
|
||||||
|
erase messages from remote. After the outgoing message and
|
||||||
|
beeptone press the play code for 2 seconds to play messages.
|
||||||
|
After each message ends there will be a single beep. At the
|
||||||
|
end of all message it will beep twice. You may then do the
|
||||||
|
following. Replay by pressing the play code again. Erase
|
||||||
|
messages by pressing the erase code. Hang-up and save
|
||||||
|
messages and continue to take additional calls. To turn this
|
||||||
|
unit on from remote you must let it ring 16 times before it
|
||||||
|
will activate. If it rings 10 times then you hear 3 beeps it
|
||||||
|
is full and messages need to be erased.
|
||||||
|
|
||||||
|
Uniden- Model AM 464
|
||||||
|
--------------------
|
||||||
|
This model is one of the more advanced when it comes to
|
||||||
|
remote capabilities. The factory preset security code is 747.
|
||||||
|
This can be changed to as many as five digits of your choice.
|
||||||
|
To gain access from remote type your security code while the
|
||||||
|
outgoing message is playing. Press 1 after hearing the tone
|
||||||
|
and the machine will rewind and play your messages. To fast
|
||||||
|
foward press 7, to resume normal playback press 8. To stop
|
||||||
|
the messages from playing press 8 again. Press 8 to restart
|
||||||
|
the messages or 1 to start from the beginning again. Press 9
|
||||||
|
to rewind and 8 to resume playing. If you rewind all the way
|
||||||
|
it will beep twice. You need to press 1 to play messages.To
|
||||||
|
save messages press 4. To erase press 6. To turn the machine
|
||||||
|
off from remote press 5 after all messages have been played
|
||||||
|
and the machine beeps twice. To turn the machine on from
|
||||||
|
remote let the phone ring 12 to 14 times. The machine will
|
||||||
|
beep and then you enter your remote code. This will then turn
|
||||||
|
your machine to answer mode. This machine also has room
|
||||||
|
monitor options. This allows you to listen to what is going
|
||||||
|
on in the room of the machine. To do this call the machine
|
||||||
|
enter your security code after the beep press 0. The monitor
|
||||||
|
stays on for 60 seconds. You will be warned with 2 beeps at
|
||||||
|
45 seconds. To continue press 0 again.To change the outgoing
|
||||||
|
message from remote erase all the messages. Then call back
|
||||||
|
and enter your code after the tone press 3. It will beep
|
||||||
|
again and you may then leave your new message. Press 3 when
|
||||||
|
finished. To change the security code from remote after the
|
||||||
|
beep press # then 1 after the next beep enter your new code
|
||||||
|
followed by the # again. There is also a call break through
|
||||||
|
where you enter 256 while the outgoing message is playing.
|
||||||
|
This will alarm the persons in the house someone is calling
|
||||||
|
with a series of loud beeps. Press the * key to stop.
|
||||||
|
|
||||||
|
Code-a-phone Model 930
|
||||||
|
----------------------
|
||||||
|
To access from remote call and enter your security code after
|
||||||
|
the announcement and tone. Press your code for 3 full
|
||||||
|
seconds. After the new messages have been played you will
|
||||||
|
hear 2 tones. You may then save messages by pressing your
|
||||||
|
code then hanging up. repeat by entering code wait for 4
|
||||||
|
tones then enter code again. To erase message hangup when the
|
||||||
|
tape is done playing. To turn the machine on from remote call
|
||||||
|
and let ring ten times. When the system answers it will have
|
||||||
|
a two second tone. Press your security code. You will hear
|
||||||
|
three double tones to let you know the system is on.
|
||||||
|
|
||||||
|
Unisonic- Model 8720
|
||||||
|
--------------------
|
||||||
|
One digit code entered after the outgoing message and tone
|
||||||
|
will allow you to hear messages. To change message wait till
|
||||||
|
all new messages have been played 2 beep tones will be heard.
|
||||||
|
Press code for four seconds. Two beeps will be heard then the
|
||||||
|
tape will rewind and beep again. Now leave the new message.
|
||||||
|
Press your code when finished to save new outgoing message.
|
||||||
|
New message will play for you to hear.
|
||||||
|
|
||||||
|
Panasonic- Model KX-T2427
|
||||||
|
-------------------------
|
||||||
|
Call and enter the three digit code during the outgoing
|
||||||
|
message. Machine will beep once, then beep amount of times
|
||||||
|
equal to messages. Then rewind and play messages. There will
|
||||||
|
be three beeps after the last message. Six beeps means the
|
||||||
|
tape is full. Press 2 to foward. Press 1 to rewind. Press 3
|
||||||
|
to reset machine and erase messages. To monitor the room
|
||||||
|
press 5 after the beeps indicating the number of messages the
|
||||||
|
machine has. Press 7 to change the outgoing message, it will
|
||||||
|
beep a few quick times rewind then a long beep will be heard.
|
||||||
|
Leave new message press 9 when finished. Press 0 right after
|
||||||
|
the beep tones to shut the machine off. To turn the machine
|
||||||
|
on let it ring 15 times then hangup after machine turns on.
|
||||||
|
|
||||||
|
Panasonic- Model KX-T2385d
|
||||||
|
--------------------------
|
||||||
|
During the outgoing message enter the 1 digit code. This will
|
||||||
|
playback messages. Press the code again to rewind. After the
|
||||||
|
messages have played the machine will beep three times. Press
|
||||||
|
your code again and it will reset the machine. For remote
|
||||||
|
turn on let phone ring 15 times. Then after the outgoing
|
||||||
|
message hangup.
|
||||||
|
|
||||||
|
AT&T- Model 1504
|
||||||
|
----------------
|
||||||
|
Enter 2 digit code before or after announcement. System will
|
||||||
|
beep after each message and five times when messages are
|
||||||
|
done. Press the # key anytime to pause. Hanging up will save
|
||||||
|
messages. Press 7 and it will rewind and play messages again.
|
||||||
|
Press 5 to fast foward. Press 2 to rewind. Press 33 after all
|
||||||
|
messages have been played to reset without saving messages.
|
||||||
|
To record onto the tape press * after the system answers.
|
||||||
|
This will then beep and you may leave a four minute message
|
||||||
|
on the tape. Press # when done. This is not an outgoing
|
||||||
|
message announcement, only a memo. To turn on from remote let
|
||||||
|
ring ten times press 0 when system answers. To turn the
|
||||||
|
system off dial and enter your code. Press 88 and it will
|
||||||
|
shut the machine down.
|
||||||
|
|
||||||
|
Phonemate- Model 4050
|
||||||
|
---------------------
|
||||||
|
Enter your 3 digit code during the outgoing message. Pressing
|
||||||
|
* or # will allow you to scan through the messages. When
|
||||||
|
finished pressing 1 will replay the messages. Pressing 2 will
|
||||||
|
erase them. To turn on from remote let ring for 15 times.
|
||||||
|
Then proceed with remote operations.
|
||||||
|
|
||||||
|
Phonemate- Model 7200
|
||||||
|
---------------------
|
||||||
|
Enter 1 digit code during of after the outgoing message. A
|
||||||
|
voice will tell you how many messages you have, then play
|
||||||
|
them back for you. To rewind press your code and hold it for
|
||||||
|
however long you want to rewind. Let go and it will resume
|
||||||
|
playing. After the last message a voice will prompt you with
|
||||||
|
a list of options. You have five seconds to respond or it
|
||||||
|
will proceed to the next option. These are as follows. The
|
||||||
|
first is hanging up to save messages. Next is enter code to
|
||||||
|
replay messages. Next enter code to erase messages. Last is
|
||||||
|
enter code to change greeting. Follow the voice and it will
|
||||||
|
give you complete directions on exact steps to follow. To
|
||||||
|
turn on from remote let ring ten times then hang up. If tape
|
||||||
|
is full it will say sorry tape is full, enter code and erase
|
||||||
|
messages.
|
||||||
|
|
||||||
|
Spectra Phone- Model ITD300
|
||||||
|
---------------------------
|
||||||
|
Enter your 1 digit code after the greeting. Messages will
|
||||||
|
play back. Hanging up will save them. Or wait for four beeps
|
||||||
|
and press your code to replay them. To erase press your code
|
||||||
|
after 2 beeps. To turn the machine on from remote let it ring
|
||||||
|
10 times.
|
||||||
|
|
||||||
|
Notes: Outgoing message and greeting is what you hear when
|
||||||
|
you first call. Code is your personal security code.
|
||||||
|
|
||||||
|
Hacking answering machines can be very easy. It can also help
|
||||||
|
you obtain valuable information. If you have a targeted
|
||||||
|
machine you can try going to a store and saying you just
|
||||||
|
bought one and it didn't have instructions in the box. They
|
||||||
|
will usually give you a set or make copies for you. This
|
||||||
|
basic guide is just to introduce you to answering machine
|
||||||
|
hacking and changing the outgoing message and listening to
|
||||||
|
messages left by callers. To keep your own machine safe
|
||||||
|
purchase one with a changeable security code of 3 or more
|
||||||
|
digits. Most home machines are of the 1 digit type and are
|
||||||
|
easy to hack. I have no knwoledge of the laws concerning
|
||||||
|
hacking into someones answering machine. I am sure once it
|
||||||
|
becomes more common we will find out. Of course this article
|
||||||
|
is for informational purposes only so you would never have to
|
||||||
|
find out the actual laws.
|
||||||
|
|
||||||
|
Taken from TAP Magazine Issue #100
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
|
||||||
|
|
||||||
|
Another file downloaded from: NIRVANAnet(tm)
|
||||||
|
|
||||||
|
& the Temple of the Screaming Electron Jeff Hunter 510-935-5845
|
||||||
|
The Salted Slug Strange 408-454-9368
|
||||||
|
Burn This Flag Zardoz 408-363-9766
|
||||||
|
realitycheck Poindexter Fortran 510-527-1662
|
||||||
|
Lies Unlimited Mick Freen 415-583-4102
|
||||||
|
Tomorrow's 0rder of Magnitude Finger_Man 415-961-9315
|
||||||
|
My Dog Bit Jesus Suzanne D'Fault 510-658-8078
|
||||||
|
New Dork Sublime Demented Pimiento 415-566-0126
|
||||||
|
|
||||||
|
Specializing in conversations, obscure information, high explosives,
|
||||||
|
arcane knowledge, political extremism, diverse sexuality,
|
||||||
|
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.
|
||||||
|
|
||||||
|
Full access for first-time callers. We don't want to know who you are,
|
||||||
|
where you live, or what your phone number is. We are not Big Brother.
|
||||||
|
|
||||||
|
"Raw Data for Raw Nerves"
|
202
textfiles.com/phreak/VOICEMAIL/hackvmb.txt
Normal file
202
textfiles.com/phreak/VOICEMAIL/hackvmb.txt
Normal file
@@ -0,0 +1,202 @@
|
|||||||
|
|
||||||
|
Hacking & Scanning Voice Mail Boxes: The Tutorial
|
||||||
|
|
||||||
|
|
||||||
|
Hello again, and welcome to another Legions of Lucifer text phile! This
|
||||||
|
text file has to do with hacking and scanning VMBs. The reason I am writing
|
||||||
|
this phile is because I am very good at it, and have had years of experience.
|
||||||
|
Infact I have been called by MCI for screwing them over by attacking and
|
||||||
|
taking over a whole damn system with a few friends of mine.
|
||||||
|
|
||||||
|
Anyways, hacking VMBs is very simple and basically safe, and not only that
|
||||||
|
but they are kewl to have around. You can give them to friends, you can
|
||||||
|
trade them for access on bulletin boards, or you can use it for yourself.
|
||||||
|
As for this 'Tutorial on Hacking VMBs', we will be talking about what systems
|
||||||
|
to hack, how you go about hacking them, default passwords, hints on better
|
||||||
|
scanning, and having your very own box.
|
||||||
|
|
||||||
|
|
||||||
|
Basics:
|
||||||
|
|
||||||
|
VMB, in case you don't know, stands for 'Voice Mail Box'. Now a VMB is
|
||||||
|
like an answering machine. You can use it for all sorts of things. Most
|
||||||
|
VMB systems are dialed though 800 numbers. People call up the VMB system
|
||||||
|
that you have a box on, and dial in your box number and then leave you a
|
||||||
|
message. Whenever you want to check your box, you just call up, enter your
|
||||||
|
password and read your messages. Inside a VMB you can do whatever, you can
|
||||||
|
leave messages to others on the system, you can change your 'Out Going'
|
||||||
|
message, you can have guest boxes (Explained later), you can have the box
|
||||||
|
call your house when you get an Urgent message, you can do a lot of things.
|
||||||
|
Infact, on some systems you can even CALL OUT through them, so they can be
|
||||||
|
used as a code of sorts! They are cool to have.
|
||||||
|
|
||||||
|
|
||||||
|
What Type of System You Should Scan/Hack:
|
||||||
|
|
||||||
|
You should scan/hack out Virgin Systems, this is another way of calling a
|
||||||
|
system that hasn't been hack out yet. Also, CINDI Systems and ASPEN Systems
|
||||||
|
have the best boxes and the most options that VMB Systems can offer. I will
|
||||||
|
be talking about ASPEN System today since I know most about those.
|
||||||
|
|
||||||
|
|
||||||
|
Scanning Your 'Virgin ASPEN VMB System':
|
||||||
|
|
||||||
|
Okay once you've found your Virgin VMB System, you start to scan. Just incase
|
||||||
|
you don't know what scanning is, that means you search for boxes that are
|
||||||
|
hackable (Explained later on). Now you dial up the system and when it picks
|
||||||
|
up and the bitch starts to talk, press the "#" key. It will then ask you for
|
||||||
|
your box number... now there are two different way the ASPEN System can be
|
||||||
|
configured: 1) a "3 Digit Box Number System" or 2) a "4 Digit Box Number
|
||||||
|
System". Now lets just say this system is a 3 Digit System. Okay, when it
|
||||||
|
asks for your Box Number, enter in 999, now it will say one of three things:
|
||||||
|
[These are known as 'Greeting Names']
|
||||||
|
1. John Doe [Box owners name]
|
||||||
|
2. "Box Number 999 Is Not a Valid Box Number"
|
||||||
|
3. "Box Number 999"
|
||||||
|
Now, if it eithers says 1 or 2, go to box number 998...997...996...995..etc,
|
||||||
|
but if it says 3, then you are lucky, now it will ask you for your password,
|
||||||
|
now you are probably saying 'Shit this is where it gets difficult'... well
|
||||||
|
you are WRONG! This part is easy. Here is a list of ASPEN Default Passwords:
|
||||||
|
|
||||||
|
* We will use box number 666 as an example box #
|
||||||
|
[ BN = Box Number ]
|
||||||
|
|
||||||
|
List of Default Password: Combination Result
|
||||||
|
|
||||||
|
1-BN 1666
|
||||||
|
BN+1 667
|
||||||
|
0-BN 0666
|
||||||
|
BN-0 6660
|
||||||
|
Most Common BN 666
|
||||||
|
|
||||||
|
Now enter in a those defaults, try JUST the Box Number first, ASPENs usually
|
||||||
|
use that most. Now, if you try all those Defaults and still can not get into
|
||||||
|
that Voice Mail Box, then that means that the box has been already taken, but
|
||||||
|
the owner hasn't changed his 'Generic Message', if you don't get in, you
|
||||||
|
will just have to search until you get in.
|
||||||
|
|
||||||
|
|
||||||
|
Once You Get Into a Box:
|
||||||
|
|
||||||
|
Okay, once you get your first box, *DO NOT* change anything!! That will come
|
||||||
|
later. Your first box is, as what is known as a 'Scanning Box'! What you do
|
||||||
|
with your Scanning Box is this: You enter "3" from the main commands menu,
|
||||||
|
and it will ask you for the box number. Now that command is the "Check for
|
||||||
|
Reciept" command, what it does it check Box #xxx for mail from you. This
|
||||||
|
command is very convienient for us VMB Hackers. To use that command to your
|
||||||
|
advantage, you enter in box a box number and it will say 1 of the three
|
||||||
|
'Greeting Names', like before, if it say #3, then you write down that Box
|
||||||
|
Number and hack it later. But if it says 1 or 2, then just keep scanning!
|
||||||
|
All boxes with the number 3 Greeting Name is known as a 'Hackable Box'.
|
||||||
|
Now you keep scanning until you have gone all the way down to Box number 000
|
||||||
|
or whatever is the lowest box it supports. Now, once you have your list this
|
||||||
|
is when all the fun starts! Now you are ready to hack!
|
||||||
|
|
||||||
|
|
||||||
|
Hacking Out Your New Found 'Hackable' Boxes:
|
||||||
|
|
||||||
|
Okay this is the easy part. After you spent most of your time by scanning
|
||||||
|
the system you should be used to the system and how it works, that should
|
||||||
|
make hacking the ASPEN all the easier. Now, if you had a 'Scanning Box', you
|
||||||
|
should know what the default password was for your Scanning Box. Well if the
|
||||||
|
password for your Scanning Box was just the Box Number, then *EVERY* other
|
||||||
|
hackable box should have the SAME default password. VMB Systems have only
|
||||||
|
one default password, If one box has the BN for a Default PW, the all the
|
||||||
|
others will too.
|
||||||
|
|
||||||
|
Okay, you call up the VMB System will the list of 'Hackable' boxes by your
|
||||||
|
side, and when the bitch is talking, press the "#" key. When it asks you for
|
||||||
|
your box number, enter in the first box number on your list. When it asks for
|
||||||
|
your password, enter in the Default Password Sequence. Now if you don't get
|
||||||
|
into that box, it's not a problem, just keep going down your list. You should
|
||||||
|
get into a few. But remember, just because a box is marked 'Hackable', it
|
||||||
|
doesn't mean you will definatly get into it.
|
||||||
|
|
||||||
|
Okay, now you have a few dozen boxes. You can now use you Scanning Box to do
|
||||||
|
whatever you please.
|
||||||
|
|
||||||
|
|
||||||
|
ASPEN Guest Boxes:
|
||||||
|
|
||||||
|
Once you have a box of your own, you can give out 'Guest Boxes'. Guest Boxes
|
||||||
|
are like Sub Boxes in your box. In ASPEN you have 4 of them. If you give out
|
||||||
|
Guest Box #1 to John Doe, Mr. Doe can call in, enter in the password YOU set
|
||||||
|
for him, and leave you messages, but not only that, you can leave messages
|
||||||
|
to HIM! Which means, if his is in New York, and you are in California, and
|
||||||
|
neither of you have codes to call eachother, then you can leave messages thru
|
||||||
|
your 800 VMB. Here is a list and explination of all 4 of the Guest Boxes:
|
||||||
|
|
||||||
|
0. Main Box - Your Voice Mail Box!
|
||||||
|
1. Guest Box #1 - Can Leave & Recieve Messagez
|
||||||
|
2. Guest Box #2 - Can Leave & Recieve Messagez
|
||||||
|
3. Home Box - Can Leave & Recieve Messagez
|
||||||
|
4. Secretary Box - Can Check How Many Messagez You
|
||||||
|
Have & Receive Messagez
|
||||||
|
|
||||||
|
|
||||||
|
Hints On Better Scanning:
|
||||||
|
|
||||||
|
A lot of people say hacking and scanning for VMBs is too damn hard... well
|
||||||
|
that's because they are going at it all wrong, they probably read some lame
|
||||||
|
piece of shit text file on Hacking VMBs that was about 500 bytes long. Well,
|
||||||
|
here is a small list of hints on better scanning and hacking:
|
||||||
|
|
||||||
|
1. Do not use a Voice Mail Box hacking/scanning program
|
||||||
|
(ei: VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..)
|
||||||
|
2. Do not hack in random order (ei: B#999, 345, 810, etc)
|
||||||
|
Always hack in order: 999, 998, 997, 996, 995...000.
|
||||||
|
3. Try to find out if it's virgin. The newer the System,
|
||||||
|
the better.
|
||||||
|
4. If you have a phone with memory dial, change one entry
|
||||||
|
to the number of the VMB System.
|
||||||
|
5. Don't hack the System Managers box unless you really
|
||||||
|
want to.
|
||||||
|
|
||||||
|
|
||||||
|
Ideas of Things To Do With Your Extra Boxez:
|
||||||
|
|
||||||
|
Well since you can have up to 500 extra Voice Mail Boxes, you might
|
||||||
|
not know what to do with them, here are a few ideas that can help you out:
|
||||||
|
|
||||||
|
1. Give them to friends
|
||||||
|
2. Sell them to friends
|
||||||
|
3. Offer them to sysops for
|
||||||
|
for better access
|
||||||
|
4. Trade them for HSTs or
|
||||||
|
whatever
|
||||||
|
5. Use them as a Voice Verifing line (So you don't have to give out
|
||||||
|
your real voice number to BBSes when you apply!)
|
||||||
|
|
||||||
|
|
||||||
|
Well, that's it to the Legions of Lucifer Hacking & Scanning Voice Mail Box
|
||||||
|
Systems Tutorial! I hope it helped you and I, along with L.o.L wish you the
|
||||||
|
best of luck with your new found hobby! And remeber if you found this text
|
||||||
|
of any help, please spread it around to help others! Also, if you think you
|
||||||
|
are any good at writing H/P, please apply to be a Member! Call the L.o.L Home
|
||||||
|
at:
|
||||||
|
|
||||||
|
Digital Hackers Network
|
||||||
|
Legions of Lucifer HeadQuarters/Home
|
||||||
|
No Warez! A truely serious Hack/Phreak board
|
||||||
|
Hack, Phreak, Scanning, Phraud, Crashing disscusions
|
||||||
|
Viral Research & Development Sections (500+ Virii!)
|
||||||
|
"Personalized ANSi Bombs" made by request
|
||||||
|
Running AfterShock v1.20 - 2400 Baud
|
||||||
|
PH: 213-274-1333
|
||||||
|
|
||||||
|
Call these Legions of Lucifer support boards for information or application
|
||||||
|
inquiries:
|
||||||
|
|
||||||
|
Digital Hackers Network 213/274+1333 L.o.L HeadQuaters/Home
|
||||||
|
Electric Eye ][ 313/776+8928 L.o.L Distribution Site #1
|
||||||
|
Digital Information Exchange 612/356+2209 L.o.L Distribution Site #2
|
||||||
|
Legions of Lucifer High Office Members:
|
||||||
|
|
||||||
|
Prezident/Founder: Wave Runner!
|
||||||
|
Vice Prezident : Count_Zer0
|
||||||
|
|
||||||
|
This text file is (C)Copyrite 1990 L.o.L Inc.
|
||||||
|
L.o.L is a registered trademark of DHN, All rights reserved
|
||||||
|
Any modifications to this text file is a violation of copyrite.
|
||||||
|
Digital Hackers Network 213/274+1333 -=L.o.L Home=-
|
||||||
|
|
210
textfiles.com/phreak/VOICEMAIL/lol12.txt
Normal file
210
textfiles.com/phreak/VOICEMAIL/lol12.txt
Normal file
@@ -0,0 +1,210 @@
|
|||||||
|
The THC Hack/Phreak Archives: LOL12.TXT (205 lines)
|
||||||
|
Note: I did not write any of these textfiles. They are being posted from
|
||||||
|
the archive as a public service only - any copyrights belong to the
|
||||||
|
authors. See the footer for important information.
|
||||||
|
==========================================================================
|
||||||
|
|
||||||
|
Hacking & Scanning Voice Mail Boxes: The Tutorial
|
||||||
|
|
||||||
|
Hello again, and welcome to another <20>egions <20>f <20>ucifer text phile! This
|
||||||
|
text file has to do with hacking and scanning VMBs. The reason I am writing
|
||||||
|
this phile is because I am very good at it, and have had years of experience.
|
||||||
|
Infact I have been called by MCI for screwing them over by attacking and
|
||||||
|
taking over a whole damn system with a few friends of mine.
|
||||||
|
|
||||||
|
Anyways, hacking VMBs is very simple and basically safe, and not only that
|
||||||
|
but they are kewl to have around. You can give them to friends, you can
|
||||||
|
trade them for access on bulletin boards, or you can use it for yourself.
|
||||||
|
As for this 'Tutorial on Hacking VMBs', we will be talking about what systems
|
||||||
|
to hack, how you go about hacking them, default passwords, hints on better
|
||||||
|
scanning, and having your very own box.
|
||||||
|
|
||||||
|
|
||||||
|
Basics:
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
VMB, in case you don't know, stands for 'Voice Mail Box'. Now a VMB is
|
||||||
|
like an answering machine. You can use it for all sorts of things. Most
|
||||||
|
VMB systems are dialed though 800 numbers. People call up the VMB system
|
||||||
|
that you have a box on, and dial in your box number and then leave you a
|
||||||
|
message. Whenever you want to check your box, you just call up, enter your
|
||||||
|
password and read your messages. Inside a VMB you can do whatever, you can
|
||||||
|
leave messages to others on the system, you can change your 'Out Going'
|
||||||
|
message, you can have guest boxes (Explained later), you can have the box
|
||||||
|
call your house when you get an Urgent message, you can do a lot of things.
|
||||||
|
Infact, on some systems you can even CALL OUT through them, so they can be
|
||||||
|
used as a code of sorts! They are cool to have.
|
||||||
|
|
||||||
|
|
||||||
|
What Type of System You Should Scan/Hack:
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
You should scan/hack out Virgin Systems, this is another way of calling a
|
||||||
|
system that hasn't been hack out yet. Also, CINDI Systems and ASPEN Systems
|
||||||
|
have the best boxes and the most options that VMB Systems can offer. I will
|
||||||
|
be talking about ASPEN System today since I know most about those.
|
||||||
|
|
||||||
|
|
||||||
|
Scanning Your 'Virgin ASPEN VMB System':
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
Okay once you've found your Virgin VMB System, you start to scan. Just incase
|
||||||
|
you don't know what scanning is, that means you search for boxes that are
|
||||||
|
hackable (Explained later on). Now you dial up the system and when it picks
|
||||||
|
up and the bitch starts to talk, press the "#" key. It will then ask you for
|
||||||
|
your box number... now there are two different way the ASPEN System can be
|
||||||
|
configured: 1) a "3 Digit Box Number System" or 2) a "4 Digital Box Number
|
||||||
|
System". Now lets just say this system is a 3 Digit System. Okay, when it
|
||||||
|
asks for your Box Number, enter in 999, now it will say one of three things:
|
||||||
|
[These are known as 'Greeting Names']
|
||||||
|
1. John Doe [Box owners name]
|
||||||
|
2. "Box Number 999 Is Not a Valid Box Number"
|
||||||
|
3. "Box Number 999"
|
||||||
|
Now, if it eithers says 1 or 2, go to box number 998...997...996...995..etc,
|
||||||
|
but if it says 3, then you are lucky, now it will ask you for your password,
|
||||||
|
now you are probably saying 'Shit this is where it gets difficult'... well
|
||||||
|
you are WRONG! This part is easy. Here is a list of ASPEN Default Passwords:
|
||||||
|
|
||||||
|
* We will use box number 666 as an example box #
|
||||||
|
[ BN = Box Number ]
|
||||||
|
|
||||||
|
List of Default Password: Combination Result
|
||||||
|
|
||||||
|
1-BN 1666
|
||||||
|
BN+1 667
|
||||||
|
0-BN 0666
|
||||||
|
BN-0 6660
|
||||||
|
Most Common <20>į BN 666
|
||||||
|
|
||||||
|
Now enter in a those defaults, try JUST the Box Number first, ASPENs usually
|
||||||
|
use that most. Now, if you try all those Defaults and still can not get into
|
||||||
|
that Voice Mail Box, then that means that the box has been already taken, but
|
||||||
|
the owner hasn't changed his 'Generic Message', if you don't get in, you
|
||||||
|
will just have to search until you get in.
|
||||||
|
|
||||||
|
|
||||||
|
Once You Get Into a Box:
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
Okay, once you get your first box, *DO NOT* change anything!! That will come
|
||||||
|
later. Your first box is, as what is known as a 'Scanning Box'! What you do
|
||||||
|
with your Scanning Box is this: You enter "3" from the main commands menu,
|
||||||
|
and it will ask you for the box number. Now that command is the "Check for
|
||||||
|
Reciept" command, what it does it check Box #xxx for mail from you. This
|
||||||
|
command is very convienient for us VMB Hackers. To use that command to your
|
||||||
|
advantage, you enter in box a box number and it will say 1 of the three
|
||||||
|
'Greeting Names', like before, if it say #3, then you write down that Box
|
||||||
|
Number and hack it later. But if it says 1 or 2, then just keep scanning!
|
||||||
|
All boxes with the number 3 Greeting Name is known as a 'Hackable Box'.
|
||||||
|
Now you keep scanning until you have gone all the way down to Box number 000
|
||||||
|
or whatever is the lowest box it supports. Now, once you have your list this
|
||||||
|
is when all the fun starts! Now you are ready to hack!
|
||||||
|
|
||||||
|
|
||||||
|
Hacking Out Your New Found 'Hackable' Boxes:
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
Okay this is the easy part. After you spent most of your time by scanning
|
||||||
|
the system you should be used to the system and how it works, that should
|
||||||
|
make hacking the ASPEN all the easier. Now, if you had a 'Scanning Box', you
|
||||||
|
should know what the default password was for your Scanning Box. Well if the
|
||||||
|
password for your Scanning Box was just the Box Number, then *EVERY* other
|
||||||
|
hackable box should have the SAME default password. VMB Systems have only
|
||||||
|
one default password, If one box has the BN for a Default PW, the all the
|
||||||
|
others will too.
|
||||||
|
|
||||||
|
Okay, you call up the VMB System will the list of 'Hackable' boxes by your
|
||||||
|
side, and when the bitch is talking, press the "#" key. When it asks you for
|
||||||
|
your box number, enter in the first box number on your list. When it asks for
|
||||||
|
your password, enter in the Default Password Sequence. Now if you don't get
|
||||||
|
into that box, it's not a problem, just keep going down your list. You should
|
||||||
|
get into a few. But remember, just because a box is marked 'Hackable', it
|
||||||
|
doesn't mean you will definatly get into it.
|
||||||
|
|
||||||
|
Okay, now you have a few dosen boxes. You can now use you Scanning Box to do
|
||||||
|
whatever you please.
|
||||||
|
|
||||||
|
|
||||||
|
ASPEN Guest Boxes:
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
Once you have a box of your own, you can give out 'Guest Boxes'. Guest Boxes
|
||||||
|
are like Sub Boxes in your box. In ASPEN you have 4 of them. If you give out
|
||||||
|
Guest Box #1 to John Doe, Mr. Doe can call in, enter in the password YOU set
|
||||||
|
for him, and leave you messages, but not only that, you can leave messages
|
||||||
|
to HIM! Which means, if his is in New York, and you are in California, and
|
||||||
|
neither of you have codes to call eachother, then you can leave messages thru
|
||||||
|
your 800 VMB. Here is a list and explination of all 4 of the Guest Boxes:
|
||||||
|
|
||||||
|
0. Main Box - Your Voice Mail Box!
|
||||||
|
1. Guest Box #1 - Can Leave & Recieve Messagez
|
||||||
|
2. Guest Box #2 - Can Leave & Recieve Messagez
|
||||||
|
3. Home Box - Can Leave & Recieve Messagez
|
||||||
|
4. Secretary Box - Can Check How Many Messagez You
|
||||||
|
Have & Recieve Messagez
|
||||||
|
|
||||||
|
|
||||||
|
Hints On Better Scanning:
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
A lot of people say hacking and scanning for VMBs is too damn hard... well
|
||||||
|
that's because they are going at it all wrong, they probably read some lame
|
||||||
|
piece of shit text file on Hacking VMBs that was about 500 bytes long. Well,
|
||||||
|
here is a small list of hints on better scanning and hacking:
|
||||||
|
|
||||||
|
1. Do not use a Voice Mail Box hacking/scanning program
|
||||||
|
(ei: VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..)
|
||||||
|
2. Do not hack in random order (ei: B#999, 345, 810, etc)
|
||||||
|
Always hack in order: 999, 998, 997, 996, 995...000.
|
||||||
|
3. Try to find out if it's virgin. The newer the System,
|
||||||
|
the better.
|
||||||
|
4. If you have a phone with memory dial, change one entry
|
||||||
|
to the number of the VMB System.
|
||||||
|
5. Don't hack the System Managers box unless you really
|
||||||
|
want to.
|
||||||
|
|
||||||
|
|
||||||
|
Ideas of Things To Do With Your Extra Boxez:
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
Well since you can have up to 500 extra Voice Mail Boxes, you might
|
||||||
|
not know what to do with them, here are a few ideas that can help you out:
|
||||||
|
|
||||||
|
1. Give them to friends
|
||||||
|
2. Sell them to friends
|
||||||
|
3. Offer them to sysops for
|
||||||
|
for better access
|
||||||
|
4. Trade them for HSTs or
|
||||||
|
whatever
|
||||||
|
5. Use them as a Voice Verifing line (So you don't have to give out
|
||||||
|
your real voice number to BBSes when you apply!)
|
||||||
|
|
||||||
|
|
||||||
|
Well, that's it to the <20>egions <20>f <20>ucifer Hacking & Scanning Voice Mail Box
|
||||||
|
Systems Tutorial! I hope it helped you and I, along with <20>.<2E>.<2E> wish you the
|
||||||
|
best of luck with your new found hobby! And remeber if you found this text
|
||||||
|
of any help, please spread it around to help others! Also, if you think you
|
||||||
|
are any good at writing H/P, please apply to be a Member! Call the <20>.<2E>.<2E> Home
|
||||||
|
at:
|
||||||
|
|
||||||
|
Digital Hackers Network
|
||||||
|
<20>egions <20>f <20>ucifer HeadQuarters/Home
|
||||||
|
No Warez! A truely serious Hack/Phreak board
|
||||||
|
Hack, Phreak, Scanning, Phraud, Crashing disscusions
|
||||||
|
Viral Research & Development Sections (500+ Virii!)
|
||||||
|
Running AfterShock v1.20 - 2400 Baud
|
||||||
|
PH: 213-274-1333
|
||||||
|
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
Call these <20>egions <20>f <20>ucifer support boards for information or application
|
||||||
|
inquiries:
|
||||||
|
|
||||||
|
Digital Hackers Network 213/274+1333 <20>.<2E>.<2E> HeadQuaters/Home
|
||||||
|
Electric Eye ][ 313/776+8928 <20>.<2E>.<2E> Distribution Site #1
|
||||||
|
Digital Information Exchange 612/356+2209 <20>.<2E>.<2E> Distribution Site #2
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
This text file is (C)Copyrite 1990 <20>.<2E>.<2E> Inc.
|
||||||
|
<20>.<2E>.<2E> is a registered trademark of DHN, All rights reserved
|
||||||
|
Any modifications to this text file is a violation of copyrite.
|
||||||
|
Digital Hackers Network 213/274+1333 -=<3D>.<2E>.<2E> Home=-
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
330
textfiles.com/phreak/VOICEMAIL/phonhack.txt
Normal file
330
textfiles.com/phreak/VOICEMAIL/phonhack.txt
Normal file
@@ -0,0 +1,330 @@
|
|||||||
|
Hacking Telephone Answering Machines
|
||||||
|
|
||||||
|
by Doctor Pizz and Cybersperm
|
||||||
|
|
||||||
|
******************************************************************************
|
||||||
|
DISCLAIMER: The following is for informational purposes only. All information
|
||||||
|
provided is simply to point out how easy it is to access such a system. The
|
||||||
|
author accepts no responsibility for irresponsible use of this knowledge, and
|
||||||
|
it is provided solely so people can be aware of the low security of such
|
||||||
|
systems. (Now that I'm off the hook in case you do something stupid...).
|
||||||
|
******************************************************************************
|
||||||
|
|
||||||
|
|
||||||
|
It seems that lately there is very little discussion of one of the most
|
||||||
|
simple but useful and rewarding forms of electronic information gathering,
|
||||||
|
hacking the telephone answering machine. Almost everyone has one of these
|
||||||
|
wonderful devices these days, to catch important messages while they are away
|
||||||
|
from their phones, or to screen important telephone calls. Nowadays, they
|
||||||
|
typically have the added advantage of being accessible from remote telephones,
|
||||||
|
so one needs to simply call his or her answering machine, enter their secret
|
||||||
|
code, and then either retrieve new messages, or listen to anything they had
|
||||||
|
previously recorded on the incoming messages tape, or perform any of a set of
|
||||||
|
additional functions determined by which key they press on their touch tone
|
||||||
|
phone. They also typically ignore the fact that virtually anyone else can
|
||||||
|
gain access to their messages by entering the appropriate code. Hence this is
|
||||||
|
a wonderful system to gather information from anyone without their knowledge,
|
||||||
|
especially if they are technologically illiterate.
|
||||||
|
|
||||||
|
For the most part, there are two main types of "electronic password"
|
||||||
|
used by these systems. They are amazingly simple to crack, as they are
|
||||||
|
typically only 2-digit or even 1-digit numbers!!!!!! On some machines, the
|
||||||
|
code must be entered before the outgoing message is over, on others, it must
|
||||||
|
be entered after the outgoing message, and on more sophisticated models, it
|
||||||
|
can be entered at any time.
|
||||||
|
|
||||||
|
|
||||||
|
MODERN 2-DIGIT PASSCODE SYSTEMS:
|
||||||
|
|
||||||
|
These are the most common systems in use today, typically made by
|
||||||
|
Panasonic, AT&T, etc. In these systems, the code can be entered before during
|
||||||
|
or after
|
||||||
|
the beep tone. For security reasons, we recommend BEFORE the beep tone, so
|
||||||
|
your intrusions are unnoticed... We will begin by discussing how to identify
|
||||||
|
the passcode.
|
||||||
|
|
||||||
|
|
||||||
|
Now, the question of how to hack their code. Well, this is so simple,
|
||||||
|
you don't even need a computer to do it. You can just enter all 2-digit
|
||||||
|
combinations until you get the right one (usually signalled by a series of
|
||||||
|
beeps on the other end). A relatively crude way was to enter each number in
|
||||||
|
sequence 01, 02, 03, 04,...,99. This works, but may take too long to enter
|
||||||
|
all numbers within the 20-30 second window we typically have before the beep
|
||||||
|
(The best time to play arounnd, as any tones entered after the beep will be
|
||||||
|
recorded on his incoming messages tape, and could let him know something is
|
||||||
|
up...). It is also important to stop as soon as you hit the right number, as
|
||||||
|
the additional entered numbers may be interpreted by the answering machine as
|
||||||
|
codes, and cause you to delete all their messages, or record a new greeting,
|
||||||
|
etc. That is really asking for trouble, and may cause them to try and change
|
||||||
|
their password (though it's usually only possible to choose from a range of
|
||||||
|
three consecutive numbers anyway...). Still, you need to be careful not to
|
||||||
|
let them catch on, eh?
|
||||||
|
|
||||||
|
A more sophisticated and fast way to do this is to take advantage of the
|
||||||
|
fact that such machines typically do not read two numbers at a time, and
|
||||||
|
discard them, but just look for the correct sequence, reading one at a time.
|
||||||
|
In other words, you can enter all 100 possible codes with roughly 1/2 the
|
||||||
|
number of keystrokes. Just enter as follows:
|
||||||
|
|
||||||
|
0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9,etc.
|
||||||
|
|
||||||
|
By reading in one phase we get:
|
||||||
|
|
||||||
|
0 0,1 0,2 0,3 0,4 0,5 0,6 0,7 0,8 0,9 1,1 2,1 3,1 4,1 5,1 6,1 7,1 8,1 9,etc.
|
||||||
|
|
||||||
|
In the other phase we get:
|
||||||
|
|
||||||
|
0 1,0 2,0 3,0 4,0 5,0 6,0 7,0 8,0 9,1 1,2 1,3 1,4 1,5 1,6 1,7 1,8 1,etc.
|
||||||
|
|
||||||
|
So by proceeding as follows we enter the following matrix sequentially,
|
||||||
|
encompassing all possible 2 digit numbers:
|
||||||
|
|
||||||
|
|
||||||
|
0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9
|
||||||
|
1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9
|
||||||
|
2 2 3 2 4 2 5 2 6 2 7 2 8 2 9
|
||||||
|
3 3 4 3 5 3 6 3 7 3 8 3 9
|
||||||
|
4 4 5 4 6 4 7 4 8 4 9
|
||||||
|
5 5 6 5 7 5 8 5 9
|
||||||
|
6 6 7 6 8 6 9
|
||||||
|
7 7 8 7 9
|
||||||
|
8 8 9
|
||||||
|
9 0
|
||||||
|
|
||||||
|
The last zero is important, as it completes the cycle, and allows for the code
|
||||||
|
9 0, which is the only one not as yet allowed for. I must emphasize the
|
||||||
|
importance of quitting as soon as you get the correct code, and also do not
|
||||||
|
keep going after the beep, if you are on a modern 2-digit access code system.
|
||||||
|
This way, you can record the passcode for your future reference, and prevent
|
||||||
|
detection.
|
||||||
|
|
||||||
|
Now, we shall get on to the question of how to use their system, once
|
||||||
|
you've broken in. In general, it is recommended to obtain a copy of the
|
||||||
|
owners' manual for various machines, but I have summarized some of the basics
|
||||||
|
below.
|
||||||
|
|
||||||
|
PANASONIC
|
||||||
|
|
||||||
|
Here are the codes for a Panasonic Easa-phone KX-T1450. The KX-T2420 is
|
||||||
|
identical without Room Monitor function In this case, strange things happen
|
||||||
|
when you enter 5:
|
||||||
|
|
||||||
|
1 = Back Space (Rewind the OGM tape)
|
||||||
|
2 = Skip Forward (Fast forward the OGM tape)
|
||||||
|
3 = Reset (Go back to the beginning of the OGM tape. MAY CAUSE ERASURE!!!)
|
||||||
|
4 = Memory Playback (Listen to new messages)
|
||||||
|
5 = Room Monitor (!!!! Listen to what is going on in the room NOW !!!!)
|
||||||
|
(This is only available on some models... But, try it...)
|
||||||
|
7 = OGM-REC (Record a new greeting!!!)
|
||||||
|
9 = OGM-STOP (Stop recording the new greeting)
|
||||||
|
* = OGM Skip (Don't Listen to the OGM)
|
||||||
|
0 = Turn off the machine !!!!!
|
||||||
|
|
||||||
|
To set to the answer mode remotely,
|
||||||
|
1. Dial the phone number
|
||||||
|
2. Wait 15 rings and hang up
|
||||||
|
|
||||||
|
To turn off the unit remotely (!!),
|
||||||
|
1. Dial the phone number
|
||||||
|
2. Push the code number, wait for the beep, enter 0, and hang up. Panasonic answering machines also respond to the user with a series of
|
||||||
|
codes which I will now outline. If you hear something different, you may not
|
||||||
|
be on a Panasonic system.
|
||||||
|
|
||||||
|
1 long beep : This is the "beep" after which people can leave their messages.
|
||||||
|
|
||||||
|
Also, this is sounded when the correct passcode is entered from
|
||||||
|
|
||||||
|
a remote telephone. (Same sound- Hint for software developpers)
|
||||||
|
It sounds when the tape has fully rewound, and after each
|
||||||
|
|
||||||
|
message is played back in entirety.
|
||||||
|
3 short bps : This sounds after the last message has been played back.
|
||||||
|
|
||||||
|
2 short bps : (10 seconds later) You are then being recorded - marker message
|
||||||
|
|
||||||
|
6 short bps : End of the incoming message tpe
|
||||||
|
|
||||||
|
6 short bps : (Quickly) Tape Broken (either incoming or outgoing)
|
||||||
|
|
||||||
|
Also, after entering the correct code, and after the one long beep, you will
|
||||||
|
hear n additional short beeps, where n is the number of new messages since the
|
||||||
|
last time the messages were retrieved. Remember, you can listen to earlier
|
||||||
|
ones on the same tape, by additionally backspacing from the first new message.
|
||||||
|
|
||||||
|
Anyway, that is a basic summary of the Panasonic answering machine system for
|
||||||
|
this machine. Many machines unfortunately do not have the Room monitor
|
||||||
|
function, so you can not see if you left your TV on, or anything like that...
|
||||||
|
Also, not all systems are identical, but on Panasonic machines, the numbers 1-
|
||||||
|
4 are the same, so this is the most important thing for you to remember
|
||||||
|
anyway...
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
AT&T
|
||||||
|
|
||||||
|
On AT&T machines, like the Answering System 1304, the passcode is again a 2-
|
||||||
|
digit number enterable before, during, or after the beep. Follow the same
|
||||||
|
guidelines as above.
|
||||||
|
|
||||||
|
After you enter the correct code on these machines, the system will
|
||||||
|
automatically begin to play back new messages. This is one key way to
|
||||||
|
distinguish these machines from the Panasonic ones discussed above.
|
||||||
|
|
||||||
|
To summarize the key functions for the AT&T system, look below:
|
||||||
|
|
||||||
|
2 Rewind tape (tape rewinds for as long as this key is depressed)
|
||||||
|
3 3 Clear messages (reset the tape to the beginning.)
|
||||||
|
5 Fast Forward (tape ffwds for as long as this key is depressed)
|
||||||
|
7 Replay messages from the beginning
|
||||||
|
8 8 Turn off the answering machine
|
||||||
|
* Record a memo (After listening to messages) OR
|
||||||
|
Skip the greeting (w/o entering code)
|
||||||
|
0 Turn on the machine (after hearing two beeps)
|
||||||
|
# Pause (for 5-7 seconds)
|
||||||
|
|
||||||
|
Basically this system is less sophisticated than the Panasonic. You cannot
|
||||||
|
change the OGM remotely (Damn!). As seen above, the codes are also quite
|
||||||
|
different, but fortunately they are easily distinguished by how they answer
|
||||||
|
after the security code is entered. The AT&T plays the messages, while the
|
||||||
|
Panasonic just beeps to tell you how many new messages are waiting. Here
|
||||||
|
also, the rewind and fast forward functions operate for the length of time you
|
||||||
|
depress the 2 and 5 keys respectively. On the Panasonic, they reewind or fast
|
||||||
|
forward for 15 seconds. Also, this system has a pause feature. By entering
|
||||||
|
the # sign, you can pause for a few seconds while listening to a message. One
|
||||||
|
extra safety (from your perspective...) feature is that on this system you
|
||||||
|
cannot erase messages until they have all played back, so you have less risk
|
||||||
|
of fucking up someone's system if it is an AT&T. You cannot change his
|
||||||
|
greeting, and it is difficult to accidentally erase his messages. If you wish
|
||||||
|
to do so, however, you must hit the 3 key twice after listening to the
|
||||||
|
messages in their entirety. To record a memo (why would you want to do
|
||||||
|
this???), you can press the * key after you hear 5 beeps (after listening to
|
||||||
|
the messages). Then begin to record. Also, the * key can be used before the
|
||||||
|
message is finished to skip listening to the OGM (useful for long distance
|
||||||
|
callers who are actually paying for the calls...) without the need for
|
||||||
|
entering a security code. To turn on the system from remote points, you need
|
||||||
|
to let it ring ten times, and after it answers with 2 "beeps", hit the 0 key.
|
||||||
|
It will subsequently be on. Similarly to turn it off, just enter 88. If the
|
||||||
|
machine answers the phone with no greeting, and just 2 beeps, it means the
|
||||||
|
tape is full. You can now enter the security code (without risk of them
|
||||||
|
recording the BEEPS!!!) and listen away for a long time!!! Basically, this
|
||||||
|
sums up the properties of the two most common systems I've encountered of the
|
||||||
|
2-digit passcode variety.SINGLE DIGIT PASSCODE MACHINES:
|
||||||
|
|
||||||
|
On some old model Panasonic and Phone Mate systems, the secret entry
|
||||||
|
passcode is only a one digit number(!!!). On these primitive systems, one
|
||||||
|
merely enters the correct number, during the message, and playback begins.
|
||||||
|
The other codes are simple to derive, and just for the sake of making this
|
||||||
|
hobby a sport, I will not give details for these systems. It is easy enough
|
||||||
|
to figure them out, and on these systems, it is hard to screw things up, as
|
||||||
|
there is little you can do anyway.
|
||||||
|
|
||||||
|
APPLICATIONS:
|
||||||
|
|
||||||
|
This can be a rewarding adventure if you decide to follow those
|
||||||
|
instructions (though far be it from me to suggest you to do this...). I will
|
||||||
|
point out some of the potentially entertaining, useful, and/or informative
|
||||||
|
applications of this technology.
|
||||||
|
|
||||||
|
As the true weirdos that we are, we shall begin with what we consider
|
||||||
|
the truly entertaining applications... If you have ever read the Village
|
||||||
|
Voice, Screw or other such newspaper, you will notice a large number of
|
||||||
|
advertisements for "unlicensed massage parlors", "Oriental relaxation spas",
|
||||||
|
"Escort services", etc. Call some of those numbers, preferrably at off-duty
|
||||||
|
hours (6-9 AM??) and try to hack their answering machine codes, listen to
|
||||||
|
their messages, and let the fun begin. You can hear lots of perverts, and
|
||||||
|
lowlifes making appointments for "services" about which they are sometimes
|
||||||
|
graphic. Also, they often leave telephone and credit card numbers (What
|
||||||
|
fun!!!). In case they are married, think of the blackmail potential...
|
||||||
|
|
||||||
|
Further, these "adult entertainment companies" also often run help
|
||||||
|
wanted ads in the Village Voice, and other such publications. Call these, and
|
||||||
|
you will get a plethora of phone numbers for nubile young women who might
|
||||||
|
believe you are the proprietor of the establishment in question. You might be
|
||||||
|
able to con some "free samples" as a sort of "job interview"... (hehehe)
|
||||||
|
Especially given the illegal activity they desire to become involved in, they
|
||||||
|
will be in no position to complain when they find out you are not for real...
|
||||||
|
Also, this way, the girls are often not so jaded as the old pros... They will
|
||||||
|
be trying to impress you if you get my drift, so you'll "hire" them.
|
||||||
|
|
||||||
|
Other similar companies can be hacked to get similar entertaining and
|
||||||
|
enjoyable results. In many cases, the outcomes can be QUITE LUCRATIVE in one
|
||||||
|
way or another... I do not advocate that you do these things, but I just want
|
||||||
|
to point out what COULD be done...
|
||||||
|
|
||||||
|
Let us move on to the informative espionnage type of application of this
|
||||||
|
technology. One could very easily use this technology to listen to the
|
||||||
|
messages of friends, and see what they are up to. If you are trying to call
|
||||||
|
your buddy Evan, and he isn't home, perhaps you can find out where he is by
|
||||||
|
going through some of his old answering messages. Say, Eric called him a
|
||||||
|
couple of hours ago and suggested that Evan come over to his place for some
|
||||||
|
beers. Well, you could then call Eric and voila, you may connect with Evan.
|
||||||
|
|
||||||
|
Now, let us assume you have a girlfriend, and you suspect she might be
|
||||||
|
cheating on you, yet you do not wish to confront her about it without any
|
||||||
|
evidence, or certainty of her cheating. Well, her new beau probably thinks
|
||||||
|
her answering machine is secure, and calls leaving messages about their
|
||||||
|
upcoming dates, or various discussions of their relationship. If you can hack
|
||||||
|
her machine {actually, you might even look at the bottom (where the passcode
|
||||||
|
is usually printed...) to save time and energy.} you will be afforded with a
|
||||||
|
plethora of potentially incriminating evidence. Hehehe.
|
||||||
|
|
||||||
|
A similar application can be when you have a new love interest. Suppose
|
||||||
|
there is some woman you are interested in, but you aren't sure if she is
|
||||||
|
available. A little phone answering machine surveillance can provide all of
|
||||||
|
the answers, and then some... In case she asks her friends about you, you'll
|
||||||
|
know everything she does. Also, you will learn details about her life, and
|
||||||
|
schedule, the better to run into her "accidentally", or strike up a
|
||||||
|
conversation about "common" interests...
|
||||||
|
|
||||||
|
Now, if you know someone in the same profession, say musicians, and you
|
||||||
|
call his answering machine, and hear someone offering him a gig. You could
|
||||||
|
call that person back, and accept the gig in your name, saying the originally
|
||||||
|
called musician was unavailable, but suggested that you call. Then be sure to
|
||||||
|
erase the original message on your buddy's machine. He'll never be the wiser,
|
||||||
|
and you'll get more work. Though he may wonder why he isn't getting much work
|
||||||
|
anymore...
|
||||||
|
|
||||||
|
Millions of applications exist, and if you have any additional
|
||||||
|
suggestions, please leave them with us. We can be reached on several BBS'es,
|
||||||
|
in 212, 718, and 914 area codes. Thanks. Also, if you have information on
|
||||||
|
other answering machine systems, please pass it along...
|
||||||
|
|
||||||
|
Again, in closing, we reiterate that the authors take no responsibility
|
||||||
|
for the misuse of this information. The ideas for applications were presented
|
||||||
|
for informational and entertainment purposes only, and we do not encourage you
|
||||||
|
to try any of the above suggestions. Remember, listening to the pass-code
|
||||||
|
protected messages of others constitutes an invasion of privacy, and may be in
|
||||||
|
violation of state and federal laws.
|
||||||
|
|
||||||
|
******************************************************************************
|
||||||
|
|
||||||
|
ANOTHER FINE PIZZ-SPERM T-FILE...
|
||||||
|
|
||||||
|
Please upload this file to other fine BBS'es, and give credit to the original
|
||||||
|
authors, Doctor Pizz and Cybersperm, of the TUBA crew.
|
||||||
|
|
||||||
|
******************************************************************************
|
||||||
|
|
||||||
|
|
||||||
|
***************************************************************
|
||||||
|
* *
|
||||||
|
* Another Fine File From the libraries of the TUBA crew. *
|
||||||
|
* *
|
||||||
|
***************************************************************
|
||||||
|
|
||||||
|
____ _______ *
|
||||||
|
/ \ ___ ___ ____ ___ ___ / / ___ ___
|
||||||
|
/ // // / / // / /______/ / / /
|
||||||
|
/ // // / / //-< / / / /
|
||||||
|
/_____//__//__ / /__// / / / /__ /__
|
||||||
|
|
||||||
|
-N-
|
||||||
|
|
||||||
|
CCCC Y Y BBB EEEE RRR SSSS PPP EEEE RRR M M
|
||||||
|
C Y Y B B E R R S P P E R R MM MM
|
||||||
|
C Y BBB EEE RRR SSSS PPP EEE RRR M M M
|
||||||
|
C Y B B E R R S P E R R M M M
|
||||||
|
CCCC Y BBB EEEE R R SSSS P EEEE R R M M M
|
||||||
|
|
||||||
|
|
||||||
|
|
103
textfiles.com/phreak/VOICEMAIL/phreak8
Normal file
103
textfiles.com/phreak/VOICEMAIL/phreak8
Normal file
@@ -0,0 +1,103 @@
|
|||||||
|
3RD PARTY FRAUD & VOICE MAIL SYSTEMS
|
||||||
|
============================================================================
|
||||||
|
|
||||||
|
3rd Party Dialing was first brought to my attention when it was listed
|
||||||
|
on my telephone bill. I was billed by some person(s) without my authorization.
|
||||||
|
This happened about 3 times on the same bill, and all of the times I got the
|
||||||
|
charges dropped.
|
||||||
|
|
||||||
|
A few weeks later, after paging through the telephone book for downtown
|
||||||
|
prefixes, I noticed information on 3rd Party Calling, which included:
|
||||||
|
|
||||||
|
HOW TO PLACE 0+ CALLS
|
||||||
|
|
||||||
|
Third-Number Calls
|
||||||
|
|
||||||
|
1. Dial "0" + Area Code (if needed) + telephone number.
|
||||||
|
|
||||||
|
2. If you hear a tone, ignore it, and a billing operator will come
|
||||||
|
on the line.
|
||||||
|
|
||||||
|
3. Tell the operator you are placing a third number billed called.
|
||||||
|
|
||||||
|
4. Give the Area Code and telephone number you with the charges billed to.
|
||||||
|
|
||||||
|
5. The operator will call that number to verify acceptance of the charges
|
||||||
|
on calls from coin pay phones. No verification on calls from
|
||||||
|
non-coin pay phones.
|
||||||
|
|
||||||
|
The line that caught my eye was like #5. This line pointed out that calls
|
||||||
|
from pay phones had to be verified, while non pay phones needed no
|
||||||
|
verification.
|
||||||
|
|
||||||
|
With experience, I found out that sometimes there is nothing a person can do
|
||||||
|
about unauthorized 3rd Party Calls billed to a another person's number. A lot
|
||||||
|
of the times, the operator you call to complain to will simply tell you there's
|
||||||
|
nothing they can do.
|
||||||
|
|
||||||
|
With this in mind, I realized that you could bill a call to anybody's number
|
||||||
|
and get away with it, and no charges directed to you. Although, as many of you
|
||||||
|
know by now...this not safe. For one, you are directing attention to yourself
|
||||||
|
as a Fraudist/Phreak. Secondly, on the person's bill that your billed the 3rd
|
||||||
|
Party Call to...that person has your number and where you called. Bell can
|
||||||
|
also use that information to take action if they feel it necessary.
|
||||||
|
|
||||||
|
One alternative would be to complete a 3rd Party Billed Call from a pay
|
||||||
|
phone. This however brings up a question. Who is going to accept the charges
|
||||||
|
if you don't want to pay for it in any way?
|
||||||
|
|
||||||
|
Here is what I came up with for 3rd Party Calling Fraud:
|
||||||
|
|
||||||
|
First, you need a (VMS) Voice Mail System/Box. You need a Centragram or
|
||||||
|
PhoneMail type VMS to handle the call. The reason you need these types of
|
||||||
|
VMS's, is because Centragram/PhoneMail type VMS's are direct dial. You don't
|
||||||
|
have to enter a process extension number such as 8509. These types of VMS's
|
||||||
|
bring you directly to the box.
|
||||||
|
|
||||||
|
You don't know what Voice Mail Systems are? Look for a file. But, here's a
|
||||||
|
layman's description of VMS's. You can say that VMS's are distance answering
|
||||||
|
services. They are usually set up in other prefixes you can dial in/directly
|
||||||
|
on to. They include instructions on how to use them, and have system
|
||||||
|
passwords. In respect, they are electronic mail devices...only they use voice
|
||||||
|
communications instead. You can find these by scanning, if you have one local.
|
||||||
|
|
||||||
|
Anyways, having a VMS handy...reset your System Greeting to say: "HELLO"
|
||||||
|
Pause for approximately 5-6 seconds...then say casually, "YEAH SURE."
|
||||||
|
In between the HELLO and YEAH SURE, the billing operator will say something
|
||||||
|
like, "JOHN DOE IS BILLING A CALL TO YOUR NUMBER, WILL YOU ACCEPT THE CHARGES?"
|
||||||
|
|
||||||
|
Now go to a pay phone and dial any number anywhere you want, in this
|
||||||
|
format: 0+612+555+1212. Ignore the tone you hear for calling card holders,
|
||||||
|
and wait for an operator to come on. The operator will announce her/his-self
|
||||||
|
as a billing operator and ask you how he/she can help you on billing the call.
|
||||||
|
Tell the operator, "THIS IS A 3RD PARTY CALL, MY NAME IS JOHN." Include a last
|
||||||
|
name if you wish, but it's not necessary. No real names of course also. The
|
||||||
|
operator will call the VMS and he/she will hear the previous recording of you
|
||||||
|
saying "HELLO" etc.
|
||||||
|
|
||||||
|
After the operator hears an affirmative from the VMS...the operator will say
|
||||||
|
thank you, then put the call through. The only person that gets billed for
|
||||||
|
the call is the business/person that owns the VMS that you used by hacking the
|
||||||
|
default password.
|
||||||
|
|
||||||
|
I've found out that you can dial overseas, and anywhere in the United States
|
||||||
|
this way, with no problems or bad connections. If you have a portable computer
|
||||||
|
with an acoustic couple...you can go online. It would be suggested to do this
|
||||||
|
in a car, so as not to draw attention during the day. I've tried to set up a
|
||||||
|
conference by the 800 Conference Operator and requesting to set up a
|
||||||
|
conference. You have to give her the person's numbers and names you want to
|
||||||
|
conference with...and the number you want to conference billed to. The
|
||||||
|
operator will verify this if you are at a pay phone. I have figured out what
|
||||||
|
the Conference Operator asked the 3rd Party as of yet...to time the responses
|
||||||
|
preset on the VMS, but if anyone can, it would prove to be very useful.
|
||||||
|
|
||||||
|
Another technique might be to bill 976's to your VMS if you into that.
|
||||||
|
Again, you need to attempt to time the perfect responses to the operator's
|
||||||
|
questions to the 3rd Party.
|
||||||
|
|
||||||
|
*A Word of Warning*: In most cases, the Operator you handle the 3rd party
|
||||||
|
call with will stay on the line. So it's good to have a conversation with
|
||||||
|
yourself on the VMS for about 30 seconds after connection if you are making a
|
||||||
|
collect call to the VMS.
|
||||||
|
|
||||||
|
|
23
textfiles.com/phreak/VOICEMAIL/tollfree.txt
Normal file
23
textfiles.com/phreak/VOICEMAIL/tollfree.txt
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
|
||||||
|
Toll-Free Answering Services
|
||||||
|
|
||||||
|
|
||||||
|
Allied Toll-Free Service Bureau(ask for oper 526) 800-824-7888
|
||||||
|
American Discount Dialing System 800-227-1617 (CA 800-852 7777)(CA800-772-3545)
|
||||||
|
Dialog Marketing 800-447-4700 (IL 800-322-4400)
|
||||||
|
Direct Marketing Services Inc. 800-223-1944
|
||||||
|
Executive Locator 800-323-6556
|
||||||
|
H Q Co 800-227-3004 (800-652-1848)
|
||||||
|
National Communications Center Inc. 800-824-5120 (CA 800-525-7711)
|
||||||
|
National Data Corperation 800-257-9611
|
||||||
|
National Switchboard 800-528-6052
|
||||||
|
Nice-National Instant Consumer Exchange 800-453-9000
|
||||||
|
Operator 800 800-448-4511 (NY 800-962-1480)
|
||||||
|
Ring America 800-621-5199
|
||||||
|
Share-a-Wats Inc. 800-854-2003
|
||||||
|
Skycall 800-631-5488 (NJ 800-352-4951)
|
||||||
|
Team Telephone 800-228-5000
|
||||||
|
Tel-Com Message Service 800-451-4453 (VT 800-622-4429)
|
||||||
|
Teletrak Response Center 800-328-5257
|
||||||
|
USA 800 800-821-2280 (MO 800-892-7655)
|
||||||
|
|
62
textfiles.com/phreak/VOICEMAIL/unt-att1.txt
Normal file
62
textfiles.com/phreak/VOICEMAIL/unt-att1.txt
Normal file
@@ -0,0 +1,62 @@
|
|||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ij<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ij<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||||
|
<EFBFBD>UNTOUCHABLES! <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>[File Name]: UNT-ATT1.ZIP <20> Difficulty <20>
|
||||||
|
<EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>[Writer] : Aoflex <20> <20>
|
||||||
|
<EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20>[Packager] : Karma Sutra <20> [ ] 0 <20>
|
||||||
|
<EFBFBD> <20><><EFBFBD><EFBFBD> <20> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20> <20> [X] 1 <20>
|
||||||
|
<EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20>[Description]: Hacking <20> [ ] 2 <20>
|
||||||
|
<EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20>At&t Answering Machines. <20> [ ] 3 <20>
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20> <20> [ ] 4 <20>
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> 1996! <20>[Date]: 06/18/96 <20> [ ] 5 <20>
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ij<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ij<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>-<2D><><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
|
||||||
|
1. Dial the telephone that is being answered by an AT&T Answering Machine.
|
||||||
|
2. When the machine answers, quickly enter the following:
|
||||||
|
|
||||||
|
1234567898765432135792468642973147
|
||||||
|
4193366994488552277539596372582838
|
||||||
|
491817161511026203040506070809001
|
||||||
|
|
||||||
|
3. The messages should start playing after this.
|
||||||
|
4. Here is a short list of common AT&T Answering Machine comands:
|
||||||
|
|
||||||
|
|
||||||
|
Message Commands:
|
||||||
|
-----------------
|
||||||
|
|
||||||
|
Review Messages: 7
|
||||||
|
Locate New Messages: 6
|
||||||
|
Stop: #
|
||||||
|
Rewind Messages: 2
|
||||||
|
Clear Messages: 3, 3
|
||||||
|
|
||||||
|
Announcement Commands:
|
||||||
|
---------------------
|
||||||
|
|
||||||
|
Record New Announcement: 4, *
|
||||||
|
Play Current Announcement: 4, 1
|
||||||
|
|
||||||
|
System Commands:
|
||||||
|
----------------
|
||||||
|
|
||||||
|
Turn System On: 0
|
||||||
|
Turn System Off: 8, 8
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Please Note: The easiest way to play the numbers to the answering
|
||||||
|
machine would be program them in your phone's memory dialing
|
||||||
|
setup.
|
||||||
|
________ _ _
|
||||||
|
/|/| | __ ____ _ _ ____ _ __ ___ _ ____/ ________ _ _ . .
|
||||||
|
/| | | |/ |/| _| \/| | |/ __\|| |/ \| \| || ___| |__
|
||||||
|
|| | | | | || | || | | /|| | | /| || __||__ |
|
||||||
|
|| \| | | | || | | \| | \_|_|| | || | \| ||_ \____| |
|
||||||
|
|/\____|_|___||_|\__/\____|\____\|_|_||_|___/|____|_______|
|
||||||
|
\/___/_//__//_/\/_/\/___/\/____/_/_//_//__//____//__/___/
|
||||||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||||
|
ARRESTED DEVELOPMENT II - UNT WORLD HEADQUARTERS - 410-720-5305
|
||||||
|
BLACK OPIUM - UNT CENTERAL HQ - 701-523-5909
|
||||||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||||
|
|
||||||
|
|
124
textfiles.com/phreak/VOICEMAIL/vmb.rl
Normal file
124
textfiles.com/phreak/VOICEMAIL/vmb.rl
Normal file
@@ -0,0 +1,124 @@
|
|||||||
|
R e n e g a d e L e g i o n
|
||||||
|
T e c h n i c a l R e p o r t s
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Technical Report #3
|
||||||
|
|
||||||
|
....
|
||||||
|
........
|
||||||
|
.........
|
||||||
|
... ....
|
||||||
|
... ....
|
||||||
|
.....
|
||||||
|
....
|
||||||
|
....
|
||||||
|
... ...
|
||||||
|
... ...
|
||||||
|
.. ...
|
||||||
|
...
|
||||||
|
|
||||||
|
February 1991
|
||||||
|
|
||||||
|
|
||||||
|
RL HQ - 617.623.7151
|
||||||
|
|
||||||
|
VMB Hacking
|
||||||
|
-----------
|
||||||
|
|
||||||
|
Written By: The Knight
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
|
||||||
|
a great deal of 'hidden info' that isn't common sense. But, If you are out
|
||||||
|
there trying to hack a box and can't, follow through the VERY logical and
|
||||||
|
simple steps and make sure they are matching up.
|
||||||
|
|
||||||
|
|
||||||
|
Step 1:
|
||||||
|
|
||||||
|
Finding a VMB System
|
||||||
|
|
||||||
|
There are many ways you can find a VMB system, for instance, on a BBS when
|
||||||
|
someone says 'Here are some systems' usually thats what they're referring
|
||||||
|
to. Also, Try setting up your scanner and listening for 'Welcome to XX
|
||||||
|
company, Enter extension #' or something similar to that. Then you have
|
||||||
|
found a VMB system.
|
||||||
|
|
||||||
|
|
||||||
|
Step 2:
|
||||||
|
|
||||||
|
Finding a Box
|
||||||
|
|
||||||
|
This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
|
||||||
|
You must make sure that no one is using it. There are several ways to do
|
||||||
|
this. One EASY way is when you hack it, check the date on the latest
|
||||||
|
messages, if they are OVER a month old, then I'd say your safe to use them.
|
||||||
|
Also, watch in case there is just like _2_ messages in there from the last
|
||||||
|
4 months that those messages could be messages sent to ALL the boxes, see if
|
||||||
|
they sound personal. If they DON'T, then grab the box.
|
||||||
|
|
||||||
|
Let's say there's a box you REALLY want bad and someone's using it regularly,
|
||||||
|
try doing this: Go in twice a day (make SURE you DON'T change the greeting
|
||||||
|
etc.) and erase all the messages. He will complain and will eventually move
|
||||||
|
out of the box. Then there is a good chance of you having that box. It's
|
||||||
|
happned to me.
|
||||||
|
|
||||||
|
|
||||||
|
Step 3:
|
||||||
|
|
||||||
|
Hacking the VMB
|
||||||
|
|
||||||
|
This is the most SIMPLE part of all. MY general method is as follows:
|
||||||
|
|
||||||
|
Find a box, let's say box 260. It's empty and I want it (obviously).
|
||||||
|
First, try passcode '000', if that doesn't work, try passcode '260',
|
||||||
|
just make very general guesses that's ALL. Some of the MOST Common passcodes
|
||||||
|
are:
|
||||||
|
|
||||||
|
3 digit boxes:
|
||||||
|
000
|
||||||
|
123
|
||||||
|
111
|
||||||
|
222
|
||||||
|
333
|
||||||
|
444
|
||||||
|
555
|
||||||
|
666
|
||||||
|
777
|
||||||
|
888
|
||||||
|
999
|
||||||
|
box # (say it's box 260, passcode: 260)
|
||||||
|
321
|
||||||
|
|
||||||
|
4 digit boxes:
|
||||||
|
|
||||||
|
1234
|
||||||
|
0000
|
||||||
|
1111
|
||||||
|
2222
|
||||||
|
3333
|
||||||
|
4444
|
||||||
|
5555
|
||||||
|
6666
|
||||||
|
7777
|
||||||
|
8888
|
||||||
|
9999
|
||||||
|
box # (Say its box 1200, try passcode: 1200)
|
||||||
|
|
||||||
|
|
||||||
|
The Key: REALLY try ALL of those. I knew one system with a passcode of
|
||||||
|
'5555' and NO ONE could hack it. And I did. So don't give up.
|
||||||
|
UNLESS you've exhausted all of those possibilities. Then forget
|
||||||
|
it.
|
||||||
|
|
||||||
|
That's it really. The most simple thing to do. Just remember not to
|
||||||
|
give up before you should and also try 3 digit passcodes on 4 digit
|
||||||
|
boxes. Also, once you get in for added security, a lot of these boxes
|
||||||
|
allow more digits for passcodes, so make a 5 digit passcode. Or if you
|
||||||
|
thing its worth it, try like '00000' so that's really about all.
|
||||||
|
|
||||||
|
Have fun and don't stop.
|
||||||
|
|
||||||
|
|
82
textfiles.com/phreak/VOICEMAIL/vmb.txt
Normal file
82
textfiles.com/phreak/VOICEMAIL/vmb.txt
Normal file
@@ -0,0 +1,82 @@
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
_____ __ __ ____ _ _ ______ ____ __ __
|
||||||
|
| __ \ | | | | / _ | | \ | | |__ __| / __ | \ / |
|
||||||
|
| | \ | ||___|| | / | | | \ | | || | / \ | | \ / |
|
||||||
|
| | | | | ___ | | | | | | \| | || || || | |\ \/ /| |
|
||||||
|
| |__/ | || || | \_| | | |\ | || | \__/ | | | \ / | |
|
||||||
|
| ___/ |__| |__| \____| |_| \__| |__| \____/ |_| \/ |_|
|
||||||
|
| |
|
||||||
|
| | N E T W O R K S P R O D U C T I O N
|
||||||
|
|_|
|
||||||
|
|
||||||
|
|
||||||
|
Voice Mail Made Easy
|
||||||
|
|
||||||
|
by HAGAR
|
||||||
|
CoSysop and PHREAK Sigop, Phantom Networks
|
||||||
|
|
||||||
|
|
||||||
|
Voice Mail Boxes, yes, VMB's. They seem so trivial to the advanced phreak yet
|
||||||
|
most beginners find them very fascinating. They often make a habit of begging
|
||||||
|
other people for them. A real pain in the ass.
|
||||||
|
|
||||||
|
I am not a studly VMB hacker. VMB's should not encompass your entire phreak
|
||||||
|
activities, as they really can be a waste of time. This article is just the
|
||||||
|
basiic guidelines for attaining a VMB.
|
||||||
|
|
||||||
|
[1] Find a system. The easiest way to do this is to just find
|
||||||
|
a codeline.
|
||||||
|
|
||||||
|
[2] Get in good with the codeline operator. If you continuously
|
||||||
|
post shit he will get to like you..
|
||||||
|
|
||||||
|
[3] Ask him where you can find empty boxes on the system. If he
|
||||||
|
readily complies ask if he might know the system default (more
|
||||||
|
on this later)
|
||||||
|
|
||||||
|
[4] Scan for an empty box. You will know that you have hit
|
||||||
|
an empty when it says "Box XXXX, Please leave your message
|
||||||
|
after the tone.." You now have your empty box.
|
||||||
|
|
||||||
|
[5] Hack the box. In order to do this you will need to find the
|
||||||
|
point where it says "Enter your password". On some systems you
|
||||||
|
will have to enter pound (#) as soon as you log in. It will
|
||||||
|
then ask for your box number (the empty one you just scanned)
|
||||||
|
and then your password. Try defaults (again, see below). Some
|
||||||
|
systems will require you to enter the box by calling up the
|
||||||
|
box in a regular manner, and during the greeting hit star (*).
|
||||||
|
You will then be asked for your password.
|
||||||
|
|
||||||
|
|
||||||
|
[Defaults]
|
||||||
|
|
||||||
|
Some systems have a certain password that is used for all empty boxes. Many
|
||||||
|
times this password will be "1234" or the box number. Here is where you get
|
||||||
|
creative. The password COULD be up to 14 digits, but will usually only be
|
||||||
|
four. Once you find a password that works it will probably be applicable to
|
||||||
|
every empty box on the system..
|
||||||
|
|
||||||
|
Here is also some good news.. on some systems empty boxes will have NO
|
||||||
|
password.
|
||||||
|
|
||||||
|
|
||||||
|
This is just a basic overrview... a crash course. For more information check
|
||||||
|
out the Phrack World News article on this subject, you will get a bit of a
|
||||||
|
background on how these damn things work.
|
||||||
|
|
||||||
|
|
||||||
|
Produced February 8, 1990. Leave me comments on my Direct Dial VMB at
|
||||||
|
714/665-5190
|
||||||
|
|
||||||
|
Special thanks to:
|
||||||
|
|
||||||
|
Huntington Hangout BBS (Hobbes)
|
||||||
|
Blackened
|
||||||
|
Misfit
|
||||||
|
|
||||||
|
|
||||||
|
Go ahead and upload this file, just make sure that all of the original credits
|
||||||
|
are intact.
|
||||||
|
|
309
textfiles.com/phreak/VOICEMAIL/vmb_smc.txt
Normal file
309
textfiles.com/phreak/VOICEMAIL/vmb_smc.txt
Normal file
@@ -0,0 +1,309 @@
|
|||||||
|
On the Essentials of Voice Mail Hacking
|
||||||
|
by the Kryptic Night
|
||||||
|
-S M C-
|
||||||
|
|
||||||
|
This file will describe several simple ways for hacking out
|
||||||
|
your own voice mail box. It is by no means a comprehensive
|
||||||
|
document on the subject, but rather, is meant to help those
|
||||||
|
beginning in the field. I myself have several voice mail boxes,
|
||||||
|
and have hacked on various systems. I will describe several of
|
||||||
|
the methods I have used, and try to explain the format for them.
|
||||||
|
|
||||||
|
An overview of several common commands:
|
||||||
|
# (Pound) - Used either to access the password prompt or a
|
||||||
|
dialing list.
|
||||||
|
* (Star) - This is either used to abort the current menu, or
|
||||||
|
to amplify the volume.
|
||||||
|
0 (Duh) - Used either to access the password prompt, or to chat
|
||||||
|
with our friend, the operator.
|
||||||
|
9 - This is occasionally used to hang up.
|
||||||
|
|
||||||
|
|
||||||
|
The First Step
|
||||||
|
Type of systems to look for
|
||||||
|
|
||||||
|
First of all you need a system to hack at. Unless you are a
|
||||||
|
pre-teenage new kid fan, answering machines usually aren't that
|
||||||
|
exciting.
|
||||||
|
Try to look for an 800 voice mail system. I know I don't like
|
||||||
|
having to pull out codes every time I want to call a VMB, only to
|
||||||
|
find that their is nothing there worth my while, and I'm sure
|
||||||
|
other people feel the same. This will not only provide yourself
|
||||||
|
with a free method for calling your box, but will also allow you
|
||||||
|
to call it from a payphone, and you can call it anytime, rather
|
||||||
|
than when you just have a code handy.
|
||||||
|
Another great advantage is using a system that is up for all
|
||||||
|
24 hours. This isn't a necessity, but is a great convenience. For
|
||||||
|
instance, imagine that you just gave out your number to someone
|
||||||
|
who be beneficial to your VMB as a good source of codes or
|
||||||
|
general info, but he has better things to do at night than call
|
||||||
|
VMB systems, with an afterhours VMB, you cut him off, is that what
|
||||||
|
you want? I'd hope not.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
The Second Step
|
||||||
|
Finding out how many digits the boxes are
|
||||||
|
|
||||||
|
Ok, so you now have a system to play with. Let's see if the
|
||||||
|
system is worth your time, and find out the basics of it.
|
||||||
|
Now you have to try to ascertain how many digits the box numbers
|
||||||
|
are, this may take a while if it requires you to press a '#'
|
||||||
|
(pound) sign after the box number, as these systems usually do not
|
||||||
|
tell you whether you entered the correct amount of digits or not.
|
||||||
|
For now, I'd recommend you just ignore these, as they would
|
||||||
|
require extra work. Try entering any 3 digits, you will in most
|
||||||
|
cases get an 'incorrect box number' message if the system is only
|
||||||
|
a 3 digit system. However, if it just hangs, does nothing, then
|
||||||
|
the odds are it's a four digit system. Try typing 4 digits now,
|
||||||
|
and if you still get no message, then it's either one of two
|
||||||
|
things. One, you may need to press a '#' (pound) sign after the
|
||||||
|
number, or in some cases, before it. Or two, the system is longer
|
||||||
|
than 4 digits, in which case you should ignore it for now. Some
|
||||||
|
systems contain a built-in time delay that will tell you a message
|
||||||
|
if you haven't entered the correct box in a given time, these
|
||||||
|
should also be avoided for now, as they will say something even if
|
||||||
|
you only type one digit, or if you type 100 digits.
|
||||||
|
|
||||||
|
|
||||||
|
The Third Step
|
||||||
|
Finding where the boxes are located
|
||||||
|
|
||||||
|
Now comes a rather tedious chore, finding out where on the
|
||||||
|
system the boxes are located. Unless it is a professional voice
|
||||||
|
mail company, they will probably have under 100-200 mail boxes in
|
||||||
|
use at any one time. These boxes may be found on the system in any
|
||||||
|
of two forms, clumped or scattered. Clumped boxes are when their
|
||||||
|
are several boxes all in one area of the system. Usually this is
|
||||||
|
the only area on the system that boxes are located, but
|
||||||
|
occasionally some systems have scattered clumps all around the
|
||||||
|
system. Scattered boxes occur when the boxes seem to have no
|
||||||
|
apparent order for their location, these are more difficult to
|
||||||
|
find empty boxes on, but not impossible.
|
||||||
|
Now you need to start looking for the clumps (We will start
|
||||||
|
with these, as they are generally easier to locate). Start
|
||||||
|
searching from 100, for a three digit system, or 1000, for a 4
|
||||||
|
digit system. Increment your searching by 25-50 for a three digit
|
||||||
|
system, and 100-500 on a four digit system. This will undoubtedly
|
||||||
|
be inaccurate, but it will allow you a better chance of finding
|
||||||
|
the clumps than random guessing. You may get several messages
|
||||||
|
while looking for these, anything from 'Boxes cannot start with
|
||||||
|
an x' to 'Incorrect box number' Generally these should be self-
|
||||||
|
explanatory, and you should be able to figure out how to respond
|
||||||
|
on your own. You are looking for any box with a message in it, any
|
||||||
|
message. When you find a used box, mark down the number, and scan
|
||||||
|
around that box in increments of 5 or so. If you find any more,
|
||||||
|
mark down that location as a clump. Remember however, that if you
|
||||||
|
get an incorrect box number message, that doesn't mean that that
|
||||||
|
area isn't a clump, just that that box is empty. This will provide
|
||||||
|
added inaccuracy to the job, but it's a fact that can't be
|
||||||
|
overcome by anything other than monotonous scanning by 1.
|
||||||
|
Try to make this fun, invite your friends over, have a phone
|
||||||
|
party....they can be fun and profitable if you know what you are
|
||||||
|
looking for.
|
||||||
|
As for scattered boxes, I don't have much to say, they aren't
|
||||||
|
the easiest systems to play with, as you can't tell with any
|
||||||
|
certainty where on the system a box will be, and if it's a four
|
||||||
|
digit system, that's 10,000 possible boxes...Not an encouraging
|
||||||
|
number. If you are on a system with scattered boxes, just ignore
|
||||||
|
this section and read how to find empty boxes next.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
The Fourth Step
|
||||||
|
The Miraculous Void
|
||||||
|
|
||||||
|
Once you've found the system, your real job has just begun.
|
||||||
|
You now need to find an empty box. Although it is possible to hack
|
||||||
|
out used boxes, this is usually undesirable, since used boxes tend
|
||||||
|
to have people who use them (makes sense doesn't it...I thought so
|
||||||
|
too) When some complaining customer calls and gets a message such
|
||||||
|
as "To call cosmos and fuck up the entire region, dial...blah blah
|
||||||
|
blah...remember to slaughter a cat for Halloween...", they will
|
||||||
|
most likely be a bit suspicious and will call the business
|
||||||
|
bitching about how they are so unprofessional, and that their
|
||||||
|
employees really should clean up their mouths...blah blah, you
|
||||||
|
know, the usual line of bullshit. If that doesn't happen, then the
|
||||||
|
person who owns the box will check it out, and if that happens,
|
||||||
|
you can be assured that the box won't last.
|
||||||
|
Now is the time to pull out that list of clumps you made.
|
||||||
|
Start searching around these boxes in increments of 1, yes one,
|
||||||
|
this may take a while...but if you've come this far...you
|
||||||
|
obviously have too much free time.
|
||||||
|
What you are looking for is any box that asks you to leave a
|
||||||
|
message at the tone, and doesn't play a prerecorded message to you
|
||||||
|
before that. These are relatively easy to recognize, and you
|
||||||
|
shouldn't have any problems with it. Just look for the anomaly.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
The Fifth Step
|
||||||
|
On the Art of Hacking
|
||||||
|
|
||||||
|
This is where the excitement begins, or the agony ends. By
|
||||||
|
now you should have found an empty box or two. If you haven't,
|
||||||
|
start over again with a different system. There are several ways
|
||||||
|
to access the password prompt. Usually most systems tell you right
|
||||||
|
up front at the main menu how to do it, but since some do not,
|
||||||
|
I'll explain the most common ways that I know of.
|
||||||
|
The magical pound sign is the most common way of accessing
|
||||||
|
the password prompt. From the main menu you should press the #
|
||||||
|
sign, and then the box number. It will then ask for your security
|
||||||
|
password, or some other such inane jargon. The other common way of
|
||||||
|
accessing the prompt is to dial the box number, and press 0 while
|
||||||
|
the message is playing, or sometime after you dial the box number.
|
||||||
|
You will then be asked to enter your security password, or
|
||||||
|
whatever they choose to call it.
|
||||||
|
A security password is usually, but not always, the same
|
||||||
|
length as the box number. The most common default password for
|
||||||
|
voice mail systems is a string of zero's, 000 for three digit
|
||||||
|
systems and 0000 for four digit systems. Other common passwords
|
||||||
|
are: The box number, IE - box 2045 would have a password of 2045,
|
||||||
|
box of 0981 (four digit system) would have a password of 0981, and
|
||||||
|
a three digit system might have something like 521 for a box
|
||||||
|
number of 521, a string of some common digits, such as 1111,
|
||||||
|
2222, 3333, ainsi du suite, the year, or 1234. By no means are
|
||||||
|
these the only default passwords, but these are the ones I've
|
||||||
|
seen, and have heard about. You should be able to catch a
|
||||||
|
significant number of empty boxes with these.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
The Sixth Step
|
||||||
|
You're in, now what
|
||||||
|
|
||||||
|
So you think you're cool, right? You've found a box or two
|
||||||
|
that you can get into. Well, congrats, from here on out everything
|
||||||
|
is cake. This section and following sections won't tell you too
|
||||||
|
much that you shouldn't be able to figure out with
|
||||||
|
experimentation, but I'm trying to be thorough...
|
||||||
|
You've gotten past the password, and are at a prompt that
|
||||||
|
asks you to 'send a message to another box' 'read new mail', or
|
||||||
|
what not. If their are messages in the box, you should read them
|
||||||
|
and pay attention to the date stamp if it's there. If the message
|
||||||
|
is only a day or so old, then you might want to make sure you have
|
||||||
|
other boxes to fall back on. Besides that, just enjoy the thrill
|
||||||
|
of listening to other people's private mail...I once got a message
|
||||||
|
from some guy's mistress...Funnier than hell. All the commands for
|
||||||
|
these options should be readily apparent, and told to you when you
|
||||||
|
get in.
|
||||||
|
To configure your system with your message, name, and
|
||||||
|
password you will need to enter the 'Setup menu' or whatever it is
|
||||||
|
called. Sometimes this function won't be told to you, but that's
|
||||||
|
not really a problem, their are only 12 digits to try. Most
|
||||||
|
systems default to an 8 or a 3. I'll assume you can find it on
|
||||||
|
your own...
|
||||||
|
You've gotten into the config menu by now, and you are
|
||||||
|
confronted with a multitude of options. First you should ALWAYS
|
||||||
|
change your password to something that you feel is unhackable,
|
||||||
|
your phone number is not a good choice. Next you should enter your
|
||||||
|
own personal message. Try to figure out if the message is time
|
||||||
|
limited to 30 seconds or a minute, a lot of systems do that. These
|
||||||
|
systems are usually only good for personal message boxes, and not
|
||||||
|
code lines. Next, change your name if the system allows you to do
|
||||||
|
that...I don't think you want to be called Edwina Lipshitz when
|
||||||
|
someone tries to leave you a message.
|
||||||
|
Their may be other functions, such as message forwarding,
|
||||||
|
call placements, group messages, message waiting status, etc.
|
||||||
|
Generally these should be ignored, unless you're adventurous and
|
||||||
|
willing to risk your box with something like having the system
|
||||||
|
call you when you get a message.
|
||||||
|
So, you've done everything, and set up a cool box, eh? Great,
|
||||||
|
now just for fun, go back to the main system menu, and try to
|
||||||
|
enter your box as a user would. Type to box number and listen to
|
||||||
|
your message, if it's satasfactory...You've done it, you now have
|
||||||
|
a brand new box you can tell your friends.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
The Seventh Step
|
||||||
|
What to do with a VMB
|
||||||
|
|
||||||
|
|
||||||
|
Just for kicks, you might want to figure out what to do with
|
||||||
|
a VMB once you have it. I'll describe two of these options, their
|
||||||
|
are infinity more to the imaginative.
|
||||||
|
|
||||||
|
Code lines: These are quite possibly the best thing you can
|
||||||
|
ever have if you are interested in the underground scene. If it is
|
||||||
|
well advertised, and you post all the info you get, you will have
|
||||||
|
a popular box. With a popular box, you'll get a vast amount of
|
||||||
|
information that you wouldn't find on most boards, such as cosmos
|
||||||
|
dialups, telenet accounts, codes, and other such info. These type
|
||||||
|
of boxes can get you into trouble quite quickly if the gestapo
|
||||||
|
finds out about it, as they are a bit more annoyed with someone
|
||||||
|
who posts all their private information, over someone who just
|
||||||
|
asks to leave a message at the prompt. But when you live the life
|
||||||
|
you need to, the risks are not a factor.
|
||||||
|
Personal boxes are also great for several reasons. You can
|
||||||
|
post your VMB to people who need to get in touch with you, even
|
||||||
|
when they don't have a code. You can also use them in the fine
|
||||||
|
art of carding. When the salesperson asks for your phone number,
|
||||||
|
tell 'em something like "It's being fixed, but you can call my
|
||||||
|
voice mail system at XXX-XXX-XXXX." This will make them a lot less
|
||||||
|
suspicious then if you give them a bad phone number. Of course you
|
||||||
|
would want to change the box message to that of the person whose
|
||||||
|
card you used, but that's obvious.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
The Eighth Step
|
||||||
|
How to keep your VMB safe and sound
|
||||||
|
|
||||||
|
Once you've gone through all the trouble of hacking out a
|
||||||
|
VMB, the last thing you want is for it to go bad the next week,
|
||||||
|
their is little in this more infuriating then spending a lot of
|
||||||
|
time getting a box, to find it go dead the next day.
|
||||||
|
|
||||||
|
Several ways to keep your box safe include...
|
||||||
|
NEVER hack out more than 1 or 2 boxes at ANY time. If you
|
||||||
|
need another VMB be kind to yourself, do it on another system.
|
||||||
|
Their have been too many busts of people who get greedy.
|
||||||
|
DON'T allow other people to hack on your system. Threats or
|
||||||
|
warnings will sometimes be effective, threaten them with things
|
||||||
|
such as ruining their credit ratings with TRW, sending a few
|
||||||
|
thousand dildo's to their mother, care of them, or whatever...be
|
||||||
|
imaginative. Or you can offer to hack out a box for them somewhere
|
||||||
|
else. This may seem like a bitch to do, but it's worth your time
|
||||||
|
if the person is an asshole.
|
||||||
|
DON'T post your VMB on lame systems, or on systems where
|
||||||
|
their are a large amount of people who dislike you. These idiots
|
||||||
|
usually have less of a life than you, and are not against spending
|
||||||
|
days trying to hack out your password. Since you probably can't
|
||||||
|
kill them upfront, just make sure they don't get your number.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
The Conclusion
|
||||||
|
The Usual Bullshit
|
||||||
|
|
||||||
|
This file was researched are written by the Kryptic Night. It
|
||||||
|
was produced as the first in a series of quality SMC text files
|
||||||
|
released for the private public. In no way do I care whether you
|
||||||
|
get busted or not, and accept no responsibility for corrupting
|
||||||
|
your young minds. Thanx go out to the members of SMC, Scooter, and
|
||||||
|
everyone else who is interested in freedom of speech.
|
||||||
|
|
||||||
|
Information is the most powerful weapon one can possess
|
||||||
|
against the masses.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
||||||
|
| \
|
||||||
|
| /\/\ / <20>\ <20><><EFBFBD>
|
||||||
|
| / \ / <20> \ A <20> A
|
||||||
|
| / |/| / / \ <20> / <20> /
|
||||||
|
|/ | < \ <20>/ <20>/ U L T
|
||||||
|
|\ RYPTIC / | \ \ / <20>\
|
||||||
|
| \ / | \ <20> \
|
||||||
|
|\ | | \
|
||||||
|
| \ |
|
||||||
|
| \|IGHT
|
||||||
|
/ `
|
||||||
|
|
||||||
|
- Servants of the Mushroom Cloud -
|
||||||
|
|
||||||
|
Data Kult, Kryptic Night, Lord Logics, Nacht Habicht,
|
||||||
|
Shadow Walker, the Scorpion
|
126
textfiles.com/phreak/VOICEMAIL/vmbh-rl.txt
Normal file
126
textfiles.com/phreak/VOICEMAIL/vmbh-rl.txt
Normal file
@@ -0,0 +1,126 @@
|
|||||||
|
|
||||||
|
R e n e g a d e L e g i o n
|
||||||
|
T e c h n i c a l R e p o r t s
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Technical Report #3
|
||||||
|
|
||||||
|
....
|
||||||
|
........
|
||||||
|
.........
|
||||||
|
... ....
|
||||||
|
... ....
|
||||||
|
.....
|
||||||
|
....
|
||||||
|
....
|
||||||
|
... ...
|
||||||
|
... ...
|
||||||
|
.. ...
|
||||||
|
...
|
||||||
|
|
||||||
|
February 1991
|
||||||
|
|
||||||
|
|
||||||
|
RL HQ - 617.oOo.oOOo
|
||||||
|
|
||||||
|
VMB Hacking
|
||||||
|
-----------
|
||||||
|
|
||||||
|
Written By: The Knight
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
|
||||||
|
a great deal of 'hidden info' that isn't common sense. But, If you are out
|
||||||
|
there trying to hack a box and can't, follow through the VERY logical and
|
||||||
|
simple steps and make sure they are matching up.
|
||||||
|
|
||||||
|
|
||||||
|
Step 1:
|
||||||
|
|
||||||
|
Finding a VMB System
|
||||||
|
|
||||||
|
There are many ways you can find a VMB system, for instance, on a BBS when
|
||||||
|
someone says 'Here are some systems' usually thats what they're referring
|
||||||
|
to. Also, Try setting up your scanner and listening for 'Welcome to XX
|
||||||
|
company, Enter extension #' or something similar to that. Then you have
|
||||||
|
found a VMB system.
|
||||||
|
|
||||||
|
|
||||||
|
Step 2:
|
||||||
|
|
||||||
|
Finding a Box
|
||||||
|
|
||||||
|
This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
|
||||||
|
You must make sure that no one is using it. There are several ways to do
|
||||||
|
this. One EASY way is when you hack it, check the date on the latest
|
||||||
|
messages, if they are OVER a month old, then I'd say your safe to use them.
|
||||||
|
Also, watch in case there is just like _2_ messages in there from the last
|
||||||
|
4 months that those messages could be messages sent to ALL the boxes, see if
|
||||||
|
they sound personal. If they DON'T, then grab the box.
|
||||||
|
|
||||||
|
Let's say there's a box you REALLY want bad and someone's using it regularly,
|
||||||
|
try doing this: Go in twice a day (make SURE you DON'T change the greeting
|
||||||
|
etc.) and erase all the messages. He will complain and will eventually move
|
||||||
|
out of the box. Then there is a good chance of you having that box. It's
|
||||||
|
happned to me.
|
||||||
|
|
||||||
|
|
||||||
|
Step 3:
|
||||||
|
|
||||||
|
Hacking the VMB
|
||||||
|
|
||||||
|
This is the most SIMPLE part of all. MY general method is as follows:
|
||||||
|
|
||||||
|
Find a box, let's say box 260. It's empty and I want it (obviously).
|
||||||
|
First, try passcode '000', if that doesn't work, try passcode '260',
|
||||||
|
just make very general guesses that's ALL. Some of the MOST Common passcodes
|
||||||
|
are:
|
||||||
|
|
||||||
|
3 digit boxes:
|
||||||
|
000
|
||||||
|
123
|
||||||
|
111
|
||||||
|
222
|
||||||
|
333
|
||||||
|
444
|
||||||
|
555
|
||||||
|
666
|
||||||
|
777
|
||||||
|
888
|
||||||
|
999
|
||||||
|
box # (say it's box 260, passcode: 260)
|
||||||
|
321
|
||||||
|
|
||||||
|
4 digit boxes:
|
||||||
|
|
||||||
|
1234
|
||||||
|
0000
|
||||||
|
1111
|
||||||
|
2222
|
||||||
|
3333
|
||||||
|
4444
|
||||||
|
5555
|
||||||
|
6666
|
||||||
|
7777
|
||||||
|
8888
|
||||||
|
9999
|
||||||
|
box # (Say its box 1200, try passcode: 1200)
|
||||||
|
|
||||||
|
|
||||||
|
The Key: REALLY try ALL of those. I knew one system with a passcode of
|
||||||
|
'5555' and NO ONE could hack it. And I did. So don't give up.
|
||||||
|
UNLESS you've exhausted all of those possibilities. Then forget
|
||||||
|
it.
|
||||||
|
|
||||||
|
That's it really. The most simple thing to do. Just remember not to
|
||||||
|
give up before you should and also try 3 digit passcodes on 4 digit
|
||||||
|
boxes. Also, once you get in for added security, a lot of these boxes
|
||||||
|
allow more digits for passcodes, so make a 5 digit passcode. Or if you
|
||||||
|
thing its worth it, try like '00000' so that's really about all.
|
||||||
|
|
||||||
|
Have fun and don't stop.
|
||||||
|
|
||||||
|
|
||||||
|
|
127
textfiles.com/phreak/VOICEMAIL/vmbhack.hac
Normal file
127
textfiles.com/phreak/VOICEMAIL/vmbhack.hac
Normal file
@@ -0,0 +1,127 @@
|
|||||||
|
R e n e g a d e L e g i o n
|
||||||
|
* * T e c h n i c a l R e p o r t s * *
|
||||||
|
* R * * L *
|
||||||
|
* *
|
||||||
|
|
||||||
|
Eastern Western
|
||||||
|
....
|
||||||
|
Net Runner ........ Overdose
|
||||||
|
The Knight ......... Sirus
|
||||||
|
Kingpin ... .... Snuggle
|
||||||
|
Highlander ... ....
|
||||||
|
Nemesis .....
|
||||||
|
Rogue .... Canadien
|
||||||
|
Zardoz ....
|
||||||
|
Cursor ... ...
|
||||||
|
The Gypsy ... ... Blackheart
|
||||||
|
Iceburg .. ...
|
||||||
|
White Knight ...
|
||||||
|
|
||||||
|
Presents
|
||||||
|
|
||||||
|
|
||||||
|
Eastern RL HQ - 617-XXX-XXXX
|
||||||
|
Canadien HQ - 902-XXX-XXXX
|
||||||
|
|
||||||
|
|
||||||
|
VMB Hacking
|
||||||
|
-----------
|
||||||
|
|
||||||
|
Written By: The Knight
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
|
||||||
|
a great deal of 'hidden info' that isn't common sense. But, If you are out
|
||||||
|
there trying to hack a box and can't, follow through the VERY logical and
|
||||||
|
simple steps and make sure they are matching up.
|
||||||
|
|
||||||
|
|
||||||
|
Step 1:
|
||||||
|
|
||||||
|
Finding a VMB System
|
||||||
|
|
||||||
|
There are many ways you can find a VMB system, for instance, on a BBS when
|
||||||
|
someone says 'Here are some systems' usually thats what they're referring
|
||||||
|
to. Also, Try setting up your scanner and listening for 'Welcome to XX
|
||||||
|
company, Enter extension #' or something similar to that. Then you have
|
||||||
|
found a VMB system.
|
||||||
|
|
||||||
|
|
||||||
|
Step 2:
|
||||||
|
|
||||||
|
Finding a Box
|
||||||
|
|
||||||
|
This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
|
||||||
|
You must make sure that no one is using it. There are several ways to do
|
||||||
|
this. One EASY way is when you hack it, check the date on the latest
|
||||||
|
messages, if they are OVER a month old, then I'd say your safe to use them.
|
||||||
|
Also, watch in case there is just like _2_ messages in there from the last
|
||||||
|
4 months that those messages could be messages sent to ALL the boxes, see if
|
||||||
|
they sound personal. If they DON'T, then grab the box.
|
||||||
|
|
||||||
|
Let's say there's a box you REALLY want bad and someone's using it regularly,
|
||||||
|
try doing this: Go in twice a day (make SURE you DON'T change the greeting
|
||||||
|
etc.) and erase all the messages. He will complain and will eventually move
|
||||||
|
out of the box. Then there is a good chance of you having that box. It's
|
||||||
|
happned to me.
|
||||||
|
|
||||||
|
|
||||||
|
Step 3:
|
||||||
|
|
||||||
|
Hacking the VMB
|
||||||
|
|
||||||
|
This is the most SIMPLE part of all. MY general method is as follows:
|
||||||
|
|
||||||
|
Find a box, let's say box 260. It's empty and I want it (obviously).
|
||||||
|
First, try passcode '000', if that doesn't work, try passcode '260',
|
||||||
|
just make very general guesses that's ALL. Some of the MOST Common passcodes
|
||||||
|
are:
|
||||||
|
|
||||||
|
3 digit boxes:
|
||||||
|
000
|
||||||
|
123
|
||||||
|
111
|
||||||
|
222
|
||||||
|
333
|
||||||
|
444
|
||||||
|
555
|
||||||
|
666
|
||||||
|
777
|
||||||
|
888
|
||||||
|
999
|
||||||
|
box # (say it's box 260, passcode: 260)
|
||||||
|
321
|
||||||
|
|
||||||
|
4 digit boxes:
|
||||||
|
|
||||||
|
1234
|
||||||
|
0000
|
||||||
|
1111
|
||||||
|
2222
|
||||||
|
3333
|
||||||
|
4444
|
||||||
|
5555
|
||||||
|
6666
|
||||||
|
7777
|
||||||
|
8888
|
||||||
|
9999
|
||||||
|
box # (Say its box 1200, try passcode: 1200)
|
||||||
|
|
||||||
|
|
||||||
|
The Key: REALLY try ALL of those. I knew one system with a passcode of
|
||||||
|
'5555' and NO ONE could hack it. And I did. So don't give up.
|
||||||
|
UNLESS you've exhausted all of those possibilities. Then forget
|
||||||
|
it.
|
||||||
|
|
||||||
|
That's it really. The most simple thing to do. Just remember not to
|
||||||
|
give up before you should and also try 3 digit passcodes on 4 digit
|
||||||
|
boxes. Also, once you get in for added security, a lot of these boxes
|
||||||
|
allow more digits for passcodes, so make a 5 digit passcode. Or if you
|
||||||
|
thing its worth it, try like '00000' so that's really about all.
|
||||||
|
|
||||||
|
Have fun and don't stop.
|
||||||
|
|
||||||
|
-- The Knight, Sysop Eastern RL HQ BBS
|
||||||
|
|
||||||
|
|
59
textfiles.com/phreak/VOICEMAIL/vmbhack.txt
Normal file
59
textfiles.com/phreak/VOICEMAIL/vmbhack.txt
Normal file
@@ -0,0 +1,59 @@
|
|||||||
|
[0m
|
||||||
|
|
||||||
|
+------------------------+
|
||||||
|
| A.C.E. Presents |
|
||||||
|
| |
|
||||||
|
| Zod's VMB Hacker Dox |
|
||||||
|
+------------------------+
|
||||||
|
|
||||||
|
Dox by Zod
|
||||||
|
|
||||||
|
I wrote this program because of the amount of time and effort that is
|
||||||
|
needed to hack out a VMB by hand manually. This program is not totally auto-
|
||||||
|
mated because the computer has no way of knowing if it got the correct PW or
|
||||||
|
not, but it will certainly speed up the process of hacking out a VMB and make
|
||||||
|
it much easier.
|
||||||
|
|
||||||
|
How To Use It
|
||||||
|
-------------
|
||||||
|
|
||||||
|
Using VMB Hacker is very easy. Just load it up and answer all the questions.
|
||||||
|
First, (obviosly) enter the VMB's number. Then, enter the numbers and signs
|
||||||
|
that VMB Hacker should dial before it dials the security code (such as *, #
|
||||||
|
or box number, etc.) Next, enter the code that VMB Hacker should start hacking
|
||||||
|
at. VMB Hacker can either go down or up. Next, enter the PW length so it knows
|
||||||
|
how many 0's to add before the number (PW length can be 3, 4, 5, or 6... Maybe
|
||||||
|
next version will be able to do longer ones). Next, enter either 1 to hack up
|
||||||
|
or -1 to go down. In the next version, I may add random hacking, if and when
|
||||||
|
VMBs start tracing (who knows). Next, enter the comport that your modem is in.
|
||||||
|
Next, enter the amount of attempts that VMB Hacker should make before hanging
|
||||||
|
up, calling the VMB back and trying some more, or just 0 if the VMB lets u
|
||||||
|
keep trying. Next, is auto-hack. If you select Auto-Hack, VMB Hacker will keep
|
||||||
|
trying PWs until you press C for Correct PW. This is very useful cuz it lets
|
||||||
|
u just sit back and relax and listen, but it will only work well if your modem
|
||||||
|
has a nice loud speaker. If you select Auto-Hack, u must now tell it the amount
|
||||||
|
of seconds to wait for u tel press C before it tries the next code. Next, you
|
||||||
|
must tell VMB Hacker how many seconds to wait after dialing the VMB before it
|
||||||
|
starts hacking.
|
||||||
|
|
||||||
|
Hope this program helps you out in hackout out your VMB's. If u have any
|
||||||
|
questions, u can call my board and ask me or contact me on any of the other
|
||||||
|
A.C.E. boards in New York. Also, I'd like to thank PO\/\/ER 1 and Outlaw for
|
||||||
|
for giving me the idea to write this program.
|
||||||
|
|
||||||
|
L8r, d00dz...
|
||||||
|
|
||||||
|
[1;36m---===[1;33m< [1;35mZod [1;33m>[1;36m===---[0m
|
||||||
|
|
||||||
|
|
||||||
|
Call These Fine A.C.E. Boards:
|
||||||
|
|
||||||
|
The Dead Of Night BBS
|
||||||
|
(212)979-0719
|
||||||
|
Sysop - Zod
|
||||||
|
|
||||||
|
HPCLand
|
||||||
|
(718)531-7846
|
||||||
|
Sysop - PO\/\/ER 1
|
||||||
|
|
||||||
|
|
1654
textfiles.com/phreak/VOICEMAIL/vmbhaq.txt
Normal file
1654
textfiles.com/phreak/VOICEMAIL/vmbhaq.txt
Normal file
File diff suppressed because it is too large
Load Diff
248
textfiles.com/phreak/VOICEMAIL/vmblol.txt
Normal file
248
textfiles.com/phreak/VOICEMAIL/vmblol.txt
Normal file
@@ -0,0 +1,248 @@
|
|||||||
|
[40m[2J[2H[24C[0;1;31m<31><6D>[41m<31>[0;31m<31><6D><EFBFBD><EFBFBD> [1m<31><6D>[41m<31>[0;31m<31><6D><EFBFBD><EFBFBD> [1m<31><6D>[41m<31>[0;31m<31><6D><EFBFBD><EFBFBD>[3H[34m<34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[1;31m<31><6D>[0;31m<31><6D><EFBFBD>[34m<34><6D><EFBFBD><EFBFBD>[1;31m<31><6D>[0;31m<31><6D><EFBFBD>[1m<31>[41m<31>[0;31m<31><6D>[34m<34>[1;31m<31><6D>[0;31m<31><6D><EFBFBD>[34m<34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[s
|
||||||
|
[u<><75><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[4H[1m<31><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[31m<31><6D>[0;31m<31><6D><EFBFBD>[1;34m<34>[31m<31><6D>[0;31m<31>[1m<31><6D>[0;31m<31><6D><EFBFBD>[1m<31>[41m<31>[0;31m<31><6D>[1;34m<34>[31m<31><6D>[0;31m<31><6D><EFBFBD>[1;34m<34>[31m<31><6D>[0;31m<31>[1;34m<34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[5H[0;34m<34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[1;31m<31><6D>[s
|
||||||
|
[u[41m<31>[0;31m<31><6D><EFBFBD>[41m [40m<30>[34m<34>[1;31m<31><6D>[41m<31>[0;31m<31><6D><EFBFBD><EFBFBD>[34m<34>[1;31m<31><6D>[41m<31>[0;31m<31><6D><EFBFBD>[41m [40m<30>[34m<34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[6H[24C[1;37;47m<37><6D>[30m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[7H[24C[40m<30><6D>[8H [0;35m<35>[1m<31>[0;35m<35> [37mCardin[s
|
||||||
|
[ug [35m<35>[1;31m<31>[0;35m<35> [37mPhreaking [35m<35>[1;32m<32>[0;35m<35> [37mHacking [35m<35>[1;36m<36>[0;35m<35> [37mAnarchy [35m<35>[1;33m<33>[0;35m<35> [37mPhraud [35m<35>[1;37m<37>[0;35m<35>[9H[10H[1;31mWritten by: [36mW[34mave [37mR[0munner![35C[1;31m[s
|
||||||
|
[uDate: [36m10/22/90[11H[31mEdited by : [36mC[0;36mount[34m_[1mZER0[8C[36m<36>[0;36megions [1m<31>[0;36mf [1m<31>[0;36mucifer[12H[30C[32mText # [1;37m12[13H[30C[0;32mPart [1m1 [0;32mout of [1m1[14H[15H[0;34m<34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[s
|
||||||
|
[u<><75><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[16H[1m<31><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[17H[36m<36><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[18H[19H[13C[s
|
||||||
|
[u[32mHacking & Scanning Voice Mail Boxes: The Tutorial[20H[21H[36m<36><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[22H[34m<34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[23H[0;34m[A
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[0m
|
||||||
|
|
||||||
|
Legions of Lucifer ('l<>jen ov l<>cif<69>r) n. 1. Any multitude of followers
|
||||||
|
of the chief evil spirit, Satan. 2. A group of Anarchists and Computer
|
||||||
|
Experts that work together as one to cause havok in the anarchy bound
|
||||||
|
society of this nation.
|
||||||
|
|
||||||
|
|
||||||
|
Hello again, and welcome to another <20>egions <20>f <20>ucifer text phile! This
|
||||||
|
text file has to do with hacking and scanning VMBs. The reason I am writing
|
||||||
|
this phile is because I am very good at it, and have had years of experience.
|
||||||
|
Infact I have been called by MCI for screwing them over by attacking and
|
||||||
|
taking over a whole damn system with a few friends of mine.
|
||||||
|
|
||||||
|
Anyways, hacking VMBs is very simple and basically safe, and not only that
|
||||||
|
but they are kewl to have around. You can give them to friends, you can
|
||||||
|
trade them for access on bulletin boards, or you can use it for yourself.
|
||||||
|
As for this 'Tutorial on Hacking VMBs', we will be talking about what systems
|
||||||
|
to hack, how you go about hacking them, default passwords, hints on better
|
||||||
|
scanning, and having your very own box.
|
||||||
|
|
||||||
|
|
||||||
|
Basics:
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
VMB, in case you don't know, stands for 'Voice Mail Box'. Now a VMB is
|
||||||
|
like an answering machine. You can use it for all sorts of things. Most
|
||||||
|
VMB systems are dialed though 800 numbers. People call up the VMB system
|
||||||
|
that you have a box on, and dial in your box number and then leave you a
|
||||||
|
message. Whenever you want to check your box, you just call up, enter your
|
||||||
|
password and read your messages. Inside a VMB you can do whatever, you can
|
||||||
|
leave messages to others on the system, you can change your 'Out Going'
|
||||||
|
message, you can have guest boxes (Explained later), you can have the box
|
||||||
|
call your house when you get an Urgent message, you can do a lot of things.
|
||||||
|
Infact, on some systems you can even CALL OUT through them, so they can be
|
||||||
|
used as a code of sorts! They are cool to have.
|
||||||
|
|
||||||
|
|
||||||
|
What Type of System You Should Scan/Hack:
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
You should scan/hack out Virgin Systems, this is another way of calling a
|
||||||
|
system that hasn't been hack out yet. Also, CINDI Systems and ASPEN Systems
|
||||||
|
have the best boxes and the most options that VMB Systems can offer. I will
|
||||||
|
be talking about ASPEN System today since I know most about those.
|
||||||
|
|
||||||
|
|
||||||
|
Scanning Your 'Virgin ASPEN VMB System':
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
Okay once you've found your Virgin VMB System, you start to scan. Just incase
|
||||||
|
you don't know what scanning is, that means you search for boxes that are
|
||||||
|
hackable (Explained later on). Now you dial up the system and when it picks
|
||||||
|
up and the bitch starts to talk, press the "#" key. It will then ask you for
|
||||||
|
your box number... now there are two different way the ASPEN System can be
|
||||||
|
configured: 1) a "3 Digit Box Number System" or 2) a "4 Digital Box Number
|
||||||
|
System". Now lets just say this system is a 3 Digit System. Okay, when it
|
||||||
|
asks for your Box Number, enter in 999, now it will say one of three things:
|
||||||
|
[These are known as 'Greeting Names']
|
||||||
|
1. John Doe [Box owners name]
|
||||||
|
2. "Box Number 999 Is Not a Valid Box Number"
|
||||||
|
3. "Box Number 999"
|
||||||
|
Now, if it eithers says 1 or 2, go to box number 998...997...996...995..etc,
|
||||||
|
but if it says 3, then you are lucky, now it will ask you for your password,
|
||||||
|
now you are probably saying 'Shit this is where it gets difficult'... well
|
||||||
|
you are WRONG! This part is easy. Here is a list of ASPEN Default Passwords:
|
||||||
|
|
||||||
|
* We will use box number 666 as an example box #
|
||||||
|
[ BN = Box Number ]
|
||||||
|
|
||||||
|
List of Default Password: Combination Result
|
||||||
|
|
||||||
|
1-BN 1666
|
||||||
|
BN+1 667
|
||||||
|
0-BN 0666
|
||||||
|
BN-0 6660
|
||||||
|
Most Common <20>į BN 666
|
||||||
|
|
||||||
|
Now enter in a those defaults, try JUST the Box Number first, ASPENs usually
|
||||||
|
use that most. Now, if you try all those Defaults and still can not get into
|
||||||
|
that Voice Mail Box, then that means that the box has been already taken, but
|
||||||
|
the owner hasn't changed his 'Generic Message', if you don't get in, you
|
||||||
|
will just have to search until you get in.
|
||||||
|
|
||||||
|
|
||||||
|
Once You Get Into a Box:
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
Okay, once you get your first box, *DO NOT* change anything!! That will come
|
||||||
|
later. Your first box is, as what is known as a 'Scanning Box'! What you do
|
||||||
|
with your Scanning Box is this: You enter "3" from the main commands menu,
|
||||||
|
and it will ask you for the box number. Now that command is the "Check for
|
||||||
|
Reciept" command, what it does it check Box #xxx for mail from you. This
|
||||||
|
command is very convienient for us VMB Hackers. To use that command to your
|
||||||
|
advantage, you enter in box a box number and it will say 1 of the three
|
||||||
|
'Greeting Names', like before, if it say #3, then you write down that Box
|
||||||
|
Number and hack it later. But if it says 1 or 2, then just keep scanning!
|
||||||
|
All boxes with the number 3 Greeting Name is known as a 'Hackable Box'.
|
||||||
|
Now you keep scanning until you have gone all the way down to Box number 000
|
||||||
|
or whatever is the lowest box it supports. Now, once you have your list this
|
||||||
|
is when all the fun starts! Now you are ready to hack!
|
||||||
|
|
||||||
|
|
||||||
|
Hacking Out Your New Found 'Hackable' Boxes:
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
Okay this is the easy part. After you spent most of your time by scanning
|
||||||
|
the system you should be used to the system and how it works, that should
|
||||||
|
make hacking the ASPEN all the easier. Now, if you had a 'Scanning Box', you
|
||||||
|
should know what the default password was for your Scanning Box. Well if the
|
||||||
|
password for your Scanning Box was just the Box Number, then *EVERY* other
|
||||||
|
hackable box should have the SAME default password. VMB Systems have only
|
||||||
|
one default password, If one box has the BN for a Default PW, the all the
|
||||||
|
others will too.
|
||||||
|
|
||||||
|
Okay, you call up the VMB System will the list of 'Hackable' boxes by your
|
||||||
|
side, and when the bitch is talking, press the "#" key. When it asks you for
|
||||||
|
your box number, enter in the first box number on your list. When it asks for
|
||||||
|
your password, enter in the Default Password Sequence. Now if you don't get
|
||||||
|
into that box, it's not a problem, just keep going down your list. You should
|
||||||
|
get into a few. But remember, just because a box is marked 'Hackable', it
|
||||||
|
doesn't mean you will definatly get into it.
|
||||||
|
|
||||||
|
Okay, now you have a few dosen boxes. You can now use you Scanning Box to do
|
||||||
|
whatever you please.
|
||||||
|
|
||||||
|
|
||||||
|
ASPEN Guest Boxes:
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
Once you have a box of your own, you can give out 'Guest Boxes'. Guest Boxes
|
||||||
|
are like Sub Boxes in your box. In ASPEN you have 4 of them. If you give out
|
||||||
|
Guest Box #1 to John Doe, Mr. Doe can call in, enter in the password YOU set
|
||||||
|
for him, and leave you messages, but not only that, you can leave messages
|
||||||
|
to HIM! Which means, if his is in New York, and you are in California, and
|
||||||
|
neither of you have codes to call eachother, then you can leave messages thru
|
||||||
|
your 800 VMB. Here is a list and explination of all 4 of the Guest Boxes:
|
||||||
|
|
||||||
|
0. Main Box - Your Voice Mail Box!
|
||||||
|
1. Guest Box #1 - Can Leave & Recieve Messagez
|
||||||
|
2. Guest Box #2 - Can Leave & Recieve Messagez
|
||||||
|
3. Home Box - Can Leave & Recieve Messagez
|
||||||
|
4. Secretary Box - Can Check How Many Messagez You
|
||||||
|
Have & Recieve Messagez
|
||||||
|
|
||||||
|
|
||||||
|
Hints On Better Scanning:
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
A lot of people say hacking and scanning for VMBs is too damn hard... well
|
||||||
|
that's because they are going at it all wrong, they probably read some lame
|
||||||
|
piece of shit text file on Hacking VMBs that was about 500 bytes long. Well,
|
||||||
|
here is a small list of hints on better scanning and hacking:
|
||||||
|
|
||||||
|
1. Do not use a Voice Mail Box hacking/scanning program
|
||||||
|
(ei: VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..)
|
||||||
|
2. Do not hack in random order (ei: B#999, 345, 810, etc)
|
||||||
|
Always hack in order: 999, 998, 997, 996, 995...000.
|
||||||
|
3. Try to find out if it's virgin. The newer the System,
|
||||||
|
the better.
|
||||||
|
4. If you have a phone with memory dial, change one entry
|
||||||
|
to the number of the VMB System.
|
||||||
|
5. Don't hack the System Managers box unless you really
|
||||||
|
want to.
|
||||||
|
|
||||||
|
|
||||||
|
Ideas of Things To Do With Your Extra Boxez:
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
Well since you can have up to 500 extra Voice Mail Boxes, you might
|
||||||
|
not know what to do with them, here are a few ideas that can help you out:
|
||||||
|
|
||||||
|
1. Give them to friends
|
||||||
|
2. Sell them to friends
|
||||||
|
3. Offer them to sysops for
|
||||||
|
for better access
|
||||||
|
4. Trade them for HSTs or
|
||||||
|
whatever
|
||||||
|
5. Use them as a Voice Verifing line (So you don't have to give out
|
||||||
|
your real voice number to BBSes when you apply!)
|
||||||
|
|
||||||
|
|
||||||
|
Well, that's it to the <20>egions <20>f <20>ucifer Hacking & Scanning Voice Mail Box
|
||||||
|
Systems Tutorial! I hope it helped you and I, along with <20>.<2E>.<2E> wish you the
|
||||||
|
best of luck with your new found hobby! And remeber if you found this text
|
||||||
|
of any help, please spread it around to help others! Also, if you think you
|
||||||
|
are any good at writing H/P, please apply to be a Member! Call the <20>.<2E>.<2E> Home
|
||||||
|
at:
|
||||||
|
|
||||||
|
Digital Hackers Network
|
||||||
|
<20>egions <20>f <20>ucifer HeadQuarters/Home
|
||||||
|
No Warez! A truely serious Hack/Phreak board
|
||||||
|
Hack, Phreak, Scanning, Phraud, Crashing disscusions
|
||||||
|
Viral Research & Development Sections (500+ Virii!)
|
||||||
|
"Personalized ANSi Bombs" made by request
|
||||||
|
Running AfterShock v1.20 - 2400 Baud
|
||||||
|
PH: 213-274-1333
|
||||||
|
|
||||||
|
[40m
|
||||||
|
[39m[29C[0;1;30m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
[25C<35><43><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> [31m<31><6D> [30m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
[23C<33><43><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[5C[31m<31><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD> [30m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
[21C<31><43><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[6C[31m<31><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[6C[30m<30><6D><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
[20C<30><43><EFBFBD><EFBFBD><EFBFBD>[6C[31m<31><6D><EFBFBD><EFBFBD><EFBFBD>[0;31m<31><6D>[1m<31><6D><EFBFBD><EFBFBD><EFBFBD>[6C[30m<30><6D><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
[19C<39><43><EFBFBD><EFBFBD><EFBFBD>[7C[31m<31><6D><EFBFBD><EFBFBD>[0;31m<31> <20>[1m<31><6D><EFBFBD><EFBFBD>[8C[30m<30><6D><EFBFBD><EFBFBD>
|
||||||
|
[18C<38><43><EFBFBD><EFBFBD><EFBFBD>[6C[31m<31><6D><EFBFBD><EFBFBD><EFBFBD>[41m<31>[4C<34>[40m<30><6D><EFBFBD><EFBFBD><EFBFBD>[7C[30m<30><6D><EFBFBD><EFBFBD>
|
||||||
|
[18C<38><43><EFBFBD><EFBFBD>[7C[31m<31><6D><EFBFBD><EFBFBD>[0;31m<31>[6C<36>[1m<31><6D><EFBFBD><EFBFBD>[8C[30m<30><6D><EFBFBD> [36m<36>
|
||||||
|
[17C[30m<30><6D><EFBFBD><EFBFBD>[6C[31m<31><6D><EFBFBD><EFBFBD><EFBFBD>[41m<31>[8C<38>[40m<30><6D><EFBFBD><EFBFBD>[7C[30m<30><6D><EFBFBD><EFBFBD>[36m<36><6D>[46m<36>[40m
|
||||||
|
[46m[15C[40m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[31m<31><6D><EFBFBD><EFBFBD>[36m<36><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[41m<31><6D><EFBFBD><EFBFBD><EFBFBD>[40m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[0;36m<36>
|
||||||
|
[14C[1m<31>[46m<36><6D>[0;36m<36>[1;30;46m<36><6D><EFBFBD>[0;36m<36><6D><EFBFBD><EFBFBD>[1;31;46m<36>[40m<30><6D><EFBFBD><EFBFBD>[41m<31>[0;36m<36><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[1;31;46m<36><6D><EFBFBD><EFBFBD>[0;36m<36><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[1;30;46m<36><6D><EFBFBD>[0;36m<36>
|
||||||
|
[12C[1m<31><6D>[46m<36>[3C[30;40m<30><6D><EFBFBD> [31m<31><6D><EFBFBD><EFBFBD>[0;31m<31>[14C<34>[1m<31><6D><EFBFBD><EFBFBD>[5C[30m<30><6D><EFBFBD>
|
||||||
|
[12C[36;46m<36>[0;36m<36>[5C[1;30m<30><6D><EFBFBD> [31m<31><6D><EFBFBD><EFBFBD><EFBFBD>[41m<31>[16C<36>[40m<30><6D><EFBFBD><EFBFBD><EFBFBD> [30m<30><6D><EFBFBD>
|
||||||
|
[20C<30><43>[31;47m<37>[40m<30><6D><EFBFBD><EFBFBD>[0;31m<31>[18C<38>[1m<31><6D><EFBFBD><EFBFBD> [0;30m<30>[1m<31><6D><EFBFBD>
|
||||||
|
[21C<31>[41m<31>[31m<31><6D><EFBFBD>[0;31m<31>[20C[1;41m<31>[40m<30><6D><EFBFBD><EFBFBD>[0;30m<30><6D>[1m<31><6D>
|
||||||
|
[23C<33><43><EFBFBD><EFBFBD><EFBFBD>[18C<38><43>[41m<31>[31;40m<30><6D><EFBFBD><EFBFBD>
|
||||||
|
[25C[30m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[9C<39><43><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[31;41m<31>[40m<30><6D><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
[29C[30m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> [0;31m<31>[1m<31><6D><EFBFBD><EFBFBD>
|
||||||
|
[51C[0;31m<31>[1;41m<31><6D>[0;31m<31>
|
||||||
|
|
||||||
|
[1;36m"[0;36mAnarchy is the base of todays society, without it, we would be in chaos[1m"
|
||||||
|
[40C- Anarchist[0m
|
||||||
|
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
Call these <20>egions <20>f <20>ucifer support boards for information or application
|
||||||
|
inquiries:
|
||||||
|
|
||||||
|
Digital Hackers Network 213/274+1333 <20>.<2E>.<2E> HeadQuaters/Home
|
||||||
|
Electric Eye ][ 313/776+8928 <20>.<2E>.<2E> Distribution Site #1
|
||||||
|
Digital Information Exchange 612/356+2209 <20>.<2E>.<2E> Distribution Site #2
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
<EFBFBD>egions <20>f <20>ucifer High Office Members:
|
||||||
|
|
||||||
|
Prezident/Founder: Wave Runner!
|
||||||
|
Vice Prezident : Count_Zer0
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
This text file is (C)Copyrite 1990 <20>.<2E>.<2E> Inc.
|
||||||
|
<20>.<2E>.<2E> is a registered trademark of DHN, All rights reserved
|
||||||
|
Any modifications to this text file is a violation of copyrite.
|
||||||
|
Digital Hackers Network 213/274+1333 -=<3D>.<2E>.<2E> Home=-
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
126
textfiles.com/phreak/VOICEMAIL/vmbrl.txt
Normal file
126
textfiles.com/phreak/VOICEMAIL/vmbrl.txt
Normal file
@@ -0,0 +1,126 @@
|
|||||||
|
R e n e g a d e L e g i o n
|
||||||
|
* * T e c h n i c a l R e p o r t s * *
|
||||||
|
* R * * L *
|
||||||
|
* *
|
||||||
|
|
||||||
|
Eastern Western
|
||||||
|
....
|
||||||
|
Net Runner ........ Overdose
|
||||||
|
The Knight ......... Sirus
|
||||||
|
Kingpin ... .... Snuggle
|
||||||
|
Highlander ... ....
|
||||||
|
Nemesis .....
|
||||||
|
Rogue .... Canadien
|
||||||
|
Zardoz ....
|
||||||
|
Cursor ... ...
|
||||||
|
The Gypsy ... ... Blackheart
|
||||||
|
Iceburg .. ...
|
||||||
|
White Knight ...
|
||||||
|
|
||||||
|
Presents
|
||||||
|
|
||||||
|
|
||||||
|
Eastern RL HQ - 617-XXX-XXXX
|
||||||
|
Canadien HQ - 902-XXX-XXXX
|
||||||
|
|
||||||
|
|
||||||
|
VMB (Voice Mail Box) Hacking
|
||||||
|
----------------------------
|
||||||
|
|
||||||
|
Written By: The Knight
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
|
||||||
|
a great deal of 'hidden info' that isn't common sense. But, If you are out
|
||||||
|
there trying to hack a box and can't, follow through the VERY logical and
|
||||||
|
simple steps and make sure they are matching up.
|
||||||
|
|
||||||
|
|
||||||
|
Step 1:
|
||||||
|
|
||||||
|
Finding a VMB System
|
||||||
|
|
||||||
|
There are many ways you can find a VMB system, for instance, on a BBS when
|
||||||
|
someone says 'Here are some systems' usually thats what they're referring
|
||||||
|
to. Also, Try setting up your scanner and listening for 'Welcome to XX
|
||||||
|
company, Enter extension #' or something similar to that. Then you have
|
||||||
|
found a VMB system.
|
||||||
|
|
||||||
|
|
||||||
|
Step 2:
|
||||||
|
|
||||||
|
Finding a Box
|
||||||
|
|
||||||
|
This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
|
||||||
|
You must make sure that no one is using it. There are several ways to do
|
||||||
|
this. One EASY way is when you hack it, check the date on the latest
|
||||||
|
messages, if they are OVER a month old, then I'd say your safe to use them.
|
||||||
|
Also, watch in case there is just like _2_ messages in there from the last
|
||||||
|
4 months that those messages could be messages sent to ALL the boxes, see if
|
||||||
|
they sound personal. If they DON'T, then grab the box.
|
||||||
|
|
||||||
|
Let's say there's a box you REALLY want bad and someone's using it regularly,
|
||||||
|
try doing this: Go in twice a day (make SURE you DON'T change the greeting
|
||||||
|
etc.) and erase all the messages. He will complain and will eventually move
|
||||||
|
out of the box. Then there is a good chance of you having that box. It's
|
||||||
|
happned to me.
|
||||||
|
|
||||||
|
|
||||||
|
Step 3:
|
||||||
|
|
||||||
|
Hacking the VMB
|
||||||
|
|
||||||
|
This is the most SIMPLE part of all. MY general method is as follows:
|
||||||
|
|
||||||
|
Find a box, let's say box 260. It's empty and I want it (obviously).
|
||||||
|
First, try passcode '000', if that doesn't work, try passcode '260',
|
||||||
|
just make very general guesses that's ALL. Some of the MOST Common passcodes
|
||||||
|
are:
|
||||||
|
|
||||||
|
3 digit boxes:
|
||||||
|
000
|
||||||
|
123
|
||||||
|
111
|
||||||
|
222
|
||||||
|
333
|
||||||
|
444
|
||||||
|
555
|
||||||
|
666
|
||||||
|
777
|
||||||
|
888
|
||||||
|
999
|
||||||
|
box # (say it's box 260, passcode: 260)
|
||||||
|
321
|
||||||
|
|
||||||
|
4 digit boxes:
|
||||||
|
|
||||||
|
1234
|
||||||
|
0000
|
||||||
|
1111
|
||||||
|
2222
|
||||||
|
3333
|
||||||
|
4444
|
||||||
|
5555
|
||||||
|
6666
|
||||||
|
7777
|
||||||
|
8888
|
||||||
|
9999
|
||||||
|
box # (Say its box 1200, try passcode: 1200)
|
||||||
|
|
||||||
|
|
||||||
|
The Key: REALLY try ALL of those. I knew one system with a passcode of
|
||||||
|
'5555' and NO ONE could hack it. And I did. So don't give up.
|
||||||
|
UNLESS you've exhausted all of those possibilities. Then forget
|
||||||
|
it.
|
||||||
|
|
||||||
|
That's it really. The most simple thing to do. Just remember not to
|
||||||
|
give up before you should and also try 3 digit passcodes on 4 digit
|
||||||
|
boxes. Also, once you get in for added security, a lot of these boxes
|
||||||
|
allow more digits for passcodes, so make a 5 digit passcode. Or if you
|
||||||
|
think it's worth it, try like '00000' so that's really about all.
|
||||||
|
|
||||||
|
Have fun and don't stop.
|
||||||
|
|
||||||
|
-- The Knight, Sysop Eastern RL HQ BBS
|
||||||
|
|
52
textfiles.com/phreak/VOICEMAIL/vmbs1.txt
Normal file
52
textfiles.com/phreak/VOICEMAIL/vmbs1.txt
Normal file
@@ -0,0 +1,52 @@
|
|||||||
|
VMB's (Voice Mail Box) | 1&2 = Both call same number
|
||||||
|
| 1 = One calls this number
|
||||||
|
Call : 213-598-7900 (Party Pirate Line) BRIDGE| 2 = the other calls this
|
||||||
|
Call : 317-265-4488 (Unused Bridge) |
|
||||||
|
VMB Number |EXTEN | Operator of VMB | Loops
|
||||||
|
_______________| SION|______________________ | _____________________
|
||||||
|
N O L E E C H I N G |
|
||||||
|
716-987-7439 : None : The Pirate | 1&2 @ 212-567-9938
|
||||||
|
716-987-7648 : None : AK 47 (Brother) | 1&2 @ 504-356-5619
|
||||||
|
716-987-7666 : None : Jack the RIPPER | 1 @ 202-678-8049
|
||||||
|
716-987-7623 : None : Romper | 2 @ " " 8048
|
||||||
|
716-987-7502 : None : DEATH (Not Master) | 1 @ 504-831-9099
|
||||||
|
213-856-2580 : None : Black Ball Mis ]I[! | 2 @ " " 9098
|
||||||
|
1-800-333-5625 : 354 : The Flaw |
|
||||||
|
1-800-438-1061 : 135 : MW 8 |__________________________
|
||||||
|
312-410-7213 : : MC Docs | 1999 | 0488 |
|
||||||
|
213-494-9700 : : Public Enemy |_________|________________|
|
||||||
|
714-647-1958 : : Mr Music | | |
|
||||||
|
213-202-4381 : : JDT | | |
|
||||||
|
313-399-2596 : : The Stranger | | |
|
||||||
|
1-800-525-7243 :**8889: Pure Genius | | |
|
||||||
|
619-492-8087 : : Trixder Ice |_________|________________|
|
||||||
|
1-800-632-6681 : 2614: Con Artist | 0266 | AT&T |
|
||||||
|
1-800-552-2440 : 5206: Console Cowboy | |80446713159980 |
|
||||||
|
619-496-3393 : : The Saint | |60110804335933 |
|
||||||
|
1-800-289-2121 : 255: Gremlin | |71333331316212 |
|
||||||
|
818-594-7049 :**7751: WhipLash | |70238697343418 |
|
||||||
|
818-594-7049 :**7754: Ace / WhipLash | | |
|
||||||
|
818-594-7049 :**7757: ChainSaw | | |
|
||||||
|
818-594-7049 :**7759: Hercules | | |
|
||||||
|
818-594-7049 :**7760: The Faker | | |
|
||||||
|
714-987-5128 : : AlphaBits | | |
|
||||||
|
213-856-8450 : : Iniolater | | |
|
||||||
|
: : | | |
|
||||||
|
: : | | |
|
||||||
|
: : | | |
|
||||||
|
____________________________________________________________________________
|
||||||
|
-Don't Work for me. -
|
||||||
|
950-0488
|
||||||
|
0471041692102
|
||||||
|
7261041692102
|
||||||
|
1151041692102
|
||||||
|
7411041692102
|
||||||
|
0721041692102
|
||||||
|
2591041692102
|
||||||
|
950-0266 Public Bridges:
|
||||||
|
5024180 312-630-9590;9592;9594;9596;9598
|
||||||
|
312-606-9214
|
||||||
|
312-606-0766
|
||||||
|
312-704-0724
|
||||||
|
|
||||||
|
|
86
textfiles.com/phreak/VOICEMAIL/vmbzan.hac
Normal file
86
textfiles.com/phreak/VOICEMAIL/vmbzan.hac
Normal file
@@ -0,0 +1,86 @@
|
|||||||
|
###############################################################################
|
||||||
|
## <20><><EFBFBD>Zhit Axis Nation presents<74><73><EFBFBD> W () W ##
|
||||||
|
## How to have your own VMB \||/ ##
|
||||||
|
## || ##
|
||||||
|
## Written by: The Exorcist _/ \_ ##
|
||||||
|
## Dated: 7/24/91 ##
|
||||||
|
## Greet(s) to: Doc Logic, my teacher at school, and the godly CoP... ##
|
||||||
|
## ##
|
||||||
|
## Ying Yang BBS The Baron's Bistro FuNHouse BBS ##
|
||||||
|
## ZAN Promised Land ZAN Mosque#001 ZAN Mosque#002 ##
|
||||||
|
## SysOp: CoP SysOp: The Baron SysOp: Erasmus ##
|
||||||
|
###############################################################################
|
||||||
|
Here is another ultimately cool ZAN text file brought to you by the Exorcist.
|
||||||
|
Call 1-312-839-3850 and leave all the shit you want, codes and nos and shit..
|
||||||
|
|
||||||
|
|
||||||
|
This file is only based upon the information gathered from VMB's with the
|
||||||
|
839 prefix.
|
||||||
|
|
||||||
|
Ok here is a file from Z.A.N. so I wont be purged! What is a VMB? A VMB
|
||||||
|
is a Voice Mail Box.. or sometimes known as a Voice Mail System. Their
|
||||||
|
purpose is to record messages for people.. (id est OB/Gyn's and Pediatrists,
|
||||||
|
Drug Dealers, and a curious of other rich and filthy scum.) Lets say Joe
|
||||||
|
Supplier is out with his hoe.. Of course he can't get in touch with his
|
||||||
|
fiendish hommies so what does he do? No, he doesn't get a beeper cuz that
|
||||||
|
might tick of his hoe.. He get's a VMB where he has the caller has the option
|
||||||
|
to leave a phone no. or a voice message.
|
||||||
|
|
||||||
|
Joe S. finishes with his hoe calls up his VMB listens to his pre-recorded
|
||||||
|
message for a little while " Yea Man, I ain't no home now, but you leave
|
||||||
|
message an I call you when I done with yo sis'" then presses "0" on his touch
|
||||||
|
tone phone. A nice little voice comes on saying "Please enter your access
|
||||||
|
code." He enters his code and hears " You have xx messages press 7 to play."
|
||||||
|
He presses 7 and hears his messages.
|
||||||
|
|
||||||
|
So you get the point by now, and if you don't you shouldn't be reading this..
|
||||||
|
So how do you get one, why you just look it up in the yellow pages and let
|
||||||
|
your fingers do the talking.. But everyone knows that the real way is to
|
||||||
|
HACK it.. Find out some pager prefixes, I know some in Illinois are 312-839
|
||||||
|
and then theres 708-xxx. Then attempt to call every no. combination there is
|
||||||
|
unless you have a scanner or something that you can program to act upon
|
||||||
|
different messages.. To make your time go faster try little combinations
|
||||||
|
like 839-fuck or 839-hack. About 95% of the time you will simply here a few
|
||||||
|
beeps. This is for the conventional pager, the correct procedure is to type
|
||||||
|
in your phone no. and press the # button. By the way, if you really get
|
||||||
|
pissed at someone, you can type in their no. and then they will be getting
|
||||||
|
calls from people saying "John Doe from 1st National back returning your
|
||||||
|
call" or "Yeah man, dis be Tyrone, wha you be, G?"
|
||||||
|
|
||||||
|
When you finally get one, either by taking someone elses - trying to hack
|
||||||
|
their passwords or believe this, some persons are to stupid to even have
|
||||||
|
passwords - or by finding an empty one. The second of the two being the
|
||||||
|
better and safer. Hacking someones VMB cant get you in any trouble.. Just
|
||||||
|
don't attemt to change the message right away.. But if you are the true
|
||||||
|
anarchist, you will change his/her message, Call back the next day, and find
|
||||||
|
the old message back with a new password.. Now is your time to have fun.
|
||||||
|
Keep saying "I got your VMB along with your address and shit, be expecting
|
||||||
|
a ton of manure on your front lawn Monday." I kept doing this along with
|
||||||
|
saying "I am going to kill your Grandmother" After awhile the guy changed
|
||||||
|
his message to say something like "Hey man stop leaving me messages, I'll
|
||||||
|
use ANI to bust you" What a looser!
|
||||||
|
|
||||||
|
What exactly are the commands once you get in to your own little VMB?
|
||||||
|
|
||||||
|
Pressing the "*" will give you the following options..
|
||||||
|
|
||||||
|
3 to delete
|
||||||
|
2 to play again
|
||||||
|
4 to skip forward in message
|
||||||
|
11 to update greeting
|
||||||
|
13 to forward message
|
||||||
|
17 to change access code
|
||||||
|
|
||||||
|
I also found out some that they don't tell you once you press "*"
|
||||||
|
|
||||||
|
8 will get you the time that the messages were left
|
||||||
|
5 will tell you what message you are at
|
||||||
|
6 sets you back to the beginning
|
||||||
|
|
||||||
|
|
||||||
|
If you do succeed, please post your VMBs so that the anarchistic public can
|
||||||
|
leave you mail. Who knows maybe you'll get some CC's or codes and shit..
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Downloaded From P-80 International Information Systems 304-744-2253
|
52
textfiles.com/phreak/VOICEMAIL/vmx.txt
Normal file
52
textfiles.com/phreak/VOICEMAIL/vmx.txt
Normal file
@@ -0,0 +1,52 @@
|
|||||||
|
|
||||||
|
|
||||||
|
==)--- P TO PAUSE S TO STOP ---(==
|
||||||
|
|
||||||
|
Toll-Free Answering Services
|
||||||
|
|
||||||
|
|
||||||
|
Allied Toll-Free Service Bureau(ask for oper 526) 800-824-7888
|
||||||
|
|
||||||
|
American Discount Dialing System 800-227-1617 (CA 800-852 7777) (CA 800-772-3545)
|
||||||
|
|
||||||
|
Dialog Marketing 800-447-4700 (IL 800-322-4400)
|
||||||
|
|
||||||
|
Direct Marketing Services Inc. 800-223-1944
|
||||||
|
|
||||||
|
Executive Locator 800-323-6556
|
||||||
|
|
||||||
|
H Q Co 800-227-3004 (800-652-1848)
|
||||||
|
|
||||||
|
National Communications Center Inc. 800-824-5120 (CA 800-525-7711)
|
||||||
|
|
||||||
|
National Data Corperation 800-257-9611
|
||||||
|
|
||||||
|
National Switchboard 800-528-6052
|
||||||
|
|
||||||
|
Nice-National Instant Consumer Exchange 800-453-9000
|
||||||
|
|
||||||
|
Operator 800 800-448-4511 (NY 800-962-1480)
|
||||||
|
|
||||||
|
Ring America 800-621-5199
|
||||||
|
|
||||||
|
Share-a-Wats Inc. 800-854-2003
|
||||||
|
|
||||||
|
Skycall 800-631-5488 (NJ 800-352-4951)
|
||||||
|
|
||||||
|
Team Telephone 800-228-5000
|
||||||
|
|
||||||
|
Tel-Com Message Service 800-451-4453 (VT 800-622-4429)
|
||||||
|
|
||||||
|
Teletrak Response Center 800-328-5257
|
||||||
|
|
||||||
|
USA 800 800-821-2280 (MO 800-892-7655)
|
||||||
|
|
||||||
|
DOWNLOADED FROM P-80 SYSTEMS
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Archives #4
|
||||||
|
|
||||||
|
|
||||||
|
<2>United Kingdom BBS'S
|
||||||
|
<3>Weers Group...... 02 238 9034
|
84
textfiles.com/phreak/VOICEMAIL/voicmail.txt
Normal file
84
textfiles.com/phreak/VOICEMAIL/voicmail.txt
Normal file
@@ -0,0 +1,84 @@
|
|||||||
|
____________________________ _____
|
||||||
|
\___ | ___/___/_ ___\___/ _ \/ ___/
|
||||||
|
| | |/ /____| | | | | |\ )/____
|
||||||
|
| | |>____ / | | |> | __/___ /
|
||||||
|
___| | |____/ /| | | |__| |\ \_/ /
|
||||||
|
\____|____/__/ |_| |____/_| \_\_/ HL
|
||||||
|
-------------------------------------
|
||||||
|
|
||||||
|
THERE IS NOW A NEW FACILITY FOR COOL DUDES WHO WANTS IT....
|
||||||
|
|
||||||
|
IT'S TOTALLY FREE, BUT IS RESTRICTED TO THOSE WHO....
|
||||||
|
|
||||||
|
A) OWN A TONE PAD OR TONE DIALING PHONE.
|
||||||
|
B) WILL USE IT REGULARLY.
|
||||||
|
C) AREN'T LAME!!
|
||||||
|
|
||||||
|
THE FACILITY IS A FREE-PHONE MESSAGE BOX SYSTEM FOR YOU TO CALL AND LEAVE
|
||||||
|
MESSAGES, GOSSIP, ETC TO OTHERS ON THE SYSTEM. EACH PERSON IS GIVEN
|
||||||
|
HIS/HER OWN PERSONAL MAIL BOX WITH ITS OWN PASSWORD (CHANGABLE!). THE
|
||||||
|
SYSTEM ALSO ALLOWS THOSE OF YOU UNABLE TO PHREAK TO HAVE CHATS USING MAIL.
|
||||||
|
|
||||||
|
APPLYING FOR A MAIL BOX IS REALLY EASY. YOU CAN EITHER....
|
||||||
|
|
||||||
|
A) PHONE 0800 899224, LEAVE A MESSAGE CONTAINING YOUR NAME AND PHONE
|
||||||
|
NUMBER TO LORD FLIGHT/JESTERS AT MAIL BOX 510. THIS IS DONE BY DIALING
|
||||||
|
THE FREE=PHONE NUMBER, PRESSING THE `*' KEY AS SOON AS YOU HEAR THE
|
||||||
|
RECORDED VOICE, ENTERING `510', LEAVE YOUR DETAILS AFTER THE TONE, AND
|
||||||
|
HANGING UP WHEN YOU HAVE FINISHED!
|
||||||
|
|
||||||
|
B) CALL A BBS AND MAIL YOUR DETAILS TO ANY OF THESE USERS, IF THEY ARE
|
||||||
|
MEMBERS OF THE BOARD :-
|
||||||
|
|
||||||
|
SKITZ
|
||||||
|
HIGHLANDER
|
||||||
|
JESTERS
|
||||||
|
ZEBEDI
|
||||||
|
|
||||||
|
C) MAIL YOUR DETAILS TO ANY OF THE ABOVE USERS AT THE JESTERS HQ...
|
||||||
|
|
||||||
|
INNER SANCTUM ON 44 (0)229 430327.
|
||||||
|
|
||||||
|
|
||||||
|
IF YOUR APPLICATION IS ACCEPTED YOU'LL GET A CALL AND WILL BE TOLD YOUR
|
||||||
|
MAIL BOX NUMBER, YOUR PASSWORD (WHICH MUST BE CHANGED) AND A LIST OF
|
||||||
|
OTHER USERS ON THE SYSTEM.
|
||||||
|
|
||||||
|
NB : AS SOON AS YOU READ THIS TEXT, GIVE IT A GO, CAUSE EVERYTHING IS
|
||||||
|
FREE. THIS NUMBER WILL NOT GO DOWN FOR A GOOD 2 MONTHS OR SO, BUT IT WILL
|
||||||
|
EVENTUALLY, AND WHEN IT DOES YOU WILL BE NOTIFIED OF A NEW NUMBER TO CALL
|
||||||
|
WITHIN A WEEK!
|
||||||
|
|
||||||
|
CREDITS GO TO DEATH FOR FINDING THE ORIGINAL NUMBER...
|
||||||
|
|
||||||
|
ALLOCATED MAIL BOXES THAT ARE ABUSED OR NOT USED WILL BE RE-ALLOCATED TO
|
||||||
|
MORE APPRECIATIVE USERS!
|
||||||
|
|
||||||
|
NO TRICKS, NO CHARGES....WE DO THIS OUT OF THE GOODNESS OF OUR HEARTS!!
|
||||||
|
|
||||||
|
BULK ORDERS CAN ALSO BE MADE FROM LARGE GROUPS! RESERVATIONS ONLY TAKE
|
||||||
|
A SECOND!!!
|
||||||
|
|
||||||
|
/* LORD FLIGHT */ - YOUR SYSTEM ADMINISTRATOR
|
||||||
|
_ __ ______ __________________
|
||||||
|
THE //\// \ // // \ // // ___// __ \ SYSOP: HIGHLANDER
|
||||||
|
// // \ // // \ // // /_ // /// /
|
||||||
|
// // /\ \/ // /\ \/ // __/// __/ COSYSOPS: RUTGER SOUND
|
||||||
|
// // / \\ // / \\ // / // /\ \ RISK
|
||||||
|
// // / \\_// / \\_// /__// / \\ \_________________________
|
||||||
|
\\/\\_/ \\_/ \\____/\\_/ \\__________________________/
|
||||||
|
________ ________ __ ________________________ __ __ __
|
||||||
|
// ___ \ // ____ \// \ // // __ \\____ ___// \ // \// \ // \
|
||||||
|
// / \\_/// / // // \ // // / \\_/ // / // / // // \/ \
|
||||||
|
\\ \___ // \_// // /\ \/ // / // / // / // // /\ /\ \
|
||||||
|
__\\___ \// /\__ // / \\ // / __ // / // / // // / \/// /
|
||||||
|
// \__// // / // // / \\_// \// \ // / // \// // / // /
|
||||||
|
\\_______/\\/ \\_/\\_/ \\______/ \\_/ \\_______/\\_/ \\_/
|
||||||
|
|
||||||
|
68030 POWER * 200 MEG STORAGE * DUAL STANDARD 14.4K * SERIAL LOCKED AT 38.4K
|
||||||
|
JESTERS U.K HQ * 0-1 DAYS ONLY
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
->->->->->->->->-> THE INNER SANCTUM +44 (0) 229 430327 <-<-<-<-<-<-<-<-<-
|
||||||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||||
|
|
||||||
|
|
36
textfiles.com/phreak/VOICEMAIL/xvmecinf.txt
Normal file
36
textfiles.com/phreak/VOICEMAIL/xvmecinf.txt
Normal file
@@ -0,0 +1,36 @@
|
|||||||
|
========================================
|
||||||
|
= =
|
||||||
|
= Xerox Voice Message Exchange Commands=
|
||||||
|
= =
|
||||||
|
= Written & Typed By:The Lineman =
|
||||||
|
= =
|
||||||
|
= Atlantis BBS 215/844-8836 (Private) =
|
||||||
|
= =
|
||||||
|
========================================
|
||||||
|
|
||||||
|
Command List:
|
||||||
|
|
||||||
|
1 = Start/Stop Recording
|
||||||
|
2 = Start/Stop Playing
|
||||||
|
3 = Back Up
|
||||||
|
33 = Back Up to Beginning
|
||||||
|
4 = Skip Forward
|
||||||
|
44 = Skip to End
|
||||||
|
5 = Send/Erase
|
||||||
|
55 = Notification of Non-Delivery
|
||||||
|
7 = Save/Scan
|
||||||
|
8 = Future Delivery
|
||||||
|
0 = End of Address
|
||||||
|
* = End of Address
|
||||||
|
|
||||||
|
Special Commands:
|
||||||
|
|
||||||
|
011 = New Message Queues
|
||||||
|
012 = Saved Message Queues
|
||||||
|
021 = Redirect
|
||||||
|
022 = Reply
|
||||||
|
|
||||||
|
Any questions? Dial 1-800-TEAM-XRX (1-800-832-5979)
|
||||||
|
|
||||||
|
8/86
|
||||||
|
|
80
textfiles.com/phreak/WIRETAPPING.1
Normal file
80
textfiles.com/phreak/WIRETAPPING.1
Normal file
@@ -0,0 +1,80 @@
|
|||||||
|
<HTML>
|
||||||
|
<TITLE>T E X T F I L E S</TITLE>
|
||||||
|
<BODY BGCOLOR="#000000" TEXT="#00FF00" LINK="#00FF00" ALINK="#00AA00" VLINK="#00AA00">
|
||||||
|
<H1>Phone Phreaking: Wiretapping and Bugs</H1>
|
||||||
|
<P>
|
||||||
|
The Great Fear of people who use telephones to conduct their business (private
|
||||||
|
or professional) is that someone is listening in, taking notes, recording.
|
||||||
|
It's a concern that has allowed some very rough laws to be put into place, and
|
||||||
|
it's a central theme of these files. They tell you how to bug telephones or
|
||||||
|
rooms, get in the way of electronic transmissions, and they even touch on
|
||||||
|
some of the politics behind this method of information gathering.
|
||||||
|
<P>
|
||||||
|
Of course, it should be noted that not everyone out there wiretapping is a
|
||||||
|
private citizen.
|
||||||
|
<P>
|
||||||
|
<TABLE WIDTH=100%>
|
||||||
|
<TD BGCOLOR=#00FF00><FONT COLOR=#000000><B>Filename</B><BR></FONT></TD>
|
||||||
|
<TD BGCOLOR=#00DD00><FONT COLOR=#000000><B>Size</B><BR></FONT></TD>
|
||||||
|
<TD BGCOLOR=#00AA00><FONT COLOR=#000000><B>Description of the Textfile</B><BR></TD></TR>
|
||||||
|
|
||||||
|
<tab indent=60 id=T><br>
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bellinfo.txt">bellinfo.txt</A> <tab to=T><TD> 10630<BR><TD> Some Bell Telephone Info, by Phucked Agent 04 (Revised October, 1984)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bug.txt">bug.txt</A> <tab to=T><TD> 9176<BR><TD> Automatic Phone Recorder by Atomic Punk (May 1, 1989)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bugdetct.phk">bugdetct.phk</A> <tab to=T><TD> 1893<BR><TD> Bug Detection on Home Phones, by Dr. Jimmy and Mr. Jim
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bugging.guide">bugging.guide</A> <tab to=T><TD> 7040<BR><TD> Bugging I: A Little Electronics Goes a Long, Long Way by Brew Associates
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bugging.phk">bugging.phk</A> <tab to=T><TD> 7201<BR><TD> Bugs on a Budget, Inexpensive Surveillance, 8-85
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/buggy.phk">buggy.phk</A> <tab to=T><TD> 1579<BR><TD> A little history about the Infinity Transmitter
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bugphone.phk">bugphone.phk</A> <tab to=T><TD> 4640<BR><TD> An Automatic Phone Recorder, by Atomic Punk
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bugstaps.txt">bugstaps.txt</A> <tab to=T><TD> 1891<BR><TD> Bugs and How to Tap Someone's Room by Fireball
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/buildbug.phk">buildbug.phk</A> <tab to=T><TD> 3852<BR><TD> How to Build a Bug Detector by The Gremlin
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/caller">caller</A> <tab to=T><TD> 6623<BR><TD> Notes on Recording Caller ID Signals and Voice Notes
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/callwai.txt">callwai.txt</A> <tab to=T><TD> 2878<BR><TD> The Call Waiting Tap, by The Byte
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/cordless.phk">cordless.phk</A> <tab to=T><TD> 6713<BR><TD> How to listen into cordless phone conversations, by Beowulf
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/datatap.hac">datatap.hac</A> <tab to=T><TD> 3968<BR><TD> Tapping Computer Data is Easy! By Rick Blackmon
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/detectbug.phk">detectbug.phk</A> <tab to=T><TD> 2912<BR><TD> Detecting Bugs on Home Phones by Dr. Jimmy and Mr. Jim
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/dltp1.txt">dltp1.txt</A> <tab to=T><TD> 4738<BR><TD> Detecting Line Taps of C-Net Compatibles
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/dltp2.txt">dltp2.txt</A> <tab to=T><TD> 3585<BR><TD> Detecting Line Taps Part type by C-Net Compatibile
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/eaves1.txt">eaves1.txt</A> <tab to=T><TD> 14460<BR><TD> Basic Eavesdropping #1: The Electronic Ear by The Freddy and NNAN
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/es.txt">es.txt</A> <tab to=T><TD> 25505<BR><TD> Electronic Bug Detection
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/faxint.phk">faxint.phk</A> <tab to=T><TD> 14663<BR><TD> Fax Machine Interception, from Full Disclosure #23
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/fmbug.hac">fmbug.hac</A> <tab to=T><TD> 4736<BR><TD> How to Make an FM Wireless Bug, by Johnny Rotten
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/fmphone.bug">fmphone.bug</A> <tab to=T><TD> 2340<BR><TD> Making An FM Monitoring Device Cheap, Small, and Interesting! by Lord Foul
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/fonebugs.hac">fonebugs.hac</A> <tab to=T><TD> 2199<BR><TD> Bug Detection on Home Phones
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/fonepole.txt">fonepole.txt</A> <tab to=T><TD> 4097<BR><TD> Climbing Phone Poles- Tips and techniques by The Mad Phone-man
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/foneptch.phk">foneptch.phk</A> <tab to=T><TD> 29642<BR><TD> Building and Using Phone Patches, by Julian Macassey
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/fonesci.phk">fonesci.phk</A> <tab to=T><TD> 18900<BR><TD> The Science of Telephone Surveilance, by Eric The Red
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/intercpt.txt">intercpt.txt</A> <tab to=T><TD> 22529<BR><TD> Pager, Fax, and Data Intercept Techniques
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/lbt-alt1.txt">lbt-alt1.txt</A> <tab to=T><TD> 3651<BR><TD> Info on Automatic Line Testers (APR) by RiPMax of Liberty
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/lbt-alt2.txt">lbt-alt2.txt</A> <tab to=T><TD> 3796<BR><TD> Automatic Line Testers (SALT) by RiPMaX of Liberty
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/lineman.phk">lineman.phk</A> <tab to=T><TD> 6645<BR><TD> Wiretapping and Divestiture: A Lineman Speaks Out, by The Shadow
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/listenin.txt">listenin.txt</A> <tab to=T><TD> 4520<BR><TD> How to Listen to Phone Conversations by The Prowler and Icecube (August 22, 1989)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/lmos.phk">lmos.phk</A> <tab to=T><TD> 4286<BR><TD> How to Monitor a Phone Line (From a Dial-Up Line) with LMOS by Monique
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/mism32.hac">mism32.hac</A> <tab to=T><TD> 5248<BR><TD> Wiretape Loophole Concerns by Geoffrey S. Goodfellow
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/mism36.hac">mism36.hac</A> <tab to=T><TD> 12928<BR><TD> Private Audience (The Art of Listening In) by The Overlord
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/mism37.hac">mism37.hac</A> <tab to=T><TD> 7040<BR><TD> Wiretapping, Bugs on lines, and Listening in, by Forest Ranger
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/mobfone.phk">mobfone.phk</A> <tab to=T><TD> 9745<BR><TD> How to Get Into the AT&T Network by Building Your Own Mobile Phone
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/nightl.txt">nightl.txt</A> <tab to=T><TD> 21788<BR><TD> Trascription: Nightline: FBI, Privacy, and Proposed Wiretap Legislation (May 22, 1992)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/phone.tap">phone.tap</A> <tab to=T><TD> 4243<BR><TD> How Many Different Phone Taps Work
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/phonetap.phk">phonetap.phk</A> <tab to=T><TD> 2896<BR><TD> Bug Detection on Home Phones, by Mr. Jimmy
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/phonetap.txt">phonetap.txt</A> <tab to=T><TD> 3767<BR><TD> Phone Tapping, by Lord Jaxom
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/phontap.phk">phontap.phk</A> <tab to=T><TD> 2913<BR><TD> The Call Waiting Tap, by The Byte
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/precord.phk">precord.phk</A> <tab to=T><TD> 5878<BR><TD> Automatic Phone Recorder by Atomic Punk, May 1, 1989
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/ptapping.phk">ptapping.phk</A> <tab to=T><TD> 14476<BR><TD> Under Surveillance: Phone Tapping by The Dark Knight (November 3, 1990)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/swtchbrd.phk">swtchbrd.phk</A> <tab to=T><TD> 7031<BR><TD> Building Your Own Switchboard by Autopsy Saw
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tapfones.hac">tapfones.hac</A> <tab to=T><TD> 11956<BR><TD> Private Audience: A Basic Guide to the Art of Listening In
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/taphones.phk">taphones.phk</A> <tab to=T><TD> 3105<BR><TD> How to Tap Into Your Neighbor's Phones, by Lord Jaxon
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tapownline.phk">tapownline.phk</A> <tab to=T><TD> 4533<BR><TD> How to Tap your Own Phone Line, by The Smartass Hindering Irritating Timelord
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tapphon.txt">tapphon.txt</A> <tab to=T><TD> 8303<BR><TD> How to Listen in to Cordless Phone Conversaitons by Beowulf
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tapping.phk">tapping.phk</A> <tab to=T><TD> 1644<BR><TD> Bugs and How to Tap Someone's Room, by Fireball
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tapping.txt">tapping.txt</A> <tab to=T><TD> 2468<BR><TD> The Call Waiitng Tap by The Byte and Road Agent
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/taps2.txt">taps2.txt</A> <tab to=T><TD> 4550<BR><TD> Some Information on Phone Taps
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tempest.txt">tempest.txt</A> <tab to=T><TD> 46237<BR><TD> Eavesdropping On the Electromagnetic Emanations of Digital Equipment: The Laws of Canada, England and
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/wait.tap">wait.tap</A> <tab to=T><TD> 2683<BR><TD> The Call Waiting Tap by The Byte, Distributed by RAM Kracker
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/wiretap.ana">wiretap.ana</A> <tab to=T><TD> 3896<BR><TD> General Wiretap Information
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/wiretap.txt">wiretap.txt</A> <tab to=T><TD> 13663<BR><TD> Wiretapping Abuse Report on the FBI in 1991
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/wiretapp">wiretapp</A> <tab to=T><TD> 6479<BR><TD> Wiretapping and Eavesdropping: Is There Cause for Concern? by the Privacy Rights Clearinghouse
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/wiretaps.txt">wiretaps.txt</A> <tab to=T><TD> 23758<BR><TD> Can Wiretaps Remain Cost-Effective? By Robin Hanson
|
||||||
|
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 56 files for a total of 472,516 bytes.</SMALL></TABLE>
|
||||||
|
</BODY>
|
||||||
|
</HTML>
|
80
textfiles.com/phreak/WIRETAPPING/.windex.html
Normal file
80
textfiles.com/phreak/WIRETAPPING/.windex.html
Normal file
@@ -0,0 +1,80 @@
|
|||||||
|
<HTML>
|
||||||
|
<TITLE>T E X T F I L E S</TITLE>
|
||||||
|
<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#000000" ALINK="#004400" VLINK="#004400">
|
||||||
|
<H1>Phone Phreaking: Wiretapping and Bugs</H1>
|
||||||
|
<P>
|
||||||
|
The Great Fear of people who use telephones to conduct their business (private
|
||||||
|
or professional) is that someone is listening in, taking notes, recording.
|
||||||
|
It's a concern that has allowed some very rough laws to be put into place, and
|
||||||
|
it's a central theme of these files. They tell you how to bug telephones or
|
||||||
|
rooms, get in the way of electronic transmissions, and they even touch on
|
||||||
|
some of the politics behind this method of information gathering.
|
||||||
|
<P>
|
||||||
|
Of course, it should be noted that not everyone out there wiretapping is a
|
||||||
|
private citizen.
|
||||||
|
<P>
|
||||||
|
<TABLE WIDTH=100%>
|
||||||
|
<TD BGCOLOR=#000000><FONT COLOR=#FFFFFF><B>Filename</B><BR></FONT></TD>
|
||||||
|
<TD BGCOLOR=#002200><FONT COLOR=#FFFFFF><B>Size</B><BR></FONT></TD>
|
||||||
|
<TD BGCOLOR=#004400><FONT COLOR=#FFFFFF><B>Description of the Textfile</B><BR></TD></TR>
|
||||||
|
|
||||||
|
<tab indent=60 id=T><br>
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bellinfo.txt">bellinfo.txt</A> <tab to=T><TD> 10630<BR><TD> Some Bell Telephone Info, by Phucked Agent 04 (Revised October, 1984)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bug.txt">bug.txt</A> <tab to=T><TD> 9176<BR><TD> Automatic Phone Recorder by Atomic Punk (May 1, 1989)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bugdetct.phk">bugdetct.phk</A> <tab to=T><TD> 1893<BR><TD> Bug Detection on Home Phones, by Dr. Jimmy and Mr. Jim
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bugging.guide">bugging.guide</A> <tab to=T><TD> 7040<BR><TD> Bugging I: A Little Electronics Goes a Long, Long Way by Brew Associates
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bugging.phk">bugging.phk</A> <tab to=T><TD> 7201<BR><TD> Bugs on a Budget, Inexpensive Surveillance, 8-85
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="buggy.phk">buggy.phk</A> <tab to=T><TD> 1579<BR><TD> A little history about the Infinity Transmitter
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bugphone.phk">bugphone.phk</A> <tab to=T><TD> 4640<BR><TD> An Automatic Phone Recorder, by Atomic Punk
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bugstaps.txt">bugstaps.txt</A> <tab to=T><TD> 1891<BR><TD> Bugs and How to Tap Someone's Room by Fireball
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="buildbug.phk">buildbug.phk</A> <tab to=T><TD> 3852<BR><TD> How to Build a Bug Detector by The Gremlin
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="caller">caller</A> <tab to=T><TD> 6623<BR><TD> Notes on Recording Caller ID Signals and Voice Notes
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="callwai.txt">callwai.txt</A> <tab to=T><TD> 2878<BR><TD> The Call Waiting Tap, by The Byte
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cordless.phk">cordless.phk</A> <tab to=T><TD> 6713<BR><TD> How to listen into cordless phone conversations, by Beowulf
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="datatap.hac">datatap.hac</A> <tab to=T><TD> 3968<BR><TD> Tapping Computer Data is Easy! By Rick Blackmon
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="detectbug.phk">detectbug.phk</A> <tab to=T><TD> 2912<BR><TD> Detecting Bugs on Home Phones by Dr. Jimmy and Mr. Jim
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dltp1.txt">dltp1.txt</A> <tab to=T><TD> 4738<BR><TD> Detecting Line Taps of C-Net Compatibles
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dltp2.txt">dltp2.txt</A> <tab to=T><TD> 3585<BR><TD> Detecting Line Taps Part type by C-Net Compatibile
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="eaves1.txt">eaves1.txt</A> <tab to=T><TD> 14460<BR><TD> Basic Eavesdropping #1: The Electronic Ear by The Freddy and NNAN
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="es.txt">es.txt</A> <tab to=T><TD> 25505<BR><TD> Electronic Bug Detection
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="faxint.phk">faxint.phk</A> <tab to=T><TD> 14663<BR><TD> Fax Machine Interception, from Full Disclosure #23
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fmbug.hac">fmbug.hac</A> <tab to=T><TD> 4736<BR><TD> How to Make an FM Wireless Bug, by Johnny Rotten
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fmphone.bug">fmphone.bug</A> <tab to=T><TD> 2340<BR><TD> Making An FM Monitoring Device Cheap, Small, and Interesting! by Lord Foul
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fonebugs.hac">fonebugs.hac</A> <tab to=T><TD> 2199<BR><TD> Bug Detection on Home Phones
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fonepole.txt">fonepole.txt</A> <tab to=T><TD> 4097<BR><TD> Climbing Phone Poles- Tips and techniques by The Mad Phone-man
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="foneptch.phk">foneptch.phk</A> <tab to=T><TD> 29642<BR><TD> Building and Using Phone Patches, by Julian Macassey
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fonesci.phk">fonesci.phk</A> <tab to=T><TD> 18900<BR><TD> The Science of Telephone Surveilance, by Eric The Red
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="intercpt.txt">intercpt.txt</A> <tab to=T><TD> 22529<BR><TD> Pager, Fax, and Data Intercept Techniques
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lbt-alt1.txt">lbt-alt1.txt</A> <tab to=T><TD> 3651<BR><TD> Info on Automatic Line Testers (APR) by RiPMax of Liberty
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lbt-alt2.txt">lbt-alt2.txt</A> <tab to=T><TD> 3796<BR><TD> Automatic Line Testers (SALT) by RiPMaX of Liberty
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lineman.phk">lineman.phk</A> <tab to=T><TD> 6645<BR><TD> Wiretapping and Divestiture: A Lineman Speaks Out, by The Shadow
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="listenin.txt">listenin.txt</A> <tab to=T><TD> 4520<BR><TD> How to Listen to Phone Conversations by The Prowler and Icecube (August 22, 1989)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lmos.phk">lmos.phk</A> <tab to=T><TD> 4286<BR><TD> How to Monitor a Phone Line (From a Dial-Up Line) with LMOS by Monique
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mism32.hac">mism32.hac</A> <tab to=T><TD> 5248<BR><TD> Wiretape Loophole Concerns by Geoffrey S. Goodfellow
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mism36.hac">mism36.hac</A> <tab to=T><TD> 12928<BR><TD> Private Audience (The Art of Listening In) by The Overlord
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mism37.hac">mism37.hac</A> <tab to=T><TD> 7040<BR><TD> Wiretapping, Bugs on lines, and Listening in, by Forest Ranger
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mobfone.phk">mobfone.phk</A> <tab to=T><TD> 9745<BR><TD> How to Get Into the AT&T Network by Building Your Own Mobile Phone
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nightl.txt">nightl.txt</A> <tab to=T><TD> 21788<BR><TD> Trascription: Nightline: FBI, Privacy, and Proposed Wiretap Legislation (May 22, 1992)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phone.tap">phone.tap</A> <tab to=T><TD> 4243<BR><TD> How Many Different Phone Taps Work
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phonetap.phk">phonetap.phk</A> <tab to=T><TD> 2896<BR><TD> Bug Detection on Home Phones, by Mr. Jimmy
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phonetap.txt">phonetap.txt</A> <tab to=T><TD> 3767<BR><TD> Phone Tapping, by Lord Jaxom
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phontap.phk">phontap.phk</A> <tab to=T><TD> 2913<BR><TD> The Call Waiting Tap, by The Byte
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="precord.phk">precord.phk</A> <tab to=T><TD> 5878<BR><TD> Automatic Phone Recorder by Atomic Punk, May 1, 1989
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ptapping.phk">ptapping.phk</A> <tab to=T><TD> 14476<BR><TD> Under Surveillance: Phone Tapping by The Dark Knight (November 3, 1990)
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="swtchbrd.phk">swtchbrd.phk</A> <tab to=T><TD> 7031<BR><TD> Building Your Own Switchboard by Autopsy Saw
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tapfones.hac">tapfones.hac</A> <tab to=T><TD> 11956<BR><TD> Private Audience: A Basic Guide to the Art of Listening In
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="taphones.phk">taphones.phk</A> <tab to=T><TD> 3105<BR><TD> How to Tap Into Your Neighbor's Phones, by Lord Jaxon
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tapownline.phk">tapownline.phk</A> <tab to=T><TD> 4533<BR><TD> How to Tap your Own Phone Line, by The Smartass Hindering Irritating Timelord
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tapphon.txt">tapphon.txt</A> <tab to=T><TD> 8303<BR><TD> How to Listen in to Cordless Phone Conversaitons by Beowulf
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tapping.phk">tapping.phk</A> <tab to=T><TD> 1644<BR><TD> Bugs and How to Tap Someone's Room, by Fireball
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tapping.txt">tapping.txt</A> <tab to=T><TD> 2468<BR><TD> The Call Waiitng Tap by The Byte and Road Agent
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="taps2.txt">taps2.txt</A> <tab to=T><TD> 4550<BR><TD> Some Information on Phone Taps
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tempest.txt">tempest.txt</A> <tab to=T><TD> 46237<BR><TD> Eavesdropping On the Electromagnetic Emanations of Digital Equipment: The Laws of Canada, England and
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wait.tap">wait.tap</A> <tab to=T><TD> 2683<BR><TD> The Call Waiting Tap by The Byte, Distributed by RAM Kracker
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wiretap.ana">wiretap.ana</A> <tab to=T><TD> 3896<BR><TD> General Wiretap Information
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wiretap.txt">wiretap.txt</A> <tab to=T><TD> 13663<BR><TD> Wiretapping Abuse Report on the FBI in 1991
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wiretapp">wiretapp</A> <tab to=T><TD> 6479<BR><TD> Wiretapping and Eavesdropping: Is There Cause for Concern? by the Privacy Rights Clearinghouse
|
||||||
|
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wiretaps.txt">wiretaps.txt</A> <tab to=T><TD> 23758<BR><TD> Can Wiretaps Remain Cost-Effective? By Robin Hanson
|
||||||
|
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 56 files for a total of 472,516 bytes.</SMALL></TABLE>
|
||||||
|
</BODY>
|
||||||
|
</HTML>
|
201
textfiles.com/phreak/WIRETAPPING/bellinfo.txt
Normal file
201
textfiles.com/phreak/WIRETAPPING/bellinfo.txt
Normal file
@@ -0,0 +1,201 @@
|
|||||||
|
|
||||||
|
/-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-\
|
||||||
|
! Bell Telephone Info !
|
||||||
|
\-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-/
|
||||||
|
|
||||||
|
|
||||||
|
******************************************************************************
|
||||||
|
|
||||||
|
BRIDGING HEADS, RESIDENTIAL AND BUSINESS MULTILINE DISTRIBUTION BOXES, LINE
|
||||||
|
AND TRUNK SPLITTERS, AND OTHER BELL SYSTEM WIRE TERMINATIONS.
|
||||||
|
|
||||||
|
- HOW TO USE, AND/OR ABUSE THEM -
|
||||||
|
|
||||||
|
(INCLUDING A TUTORIAL ON BASIC TELEPHONE EAVESDROPPING TECHNIQUES.)
|
||||||
|
|
||||||
|
******************************************************************************
|
||||||
|
|
||||||
|
WRITTEN BY : PHUCKED
|
||||||
|
AGENT 07/29/84
|
||||||
|
04
|
||||||
|
|
||||||
|
REVISED FOR LOD! 10/84
|
||||||
|
CURRENTLY REVISION II
|
||||||
|
|
||||||
|
****************************************************************************
|
||||||
|
|
||||||
|
IN THIS ARTICLE, I WILL FIRST BESCRIBE THE TERMINATION, WIRING, AND
|
||||||
|
TERMINAL HARDWARE MOST COMMONLY USED IN THE BELL SYSTEM, AND I WILL INCLUDE
|
||||||
|
A SECTION ON METHODS OF USING THEM.
|
||||||
|
|
||||||
|
*****************************************************************************
|
||||||
|
|
||||||
|
-------------
|
||||||
|
LOCAL NETWORK
|
||||||
|
-------------
|
||||||
|
|
||||||
|
THE LOCAL TELEPHONE NETWORK BETWEEN THE CENTRAL OFFICE/EXCHANGE AND
|
||||||
|
THE TELEPHONE SUBSCRIBERS CAN BE BREIFLY DESCRIBED AS FOLLOWS:
|
||||||
|
FROM THE CENTRAL OFFICE (OR LOCAL EXCHANGE) OF A CERTAIN PREFIX(ES),
|
||||||
|
UNDERGROUND AREA FEEDER TRUNKS GO TO EACH AREA THAT HAS THAT PREFIX. (USUALLY
|
||||||
|
MORE THAN ONE PREFIX PER AREA) AT EVERY FEW STREETS OR TRACT AREAS, THE
|
||||||
|
UNDERGROUND CABLES SURFACE. THEY THEN GO TO THE SECONDARY TERMINATION, (THE
|
||||||
|
AERIAL TELEPHONE FEEDER CABLE) (OR BACK UNDERGROUND, DEPENDING ON THE AREA) AND
|
||||||
|
THEN TO THE SUBSRIBERS HOUSE (OR IN THE CASE OF AN APARTMENT BUILDING OR
|
||||||
|
MUTLILINE BUSINESS, TO A SPLITTER OR DISTRIBUTION BOX/PANEL).
|
||||||
|
|
||||||
|
NOW THAT WE HAVE THE BASICS, I'LL TRY AND GO IN-DEPTH ON THE SUBJECT.
|
||||||
|
|
||||||
|
------------------
|
||||||
|
UNDERGROUND CABLES
|
||||||
|
------------------
|
||||||
|
|
||||||
|
THESE ARE SOMETIMES INTEROFFICE TRUNKS, BUT USUALLY IN A RESIDENTIAL AREA
|
||||||
|
THEY ARE FEEDER GROUPS THAT GO OTO BRIDGING HEADS OR DISTRIBUTION CASES. THE
|
||||||
|
CABLES ARE ABOUT 2-3 INCHES THICK (VARIES), AND ARE EITHER IN A METAL OR
|
||||||
|
PVC-TYPE PIPE (OR SIMILAR). RARELY (MAYBE NOT IN SOME REMOTE RURAL AREAS) ARE
|
||||||
|
THE CABLES JUST 'ALONE' IN THE GROUND. INSTEAD, THEY ARE USUALLY IN AN
|
||||||
|
UNDERGROUND CEMENT TUNNEL (RESEMBLES A SMALL SEWER OR STORMDRAIN). THE MANHOLES
|
||||||
|
ARE >HEAVY< AND WILL SAY 'BELL SYSTEM' ON THEM. THEY CAN BE OPEN ED WITH A 1/2
|
||||||
|
INCH WIDE CROWBAR (HOOK SIDE) INSERTED IN THE TOP RECTANGULAR HOLE. IF YOU GET
|
||||||
|
IT OPEN, GO INSIDE!! THERE ARE LADDER RUNGS TO HELP YOU CLIMB DOWN. YOU WILL
|
||||||
|
SEE THE CABLE PIPES ON THE WALL, WITH THE BLUE AND WHITE STRIPED ONE BEING THE
|
||||||
|
INTEROFFICE TRUNK GRP (AT LEAST IN MY AREA). THE OTHERS ARE LOCAL LINES, AND
|
||||||
|
ARE USUALLY MARKED OR COLOR CODED. THERE IS ALMOST ALWAYS A POSTED COLOR CODE
|
||||||
|
CHART ON THE WALL, NOT TO MENTION TELCO MANUALS DESCRIBING THE CABLES AND
|
||||||
|
TERMINALS, SO I NEED NOT GET INTO DETAIL. AGAIN: >IF YOU CAN GET INTO A
|
||||||
|
BELL MANHOLE, DO IT!, IT WILL PAY OFF<. ALSO, THERE IS USUALLY SOME KIND OF
|
||||||
|
TEST EQUIPMENT, AND OFTEN BELL TEST SETS ARE LEFT IN THERE. SO GET YOUR
|
||||||
|
CROWBARS!
|
||||||
|
|
||||||
|
--------------
|
||||||
|
BRIDGING HEADS - (WE MS2'S)
|
||||||
|
--------------
|
||||||
|
|
||||||
|
THE INNOCENT-LOOKING GRAYISH-GREEN BOXES. WHEN IN GROUPS OF TWO OR THREE,
|
||||||
|
THEY ARE FOR SECONDAY/TERTIARY TERMINATION AND ACCESS POINTS (BRIDGED ACCESS).
|
||||||
|
THESE ARE THE WESTERN ELECTRIC SAI 55 OR 22/E TERMINAL CASES. THEY HOLD ON THE
|
||||||
|
ORDER OF 900-1200 CABLE PAIRS. THIS IS USUALLY THE SECOND TERM. POSITION ON THE
|
||||||
|
LOCAL LOOP (AFTER THE MTF FRAME AT THE CO/ OR THE UNDERGROUND 'FTP' POSITION).
|
||||||
|
THESE CAN BE EITHER TRUNK BRIDGES OR BRIDGING FOR RESIDENCES. THE AREA FEEDER
|
||||||
|
BRIDGING HEADS ARE USUALLY LARGER, AND THEY HAVE THE 'WESTERN ELECTRIC' LOGO AT
|
||||||
|
THE BOTTOM, WHEREAS THE NORMAL BRIDGING HEADS (WHICH MAY BE DIFFERENT IN SOME
|
||||||
|
AREAS DEPENDING ON THE COMPANY YOU ARE SERVED BY. GTE B.H'S LOOK SLIGHTLY
|
||||||
|
DIFFERENT. ALSO, DO NOT BE FOOLED BY SPRINKLER BOXES!) CAN BE FOUND IN JUST
|
||||||
|
ABOUT EVERY CITY.
|
||||||
|
TO OPEN A BRIDGING HEAD: IF IT IS LOCKED (AND YOU'RE FEELING DESTRUCTIVE),
|
||||||
|
PUT A HAMMER OR CROWBAR (THE SAME ONE YOU USED ON THE MANHOLE) IN THE SLOT
|
||||||
|
ABOVE THE TOP HINGE OF THE RIGHT DOOR. PULL HARD, AND THE DOOR WILL RIP OFF.
|
||||||
|
VERY EFFECTIVE!
|
||||||
|
IF IT ISN'T LOCKED (AS USUAL), TAKE A 7/16 INCH HEX SOCKET AND WITH IT, TURN
|
||||||
|
THE BOLT ABOUT 1/8 OF A TURN TO THE LEFT (YOU SHOULD HEAR A SPRING RELEASE
|
||||||
|
INSIDE). HOLDING THE BOLT, TURN THE HANDLE ALL THE WAY TO THE RIGHT AND PULL
|
||||||
|
OUT.
|
||||||
|
NOW INSIDE, FIRST CHECK FOR A TEST-SET (WHICH ARE OFTEN LEFT BY BELL
|
||||||
|
EMPLOYEES). THERE SHOULD BE A PANEL OF CABLE PAIRS + SCREW TERMINALS (TYPE
|
||||||
|
45/47IB REGULAR BINDERS) . PUSH THE PANEL BACK ABOUT AN INCH OR SO, AND ROTATE
|
||||||
|
THE TOP LATCH (ROUND WITH A FLAT SECTION) DOWNWARD. RELEASE THE PANEL AND IT
|
||||||
|
WILL FALL ALL THE WAY FORWARD. THERE IS USUALLY A LARGE AMOUNT OF WIRE AND
|
||||||
|
EXTRA TERMINALS. THE TEST-SETS ARE OFTEN HIDDEN HERE, SO DONT OVERLOOK IT (400
|
||||||
|
FOOT ROLLS OF #22 SOLID WIRE ARE OFTEN NEAR THE TOP IN THE BACK OF THE BOX.
|
||||||
|
'BORROW THEM'). ON THE RIGHT DOOR IS A METAL BOX OF INSULATORS, BINDERS, CLIPS,
|
||||||
|
ETC. TAKE A FEW (COMPLIMENTS OF BELL...). ON EACH DOOR IS A USEFUL ROUND METAL
|
||||||
|
DEVICE. (SAYS 'INSERT GENTLY' OR 'CLAMP GENTLY - DO NOT OVERTIGHTEN' ETC..) ON
|
||||||
|
THE FRONT OF THE DISC, YOU SHOULD FIND TWO TERMINALS. THESE ARE FOR YOUR TEST
|
||||||
|
SET. (IF YOU DONT HAVE ONE, DONT DEPAIR -I'LL SHOW YOU WAYS TO MAKE BASIC TEST
|
||||||
|
SETS LATER IN THIS ARTICLE). HOOKING THE RING (-) WIRE TO THE 'R' TERMINAL; AND
|
||||||
|
THE TIP (+) WIRE TO THE OTHER. (BY THE WAY, AN EASY WAY TO DETERMINE THE
|
||||||
|
CORRECT POLARITY IS WITH A 1.5V LED. TAP IT TO THE TERM. PAIR, IF IT DOESNT
|
||||||
|
LIGHT, SWITCH THE POLES UNTIL IT DOES. WHEN IT LIGHTS, FIND THE LONGER OF THE
|
||||||
|
TWO LED POLES. THIS ONE WILL BE ON THE TIP WIRE (+)) BEHIND THE DISC IS A
|
||||||
|
COILED UP CORD. THIS SHOULD HAVE A SPECIALIZED CONNECTOR. ITS VERY USEFUL,
|
||||||
|
BECAUSE YOU DONT HAVE TO KEEP CONNECTING AND DISCONNECTING THE FONE (TEST SET)
|
||||||
|
ITSELF, AND THE CLIP IS DESIGNED TO AID IN LOCATING THE PAIR AND ASSURING THE
|
||||||
|
CORRECT POLARITY.
|
||||||
|
ON THE TERMINAL BOARD, THERE SHOULD BE ABOUT 20 PAIRS (RED/WHITE) PER ROW
|
||||||
|
PER SIDE. HOOK THE CLIP TO ANY TERMINAL PAIR, AND YOU'RE SET! DIAL OUT IF YOU
|
||||||
|
WANT, OR JUST LISTEN (IF SOMEONE'S ON THE LINE). LATER, I'LL SHOW YOU A WAY TO
|
||||||
|
SET UP A TRUE 'TAP' THAT YOU CAN SETUP, AND WILL LET THE PERSON DIAL OUT ON HIS
|
||||||
|
LINE AND RECEIVE CALLS AS NORMAL, AND YOU CAN LISTEN IN THE WHOLE TIME. MORE
|
||||||
|
ABOUT THIS LATER...
|
||||||
|
ON MAJOR PREFIX-AREA BRIDGING HEADS ('SAI' FOR AREA C.O. FEEDER CABLE) YOU
|
||||||
|
CAN SEE TEMPORARY 'LOCAL LOOPS', WHICH ARE TWO CABLE PAIRS (CABLE PAIR =RING +
|
||||||
|
TIP, A FONE LINE) THAT ARE DIRECTLY CONNECTED TO EACH OTHER ON THE TERMINAL
|
||||||
|
BOARD. THESE 'CHEAP LOOPS' AS THEY ARE CALLED, DO NOT WORK NEARLY AS WELL AS
|
||||||
|
THE EXISTING ONES SET UP IN THE SWITCHING HARDWARE AT THE EXCHANGE OFFICE. (TRY
|
||||||
|
SCANNING YOUR PREFIXES' 00XX OR 99XX #'S. THE TONE SIDES WILL ANNOUNCE
|
||||||
|
THEMSELVES WITH THE 1000 HZ LOOP TONE, AND THE HANG SIDE WILL GIVE NO RESPONSE.
|
||||||
|
THE FIRST PERSON SHOULD DIAL THE 'HANG' SIDE, AND THE OTHER PERSON DIAL THE,
|
||||||
|
TONE SIDE, AND THE TONE SHOULD STOP IF YOU HAVE GOT THE RIGHT LOOP). THE LOOPS
|
||||||
|
ARE USED IN FRAME TERMINATION AND IN SONIC/600 OHM TERM. TESTING AND
|
||||||
|
LINE/CABLE/FEEDER LOCATION.
|
||||||
|
IF YOU WANT TO FIND THE NUMBER OF THE LINE THAT YOU'RE ON, YOU CAN EITHER
|
||||||
|
TRY TO DECIPHER THE 'BRIDGING LOG' (OR WHATEVER), WHICH IS ON THE LEFT DOOR. IF
|
||||||
|
THAT DOESNT WORK, YOU CAN USE THE FOLLWING:
|
||||||
|
|
||||||
|
---
|
||||||
|
ANI # (AUTOMATIC NUMBER INDENTICATION)
|
||||||
|
---
|
||||||
|
THIS IS A TELCO TEST NUMBER THAT REPORTS TO YOU THE NUMBER THAT YOU'RE
|
||||||
|
CALLING FROM (IT'S THE SAME, CHOPPY 'BELL BITCH' VOICE THAT YOU GET WHEN YOU
|
||||||
|
REACH A DISCONNECTED #) (PIP OR ONE OF THE 11X SERIES ANNOUNCE MENT FRAME
|
||||||
|
MACHINES.)
|
||||||
|
|
||||||
|
FOR THE 213 NPA - DIAL 1223
|
||||||
|
213 NPA - (GTE AREAS) DIAL 114
|
||||||
|
408 NPA - DIAL 760
|
||||||
|
914 NPA - DIAL 990
|
||||||
|
|
||||||
|
THESE ARE EXTREMELY USEFUL WHEN MESSING WITH ANY KIND OF LINE TERMINALS,
|
||||||
|
FEEDER BOXES, ETC.
|
||||||
|
|
||||||
|
WHEN FINISHED, BE SURE TO CUT OFF THE CONNECTOR AND TAKE IT WITH YOU (THEY
|
||||||
|
ARE VERY HANDY), AND CLOSE/LATCH THE BOX TO AVOID SUSPICION.
|
||||||
|
|
||||||
|
|
||||||
|
"CANS" - AERIAL-MOUNTED (TELEPHONE POLE TERMINAL) BRANCH FEEDER CABLE
|
||||||
|
SPLITTER.
|
||||||
|
----
|
||||||
|
|
||||||
|
BASICALLY, TWO TYPES:
|
||||||
|
|
||||||
|
1> MS3A SERVICE AREA INTERFACE. (LARGE, RECTANGULAR SILVER BOX AT THE END OF
|
||||||
|
EACH STREET.)
|
||||||
|
|
||||||
|
2> SERIES 600 LOADING COIL, INCLUDES THE MSX AERIAL DROP SPLITTER. (BLACK,
|
||||||
|
ROUND OR RECTANGULAR THING AT EVERY TELEPHONE POLE.)
|
||||||
|
|
||||||
|
|
||||||
|
TYPE 1 - THIS IS THE CASE THAT TAKES THE UNDERGROUND CABLE FROM THE BRIDGER
|
||||||
|
AND RUNS IT TO THE AERIAL BRANCH FEEDER CABLE (THE LOWEST, LARGEST WIRE ON THE
|
||||||
|
TELEPHONE POLE). THE BOX IS ALWAYS ON THE POLE NEAREST THE BRIGING HEAD, WHERE
|
||||||
|
THE LINE COMES UP. LOOK FOR THE 'CALL BEFORE YOU DIG - UNDERGROUND CABLE'
|
||||||
|
STICKERS..
|
||||||
|
THE CASE BOX IS HINGED, SO IF YOU WANT TO CLIMB THE POLE, YOU CAN OPEN IT
|
||||||
|
WITH NO PROBLEMS. THESE USUALLY HAVE 2 ROWS OF TERMINAL SETS. (TOTAL APPROX.
|
||||||
|
200-600 PAIRS, DEPENDING ON THE AREA.) THESE ARE ALL THE CABLE PAIRS FOR YOUR
|
||||||
|
STREET. (ITS SIMILAR TO A MINIATURE BRIDGING HEAD). USE/ABUSE IT IN THE SAME
|
||||||
|
MANNER AS WE DID BEFORE. (NOTE: ALL THE ACTIVE LINES CARRY FROM 15 TO 48 VDC,
|
||||||
|
AND EVEN 90VAC (WHEN RINGING), SO BE CAREFUL - IT'S NOT GOING TO HURT YOU,
|
||||||
|
BUT IT CAN SURPRISE YOU (AND IF YOU'RE HANGING BY ONE HAND FROM A TEL. POLE, IT
|
||||||
|
>CAN< BE HARMFUL!))
|
||||||
|
OH, BY THE WAY, IF YOU USE ANI ON EVERY PAIR AND YOU FIND ONE THAT ISNT IN
|
||||||
|
USE ON YOUR STREET, YOU CAN HOOK IT UP FOR YOURSELF (ALMOST). ALSO, YOU HAVE TO
|
||||||
|
BE ABLE TO IMPERSONATE A TELCO TECHNICIAN AND REPORT THE NUMBER AS 'NEW ACTIVE'
|
||||||
|
(GIVING A FAKE NAME AND FAKE REPORT, ETC) I DONT RECOMMEND THIS AND IT PROBABLY
|
||||||
|
WONT (ALMOST POSITIVELY WONT) WORK, BUT THIS IS BASICALLY WHAT TELCO LINEMEN
|
||||||
|
DO).*
|
||||||
|
|
||||||
|
* THE USE OF THE 'TEST BOARD' (A 7D# FOR LINEMEN TESTS, OFTEN FOUND
|
||||||
|
NXX-0003 OR NXX-0004) IS BEYOND THE SCOPE OF THIS ARTICLE, BUT WILL BE COVERED
|
||||||
|
IN A FUTURE ARTICLE.
|
||||||
|
|
||||||
|
|
||||||
|
TYPE 2 - THIS IS THE SPLITTER BOX FOR THE AERIAL DROP WIRES FOR THE GROUP OF
|
||||||
|
HOUSES AROUND THE POLE. (USUALLY 4 OR 5 HOUSES). USE IT LIKE I MENTIONED
|
||||||
|
BEFORE. THE TERMINALS (20 OR SO) WILL BE IN 2 HORIZONTAL ROWS OF SETS. THE
|
||||||
|
EXTRA WIRES THAT ARE JUST 'HANGING THERE' ARE PROVISIONS FOR EXTRA LINES TO
|
||||||
|
RESIDENCES (1 EXTRA LINE PER HOUSE, THATS WHY THE INSANE CHARGE FOR LINE #3).
|
||||||
|
IF ITS THE BOX FOR YOUR HOUSE ALSO, HAVE FUN AND SWAP LINES WITH YOUR NEIGHBOR!
|
||||||
|
'PIGGYBACK' THEM OR USE A CHEESEBOX FOR A LOOP-AROUND, ETC. AGAIN, I DONT
|
||||||
|
RECOMMEND THIS, AND ITS DIFFICULT TO DO IT CORRECTLY. (ALTHOUGH USEFUL)
|
208
textfiles.com/phreak/WIRETAPPING/bug.txt
Normal file
208
textfiles.com/phreak/WIRETAPPING/bug.txt
Normal file
@@ -0,0 +1,208 @@
|
|||||||
|
|
||||||
|
Automatic Phone Recorder
|
||||||
|
|
||||||
|
by
|
||||||
|
|
||||||
|
Atomic Punk
|
||||||
|
|
||||||
|
May 1, 1989
|
||||||
|
|
||||||
|
This device will allow any standard cassette tape recorder the
|
||||||
|
ability to automatically record phone conversations. The device
|
||||||
|
will start the tape recorder when the phone handset is lifted and
|
||||||
|
stop the recorder when the handset is returned to the cradle.
|
||||||
|
|
||||||
|
The device is a DC switch that is normally on via the forward
|
||||||
|
biasing of Q1 via R3. Q1 now clamps Q2 into a forward state by
|
||||||
|
biasing its complement well into a saturated state via R4. The
|
||||||
|
DC switch is turned off via a negative voltage above that of the
|
||||||
|
Zener (D1). This voltage is usually about 48 volts and is the on
|
||||||
|
hook value of the phone line. This negative voltage over rides
|
||||||
|
the effect of R3 and keeps the circuit off. When the phone is
|
||||||
|
off the hook, the 48 volts drops to 10 volts, which is below the
|
||||||
|
[more]
|
||||||
|
|
||||||
|
zener voltage of D1, and R3 now turns the circuit on. Audio
|
||||||
|
signal is via attenuator resistor R1 and DC isolating capacitors
|
||||||
|
C1 and C2.
|
||||||
|
|
||||||
|
This device is really only a high impedance switch that isolates
|
||||||
|
the recording controlled device from the phone line via some
|
||||||
|
simple electronic circuitry. It requires no battery and obtains
|
||||||
|
power for operating from the remote jack that in most recorders
|
||||||
|
is a source of 6 volts. When the remote jack is grounded,
|
||||||
|
recorder operation starts, and when the grounding condition is
|
||||||
|
removed, recorder operation stops.
|
||||||
|
|
||||||
|
Parts list: Here's all you need:
|
||||||
|
|
||||||
|
Name Qty Description
|
||||||
|
R4 1 220 ohm 1/4 watt resistor
|
||||||
|
R3 1 39k ohm 1/4 watt resistor
|
||||||
|
R1 & R2 2 100k ohm 1/4 watt resistor
|
||||||
|
C1 & C2 2 0.01 mfd/ 50V disc cap.
|
||||||
|
Q2 1 PN2222 NPN Silicon
|
||||||
|
Q1 1 PN2907 NPN Silicon
|
||||||
|
[more]
|
||||||
|
|
||||||
|
Z1 1 15 volt Zener diode
|
||||||
|
P1 1 Sub-mini plug 2.5mm dia.
|
||||||
|
CL1 & CL2 2 Alligator clips
|
||||||
|
P2 1 Mini-Plug 3.5mm dia.
|
||||||
|
Enclosure 1 Suitable enclosure for device
|
||||||
|
PB1 1 1.25x1.67 perfboard
|
||||||
|
WR4 (18") #24 hook-up black wire
|
||||||
|
WR3 (18") #24 hook-up red wire
|
||||||
|
Casto Castolite or paraffin wax
|
||||||
|
|
||||||
|
[more]
|
||||||
|
|
||||||
|
Circuit Diagram
|
||||||
|
|
||||||
|
|
||||||
|
Red wire
|
||||||
|
----------|---------Z1--------|--------------------|--------|----------
|
||||||
|
| | | |
|
||||||
|
Green | | | |
|
||||||
|
-----| | | | |
|
||||||
|
| | | | |
|
||||||
|
| | | e |
|
||||||
|
| | | | |
|
||||||
|
| | R3 |-----R4---b-Q2 |---P1
|
||||||
|
| | *No connection* | | | |To remote
|
||||||
|
| | | c c |of
|
||||||
|
| *|* | | | |recorder
|
||||||
|
|--- | ------------------|-----b-Q1 | |
|
||||||
|
| | | | |
|
||||||
|
| | e | |
|
||||||
|
| | |------------|--------|
|
||||||
|
| |
|
||||||
|
| | C1
|
||||||
|
[more]
|
||||||
|
|
||||||
|
| |----------------------------3 3-----------------|
|
||||||
|
| |
|
||||||
|
| |---P2
|
||||||
|
| C2 |To Aux
|
||||||
|
|--------------R1-----------------3 3-----------------|on
|
||||||
|
Recorder
|
||||||
|
|
||||||
|
** Green and Red wires go to corresponding color of telephone wires.
|
||||||
|
** Make sure to connect Q1 and Q2 properly -- follow label c,b,e
|
||||||
|
with the wires facing toward you and flat side up.
|
||||||
|
- c is the located on the upper right hand side
|
||||||
|
- b is the next wire left of c
|
||||||
|
- e is the next wire left of b
|
||||||
|
|
||||||
|
Anyway that concludes this circuit. Now you'll be able to
|
||||||
|
monitor your phone line, and hear what goes on while you not
|
||||||
|
around.
|
||||||
|
|
||||||
|
**** Coming soon ******
|
||||||
|
How to safely build waterproof M-80s.
|
||||||
|
|
||||||
|
(>
|
||||||
|
(>
|
||||||
|
(>
|
||||||
|
|
||||||
|
Automatic Phone Recorder
|
||||||
|
|
||||||
|
by
|
||||||
|
|
||||||
|
Atomic Punk
|
||||||
|
|
||||||
|
May 1, 1989
|
||||||
|
|
||||||
|
This device will allow any standard cassette tape recorder the
|
||||||
|
ability to automatically record phone conversations. The device
|
||||||
|
will start the tape recorder when the phone handset is lifted and
|
||||||
|
stop the recorder when the handset is returned to the cradle.
|
||||||
|
|
||||||
|
The device is a DC switch that is normally on via the forward
|
||||||
|
biasing of Q1 via R3. Q1 now clamps Q2 into a forward state by
|
||||||
|
biasing its complement well into a saturated state via R4. The
|
||||||
|
DC switch is turned off via a negative voltage above that of the
|
||||||
|
Zener (D1). This voltage is usually about 48 volts and is the on
|
||||||
|
hook value of the phone line. This negative voltage over rides
|
||||||
|
the effect of R3 and keeps the circuit off. When the phone is
|
||||||
|
off the hook, the 48 volts drops to 10 volts, which is below the
|
||||||
|
[more]
|
||||||
|
|
||||||
|
zener voltage of D1, and R3 now turns the circuit on. Audio
|
||||||
|
signal is via attenuator resistor R1 and DC isolating capacitors
|
||||||
|
C1 and C2.
|
||||||
|
|
||||||
|
This device is really only a high impedance switch that isolates
|
||||||
|
the recording controlled device from the phone line via some
|
||||||
|
simple electronic circuitry. It requires no battery and obtains
|
||||||
|
power for operating from the remote jack that in most recorders
|
||||||
|
is a source of 6 volts. When the remote jack is grounded,
|
||||||
|
recorder operation starts, and when the grounding condition is
|
||||||
|
removed, recorder operation stops.
|
||||||
|
|
||||||
|
Parts list: Here's all you need:
|
||||||
|
|
||||||
|
Name Qty Description
|
||||||
|
R4 1 220 ohm 1/4 watt resistor
|
||||||
|
R3 1 39k ohm 1/4 watt resistor
|
||||||
|
R1 & R2 2 100k ohm 1/4 watt resistor
|
||||||
|
C1 & C2 2 0.01 mfd/ 50V disc cap.
|
||||||
|
Q2 1 PN2222 NPN Silicon
|
||||||
|
Q1 1 PN2907 NPN Silicon
|
||||||
|
[more]
|
||||||
|
|
||||||
|
Z1 1 15 volt Zener diode
|
||||||
|
P1 1 Sub-mini plug 2.5mm dia.
|
||||||
|
CL1 & CL2 2 Alligator clips
|
||||||
|
P2 1 Mini-Plug 3.5mm dia.
|
||||||
|
Enclosure 1 Suitable enclosure for device
|
||||||
|
PB1 1 1.25x1.67 perfboard
|
||||||
|
WR4 (18") #24 hook-up black wire
|
||||||
|
WR3 (18") #24 hook-up red wire
|
||||||
|
Casto Castolite or paraffin wax
|
||||||
|
|
||||||
|
[more]
|
||||||
|
|
||||||
|
Circuit Diagram
|
||||||
|
|
||||||
|
|
||||||
|
Red wire
|
||||||
|
----------|---------Z1--------|--------------------|--------|----------
|
||||||
|
| | | |
|
||||||
|
Green | | | |
|
||||||
|
-----| | | | |
|
||||||
|
| | | | |
|
||||||
|
| | | e |
|
||||||
|
| | | | |
|
||||||
|
| | R3 |-----R4---b-Q2 |---P1
|
||||||
|
| | *No connection* | | | |To remote
|
||||||
|
| | | c c |of
|
||||||
|
| *|* | | | |recorder
|
||||||
|
|--- | ------------------|-----b-Q1 | |
|
||||||
|
| | | | |
|
||||||
|
| | e | |
|
||||||
|
| | |------------|--------|
|
||||||
|
| |
|
||||||
|
| | C1
|
||||||
|
[more]
|
||||||
|
|
||||||
|
| |----------------------------3 3-----------------|
|
||||||
|
| |
|
||||||
|
| |---P2
|
||||||
|
| C2 |To Aux
|
||||||
|
|--------------R1-----------------3 3-----------------|on
|
||||||
|
Recorder
|
||||||
|
|
||||||
|
** Green and Red wires go to corresponding color of telephone wires.
|
||||||
|
** Make sure to connect Q1 and Q2 properly -- follow label c,b,e
|
||||||
|
with the wires facing toward you and flat side up.
|
||||||
|
- c is the located on the upper right hand side
|
||||||
|
- b is the next wire left of c
|
||||||
|
- e is the next wire left of b
|
||||||
|
|
||||||
|
Anyway that concludes this circuit. Now you'll be able to
|
||||||
|
monitor your phone line, and hear what goes on while you not
|
||||||
|
around.
|
||||||
|
|
||||||
|
**** Coming soon ******
|
||||||
|
How to safely build waterproof M-80s.
|
40
textfiles.com/phreak/WIRETAPPING/bugdetct.phk
Normal file
40
textfiles.com/phreak/WIRETAPPING/bugdetct.phk
Normal file
@@ -0,0 +1,40 @@
|
|||||||
|
|
||||||
|
|
||||||
|
File: BUG DETECTION AT HOME
|
||||||
|
Read 24 times
|
||||||
|
|
||||||
|
Bug Detection on Home phones
|
||||||
|
(COURTESY OF DR JIMMY AND MR JIM)
|
||||||
|
|
||||||
|
First of all to test for bugs, you need a VOM (Multimeter) the higher the
|
||||||
|
impedance the better (a Digital with FET circuitry or a Vacuum Tube Volt Meter
|
||||||
|
is the best).
|
||||||
|
|
||||||
|
First disconnect the phone line(s) AT BOTH ENDS. Undo the phone instrument and
|
||||||
|
hook it up to the entry point of the phone line from the outside world (Ma Bell
|
||||||
|
does not like you cut her off completely.) The scheme is the physically
|
||||||
|
isolate your house, apartment, etc from the outside world. But before you do
|
||||||
|
this measure the line voltage (It should be approximately 48 Volts).
|
||||||
|
|
||||||
|
Now with the wires disconnected at both ee set your resistance scale to a high
|
||||||
|
reading and measure the resistance of the phone line, it should be very high on
|
||||||
|
the order of million ohms or more, this is the normal condition, since you
|
||||||
|
are measuring the resistance of an open circuit. If it is much less, say
|
||||||
|
50-100Kohms then you a device on the line that does not belong there, probably
|
||||||
|
a parallel bug.
|
||||||
|
|
||||||
|
Now twist the end of the disconnected wire and go to the other end and measure
|
||||||
|
the resistance of this. This resistance should be about one ohm or two at the
|
||||||
|
most in a big house with a lot of phones. If it is more, then you probably
|
||||||
|
have a series bug.
|
||||||
|
|
||||||
|
If in the first case, taking parallel measurements using a meter (not LED/LCD)
|
||||||
|
and you notice a "kick" in the needle, you probably have a line tap
|
||||||
|
|
||||||
|
Now if you also make a measurement with the wire end twisted together and you
|
||||||
|
notice the resistance reads about 1-2kohms, then you may have a drop-out relay.
|
||||||
|
A drop-out relay is a relay that senses a phone going off hook, and signals a
|
||||||
|
tape recorder to start recording.
|
||||||
|
|
||||||
|
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||||
|
|
BIN
textfiles.com/phreak/WIRETAPPING/bugging.guide
Normal file
BIN
textfiles.com/phreak/WIRETAPPING/bugging.guide
Normal file
Binary file not shown.
121
textfiles.com/phreak/WIRETAPPING/bugging.phk
Normal file
121
textfiles.com/phreak/WIRETAPPING/bugging.phk
Normal file
@@ -0,0 +1,121 @@
|
|||||||
|
Bugs on a Budget
|
||||||
|
Inexpensive surveillance
|
||||||
|
Data Line 8-85.
|
||||||
|
|
||||||
|
Post this phile as you will, but leave my name on it.
|
||||||
|
|
||||||
|
Gordon Liddy dreamt up an elaborate scheme for bugging the Democratic National
|
||||||
|
Headquarters. Included were such things as a type of UHF bug that required an
|
||||||
|
O-scope for the listeners to find, and other bugs that got power thru paint-on
|
||||||
|
electrical connectors. He was also financed out of a slush fund controlled by
|
||||||
|
the most powerful men in the nation.
|
||||||
|
|
||||||
|
I'm not that lucky. My money comes from a "Blue" collar job, so spending $5k
|
||||||
|
on a bug is laughable. Still, not getting the information I need because I
|
||||||
|
couldn't find any appropriate devices is just as silly. With a small bit of
|
||||||
|
skill, you can build a reliable intelligence collecting system for about $250.
|
||||||
|
|
||||||
|
|
||||||
|
1. FOR LIVE SETUPS. If it's important or your targets are just paranoid,
|
||||||
|
forget about phone taps. They may set up a meeting place on the line and that
|
||||||
|
is about it. Besides, you can do a huge amount of random eavesdropping with a
|
||||||
|
live collection system. You'll need a good cardioid mike element, amplifier,
|
||||||
|
and set of headphones. The most efficient way to go is to purchase a Hunter's
|
||||||
|
or Bionic Ear (See the Sources section at the end for locations). They run from
|
||||||
|
$50 to $90. Everything is included in a package that looks a lot like a metal
|
||||||
|
police flashlight. But to narror the collection angle, a parabolic dish is
|
||||||
|
essential. Don't get the one available with the Ear, it's small and you'll look
|
||||||
|
dumb using it. Instead, but ETCO's 18" dish for about $35. Bend 3 heavy wires
|
||||||
|
(e.g. welding rods) to grip the dish edge and syspend the Ear in the center. I
|
||||||
|
used a hose clamp to secure it. Rubber bands link he support rods at te rear of
|
||||||
|
the dish. Note: the focus is at a point intersected by the plane of the dish
|
||||||
|
and a line extending out from the plastic "pip" in te center. Since the dish is
|
||||||
|
transparent and the amp faces the target, the setup isn't too conspicuous from a
|
||||||
|
distance. The regular commercial reflector is black and quite obvious when in
|
||||||
|
use.
|
||||||
|
|
||||||
|
How good is the system? My hearing is below par and I was able to understand
|
||||||
|
whispers at 30m. The range you get may differ. In summer, crickets will drown
|
||||||
|
out a lot. Traffic and overhead jets can also do nasty things. Oh yes, there's
|
||||||
|
an automatic cutoff so if the target coughs, you won't have to pick up your
|
||||||
|
eardrums from the ground.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
2. VISUAL SURVEILLANCE. Sometimes this is all you need, but mostly it
|
||||||
|
complements the audio. Forget the 17x80 monster binoculars you saw in Soldier
|
||||||
|
of Fortune. If a gnat on your arm farts, the scene will jump. Instead save a
|
||||||
|
lot of money and get one or two more suitable pieces of equipment. One is a
|
||||||
|
good pair of 7x50 binoculars. Buy from a wholesale place in Shotgun News and
|
||||||
|
save big. These can be used well at night because of their large objective
|
||||||
|
size. Some like a zoom feature, but I find it raises price and at these powers
|
||||||
|
isn't needed.
|
||||||
|
|
||||||
|
Personally, I like to get further away and stay stationary for as long as
|
||||||
|
possible. Of course the parabolic setup is no good for audio at such a range
|
||||||
|
(100 to 300m). Oddly, I've never felt handicapped by not being able to hear the
|
||||||
|
action. You'd be surprised what lipreading and nonverbal cues you can pick up
|
||||||
|
with a little practice. I use a 20-60x60mm. spotting scope. It comes mounted
|
||||||
|
on a tripod for flat surface use, but I find a photographers C-clamp tripod is
|
||||||
|
handier for using on car windows. In daylight nothing can come close to this
|
||||||
|
system. It's less than 1/2m long and at 60x it's actually easy to reas
|
||||||
|
newspaper headlines at 1Km or so. After all, these things were meant to spor
|
||||||
|
bullet holes in targets at up to 500m and the cheapest low power spotter will do
|
||||||
|
that with no problem. Just how much is 60x ? Well, most rifle scopes are 4x,
|
||||||
|
binoculars are typically 7x, and the classic sniper scopes (Unertl and
|
||||||
|
Leatherwood) are only 10x. Just look through one at a sporting goods store and
|
||||||
|
you'll see what a deal these are. Astronomy-type telescopes usually are too
|
||||||
|
big, show an upside-down image, and have too much magnification for their
|
||||||
|
objective size, making the view too dark.
|
||||||
|
|
||||||
|
In fact, at night the spotter is a bit dim even at only 20x. Nothing's
|
||||||
|
perfect.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
3. WIRELESS. Here's the area most people immediately go for and sometimes
|
||||||
|
get suckered real bad. Worst are "Law Enforcement Supply" places. Some sell to
|
||||||
|
anyone with a letterhead. For the money they charge, it actually makes no
|
||||||
|
difference who you are; besides it's YOU who will get nailed for impersonating a
|
||||||
|
cop if THEY decide to turn you in. One of these joints advertises in Soldier of
|
||||||
|
Fortune and chagres $10 for their catalog. Its full of neat shit, all at least
|
||||||
|
5x over what anyone else could even think of charging. ETCO, on the other hand,
|
||||||
|
sells lots of transmitters for "wireless mikes". They also sell cheap mike
|
||||||
|
elements. Hmmm. For $25 you can build a workable unit. Nothing Harry Call
|
||||||
|
would be caught using, but usable nonetheless. Those little wireless mikes you
|
||||||
|
see in the backs of magazines shown next to a paper clip are really quite good,
|
||||||
|
but make sure they use the Mercury batteries. Even Alkalines will crap out
|
||||||
|
after a few hours of constant transmitting.
|
||||||
|
|
||||||
|
Those and most inexpensive transmitters work in the Commercial FM Band. The
|
||||||
|
good news is that you don't need a VHF receiver to pick them up, a regular FM
|
||||||
|
set does fine. Unfortunately, the same goes for the target. The best way out
|
||||||
|
is to find a station at either end of the band (88 or 108) that the target isn't
|
||||||
|
likely to listen to. In St. Louis it's KMJM at 107.7, an all Black station
|
||||||
|
(assuming the target is a WASPish businessman or a rocker) . Set your bug to
|
||||||
|
transmit on top of the station, and get in REAL CLOSE with your receiver. Since
|
||||||
|
it's at the end of tha dial, he/she isn't likely to tune past it and get a jolt
|
||||||
|
of audio feedback.
|
||||||
|
|
||||||
|
Finally, a bit of common sense. Wireless equipment should not take up a large
|
||||||
|
portion of your budget. It's hard to place, risky to maintain, and will be
|
||||||
|
destroyed if found. Also, the cops sort of look down on this sort of thing to
|
||||||
|
the tune of Federal time. Watergate did a lot to influence that. Don't be a
|
||||||
|
putz and try to break in a place to recover a $40 transmitter. Consider them
|
||||||
|
disposable and you may stay free.
|
||||||
|
|
||||||
|
|
||||||
|
4.GETTING IT DOWN. Buy a Voice-activated (VOX) microcassette. It'll free you
|
||||||
|
up for more important stuff than listening to silence or irrelevant bullshit.
|
||||||
|
Especially with transmitters, a lot of time is just wasted. Live monitoring is
|
||||||
|
fun... for fifteen minutes. A good unit is the Panasonic RN 109A at about $50.
|
||||||
|
It'll record 1 hour per side at low speed. With the VOX on, that's an hour of
|
||||||
|
solid sound. Use one on the parabolic dish, too. Replay through your stereo
|
||||||
|
and use the equalizer or tone controls to sharpen up the stuff you may have
|
||||||
|
missed the first time.
|
||||||
|
|
||||||
|
Stay tuned to this BBS for more philes from Data Line, the Old Man who taught
|
||||||
|
Donald Segretti how to rig his first election in college.
|
||||||
|
|
||||||
|
MCI Telex # 650-240-6356.
|
||||||
|
|
30
textfiles.com/phreak/WIRETAPPING/buggy.phk
Normal file
30
textfiles.com/phreak/WIRETAPPING/buggy.phk
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
|
||||||
|
IN ANSWER TO ALL THOSE WHO DON'T KNOW WHAT AN INFINITY TRANSMITTER IS, HERE
|
||||||
|
IS A LITTLE HISTORY:
|
||||||
|
|
||||||
|
A GUY BY THE NAME OF MANNY MITTLEMAN RAN A COMPANY CALLED THE WIRELESS GUITAR
|
||||||
|
COMPANY LOCATED ON LIBERTY ST. IN NY. ASIDE FROM WIRELESS GUITARS, MANNY ALSO
|
||||||
|
BUILT ALL SORTS OF ELECTRONIC WIRELESS "BUGS". ONE ITEM, THE INFINITY
|
||||||
|
TRANSMITTER WAS A DEVICE THAT WAS PLACED INSIDE AN UNSUSPECTING PERSONS
|
||||||
|
TELEPHONE. WHEN THE PHONE NUMBER OF THAT TELEPHONE WAS DIALED AND A CERTAIN
|
||||||
|
NOTE WAS BLOWN INTO THE PHONE FROM A HOHNER, KEY-OF-C, HARMONICA, THE BUGGED
|
||||||
|
PHONE DID NOT RING, AND WHAT'S MORE, ENABLED THE CALLER TO THEN HEAR EVERYTHING
|
||||||
|
SAID IN THE ROOM THAT THE PHONE WAS LOCATED IN. AS LONG AS THE CALLER WANTED
|
||||||
|
TO STAY ON THE PHONE, ALL WAS OPEN TO HIM OR HER. IF THE PHONE WAS LIFTED OFF
|
||||||
|
THE HOOK, THE TRANSMITTER WAS DISCONECTED AND THE "BUGGED" PARTY RECEIVED A
|
||||||
|
DIAL TONE AS IF NOTHING WAS WRONG WITH THE LINE.
|
||||||
|
|
||||||
|
REMEMBER, ALL THIS WAS CONSTRUCTED IN THE 1960x'S WHEN IC'S WERE NOT AS
|
||||||
|
COMMONPLACE AS THEY ARE TODAY. ALSO BEAR IN MIND THAT DURING THAT PERIOD IN
|
||||||
|
TIME, EVEN THE TELEPHONE COMPANY WAS NOT QUITE SURE ON HOW WELL OR HOW PORTABLE
|
||||||
|
TONE DECODING WAS.
|
||||||
|
|
||||||
|
MY HAT IS STILL OFF TO TO MANNY MITTLEMAN, THE GREATEST DEVELOPER OF
|
||||||
|
TELEPHONE GIMMICKERY AND BUGGER OF HOTEL ROOMS IN DIVORCE CASES.
|
||||||
|
|
||||||
|
IF THERE IS ANY INTEREST ON BUGGING, I'LL BE GLAD TO LET YOU KNOW SOME MORE
|
||||||
|
OF MANNY'S STUFF.
|
||||||
|
|
||||||
|
PS. MANY GOVERNMENT AGENCY'S WERE SOME OF MANNY'S BEST CUSTOMERS.
|
||||||
|
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||||
|
|
96
textfiles.com/phreak/WIRETAPPING/bugphone.phk
Normal file
96
textfiles.com/phreak/WIRETAPPING/bugphone.phk
Normal file
@@ -0,0 +1,96 @@
|
|||||||
|
bugoph phone.txt
|
||||||
|
Automatic Phone Recorder
|
||||||
|
|
||||||
|
by
|
||||||
|
|
||||||
|
Atomic Punk
|
||||||
|
|
||||||
|
May 1, 1989
|
||||||
|
|
||||||
|
This device will allow any standard cassette tape recorder the
|
||||||
|
ability to automatically record phone conversations. The device
|
||||||
|
will start the tape recorder when the phone handset is lifted and
|
||||||
|
stop the recorder when the handset is returned to the cradle.
|
||||||
|
|
||||||
|
The device is a DC switch that is normally on via the forward
|
||||||
|
biasing of Q1 via R3. Q1 now clamps Q2 into a forward state by
|
||||||
|
biasing its complement well into a saturated state via R4. The
|
||||||
|
DC switch is turned off via a negative voltage above that of the
|
||||||
|
Zener (D1). This voltage is usually about 48 volts and is the on
|
||||||
|
hook value of the phone line. This negative voltage over rides
|
||||||
|
the effect of R3 and keeps the circuit off. When the phone is
|
||||||
|
off the hook, the 48 volts drops to 10 volts, which is below the
|
||||||
|
[more] zener voltage of D1, and R3 now turns the circuit on. Audio
|
||||||
|
signal is via attenuator resistor R1 and DC isolating capacitors
|
||||||
|
C1 and C2.
|
||||||
|
|
||||||
|
This device is really only a high impedance switch that isolates
|
||||||
|
the recording controlled device from the phone line via some
|
||||||
|
simple electronic circuitry. It requires no battery and obtains
|
||||||
|
power for operating from the remote jack that in most recorders
|
||||||
|
is a source of 6 volts. When the remote jack is grounded,
|
||||||
|
recorder operation starts, and when the grounding condition is
|
||||||
|
removed, recorder operation stops.
|
||||||
|
|
||||||
|
Parts list: Here's all you need:
|
||||||
|
|
||||||
|
Name Qty Description
|
||||||
|
R4 1 220 ohm 1/4 watt resistor
|
||||||
|
R3 1 39k ohm 1/4 watt resistor
|
||||||
|
R1 & R2 2 100k ohm 1/4 watt resistor
|
||||||
|
C1 & C2 2 0.01 mfd/ 50V disc cap.
|
||||||
|
Q2 1 PN2222 NPN Silicon
|
||||||
|
Q1 1 PN2907 NPN Silicon
|
||||||
|
[more] Z1 1 15 volt Zener diode
|
||||||
|
P1 1 Sub-mini plug 2.5mm dia.
|
||||||
|
CL1 & CL2 2 Alligator clips
|
||||||
|
P2 1 Mini-Plug 3.5mm dia.
|
||||||
|
Enclosure 1 Suitable enclosure for device
|
||||||
|
PB1 1 1.25x1.67 perfboard
|
||||||
|
WR4 (18") #24 hook-up black wire
|
||||||
|
WR3 (18") #24 hook-up red wire
|
||||||
|
Casto Castolite or paraffin wax
|
||||||
|
|
||||||
|
[more] Circuit Diagram
|
||||||
|
|
||||||
|
|
||||||
|
Red wire
|
||||||
|
----------|---------Z1--------|--------------------|--------|----------
|
||||||
|
| | | |
|
||||||
|
Green | | | |
|
||||||
|
-----| | | | |
|
||||||
|
| | | | |
|
||||||
|
| | | e |
|
||||||
|
| | | | |
|
||||||
|
| | R3 |-----R4---b-Q2 |---P1
|
||||||
|
| | *No connection* | | | |To remote
|
||||||
|
| | | c c |of
|
||||||
|
| *|* | | | |recorder
|
||||||
|
|--- | ------------------|-----b-Q1 | |
|
||||||
|
| | | | |
|
||||||
|
| | e | |
|
||||||
|
| | |------------|--------|
|
||||||
|
| |
|
||||||
|
| | C1
|
||||||
|
[more] | |----------------------------<2D> <20>-----------------|
|
||||||
|
| |
|
||||||
|
| |---P2
|
||||||
|
| C2 |To Aux
|
||||||
|
|--------------R1-----------------<2D> <20>-----------------|on
|
||||||
|
Recorder
|
||||||
|
|
||||||
|
** Green and Red wires go to corresponding color of telephone wires.
|
||||||
|
** Make sure to connect Q1 and Q2 properly -- follow label c,b,e
|
||||||
|
with the wires facing toward you and flat side up.
|
||||||
|
- c is the located on the upper right hand side
|
||||||
|
- b is the next wire left of c
|
||||||
|
- e is the next wire left of b
|
||||||
|
|
||||||
|
Anyway that concludes this circuit. Now you'll be able to
|
||||||
|
monitor your phone line, and hear what goes on while you not
|
||||||
|
around.
|
||||||
|
|
||||||
|
**** Coming soon ******
|
||||||
|
How to safely build waterproof M-80s.
|
||||||
|
|
||||||
|
(>
|
48
textfiles.com/phreak/WIRETAPPING/bugstaps.txt
Normal file
48
textfiles.com/phreak/WIRETAPPING/bugstaps.txt
Normal file
@@ -0,0 +1,48 @@
|
|||||||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||||
|
% BUGS & %
|
||||||
|
% HOW TO TAP SOMEONES ROOM %
|
||||||
|
% %
|
||||||
|
% BY ---> *$> FIREBALL <$* %
|
||||||
|
% %
|
||||||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||||
|
|
||||||
|
HAVE YOU EVER HAD A STRONG DESIRE TO KNOW WHAT BOY YOUR OLDER SISTER LIKES
|
||||||
|
OR HOW YOUR PARENTS SEX LIFE IS GOING, WELL NOW YOU CAN KNOW ALL BY
|
||||||
|
BUGGING THERE ROOMS!
|
||||||
|
|
||||||
|
THE FIRST THING YOU CAN USE IS THE WIRELESS MICROPHONE FROM RADIO SHACK-
|
||||||
|
$6.99. IT IS DESIGNED TO PUT VOICES ON TO AN FM RADIO BUT NO ONE SAYS YOU
|
||||||
|
CAN'T HIDE IT AND LET IT PICK UP UNSUSPECTING PEOPLE....FIRST TUNE THE
|
||||||
|
MICROPHONE WITH ANY BLANKSPOT ON YOUR FM RADIO (DON'T WORRY IT WILL
|
||||||
|
EXPLAIN HOW TO TUNE IT ON THE BACK OF THE PACKAGE.) ....THEN HIDE IT WHEN
|
||||||
|
NO ONE IS AROUND (WHEN HIDING THE MICRO- PHONE TALK INTO IT AS YOU'RE
|
||||||
|
WALKING TO MAKE SURE YOU HAVEN'T WALKED OUT OF IT'S RANGE.)
|
||||||
|
|
||||||
|
THERE ARE, HOWEVER, 2 DISADVANTAGES TO USING ONE OF THESE MICROPHONES:
|
||||||
|
|
||||||
|
1) YOU CAN ONLY PUT IT IN A ROOM THAT
|
||||||
|
IS RIGHT NEXT TO YOUR ROOM AND ONLY
|
||||||
|
ONE WALL CAN SEPERATE THEM.
|
||||||
|
|
||||||
|
2) THE MIKE IS 8 INCHES LONG AND THE
|
||||||
|
ONLY DECENT HIDING PLACES FOR SOMETHING
|
||||||
|
THAT BIG IS UNDER A BED OR IN A CLOSET.
|
||||||
|
(YOU MAY WANT TO TAKE IT APART TO MAKE
|
||||||
|
IT SMALLER BUT I DONT RECCOMMEND DOING
|
||||||
|
THIS.)
|
||||||
|
|
||||||
|
ANOTHER THING YOU CAN USE IS THE CLIP ON WIRELESS MIKE BY RADIO SHACK FOR
|
||||||
|
ABOUT $18. IT WORKS IN BASICLY THE SAME WAY EXCEPT IT IS VERY SMALL AND IT
|
||||||
|
WILL WORK THE DISTANCE OF YOUR HOUSE AND POSSIBLY EVEN YOUR NEIGHBORS
|
||||||
|
HOUSE.
|
||||||
|
|
||||||
|
HAVE PHUN...I SURE DID!!
|
||||||
|
STORE MANAGER.
|
||||||
|
CALL THE UNDERGROUND AT:
|
||||||
|
201-223-64 CALL THE BASEMENT:HEAD UNDERGROUND
|
||||||
|
BBS AT......201-223-6404....
|
||||||
|
|
||||||
|
Downloaded from Just Say Yes. 2 lines, More than 500 files online!
|
||||||
|
Full access on first call. 415-922-2008 CASFA
|
||||||
|
|
||||||
|
|
118
textfiles.com/phreak/WIRETAPPING/buildbug.phk
Normal file
118
textfiles.com/phreak/WIRETAPPING/buildbug.phk
Normal file
@@ -0,0 +1,118 @@
|
|||||||
|
This file Presented by METRONET system (301)-944-3023 The bug's that this
|
||||||
|
device detects are Infinity transmitters, read the Infinity transmitter
|
||||||
|
bulletin for more info.
|
||||||
|
|
||||||
|
::::::::::::::::::::::::::::::::::::::
|
||||||
|
: :
|
||||||
|
: How to build a Bug Detector :
|
||||||
|
: :
|
||||||
|
: by :
|
||||||
|
: :
|
||||||
|
: The Gremlin :
|
||||||
|
: :
|
||||||
|
::::::::::::::::::::::::::::::::::::::
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Warning: This formatted for 80 column and upper/lower case capabilities...
|
||||||
|
|
||||||
|
][][][
|
||||||
|
Basic theory
|
||||||
|
][][][
|
||||||
|
|
||||||
|
Because most bugs are triggered through certain frequencies, it is very simple
|
||||||
|
to build a small sweeping device that will trigger any bug present. The two
|
||||||
|
IC's are what create the oscillating tone. The IC1 operates at .8 Hz where the
|
||||||
|
IC2 runs at about 10 Hz. Frequency is determined by this formula:
|
||||||
|
|
||||||
|
f=1.44/(R1+2R2)C)
|
||||||
|
|
||||||
|
f measured in Hertz, R in megohms, and C in microfarads
|
||||||
|
|
||||||
|
The oscillation can be varied by the voltage placed upon pin #5. This is how
|
||||||
|
we create the wave sound. When voltage goes up, so does the frequency, and
|
||||||
|
vice-versa.
|
||||||
|
|
||||||
|
Normally, the output pin 3 is a square wave. Since we need varying wave at pin
|
||||||
|
#5, we need a triangular wave. We get this through integrating the square wave
|
||||||
|
created at pin #3 of IC1. It is acheived by D1, D2, R3, R4 and C2.
|
||||||
|
|
||||||
|
This varying output is fed into the phone line by transformer T1 which has an 8
|
||||||
|
ohm winding going to pin #3 of IC2 and the 500 end to a 0.1 microfarad capaci-
|
||||||
|
tator at the phone line.
|
||||||
|
|
||||||
|
Enuf talk..let's get movin!
|
||||||
|
|
||||||
|
|
||||||
|
][][][
|
||||||
|
Schematic Design
|
||||||
|
][][][
|
||||||
|
|
||||||
|
|
||||||
|
+9v
|
||||||
|
|
||||||
|
__________|_____________________________
|
||||||
|
| _|__|_ _|__|_ |
|
||||||
|
R1 | 4 8 | _|<D1__R3__ | 4 8 | R5
|
||||||
|
| | | | | | | |
|
||||||
|
+-----+2 3+---+ +-+5 2|--+----+----+
|
||||||
|
| | | |_>|R2__R4__| | | | |
|
||||||
|
R2 | ic1 | | | ic2 | R6 D3
|
||||||
|
| +-+6 | ___| | 6+-+ | V
|
||||||
|
| | | | | | | | | -
|
||||||
|
+---+-+7 | | +--+3 7+-+-----+----+
|
||||||
|
| |___1__| | | |___1__| |
|
||||||
|
| | | | | C4
|
||||||
|
| | | | | ^
|
||||||
|
C1 | C2 T1 _|_._C3|(_. |
|
||||||
|
^ | ^ 8--500<_|_. |
|
||||||
|
|_________|______________|__|______|__________|
|
||||||
|
|
|
||||||
|
-G-
|
||||||
|
|
||||||
|
|
||||||
|
][][][
|
||||||
|
Parts List
|
||||||
|
][][][
|
||||||
|
|
||||||
|
C1 10-uF electrolytic capacitator 25 WDVC
|
||||||
|
C2 300-uF electrolytic capacitator 25 WDVC
|
||||||
|
C3 0.1-uF capacitator
|
||||||
|
C4 0.068-uF capacitator
|
||||||
|
D1-D3 1N914
|
||||||
|
IC1,IC2 555 timers
|
||||||
|
R1, R4-R6 1-kilohm resistors
|
||||||
|
R2 91-kilohm resistor
|
||||||
|
R3 22 kilohm resistor
|
||||||
|
T1 500-to-8 ohm audio output transformer
|
||||||
|
|
||||||
|
][][][
|
||||||
|
Construction
|
||||||
|
------------
|
||||||
|
|
||||||
|
When building this unit, it is very useful to use a breadboard or vector board.
|
||||||
|
I suggest that leads being connected to phone line (T1, C3) end in a jack or a
|
||||||
|
modular connector to make the hookup easier. To test it, hook it to the phone
|
||||||
|
line (not the suspected line) and call the line you suspect is being bugged.
|
||||||
|
The party you are calling should not answer the phone. Now, the unit is
|
||||||
|
activated. 3 times, every 4 seconds, the oscillator will go up to 10 kHz and
|
||||||
|
back down again..like a bell curve..If there is a frequency sensitive bug on
|
||||||
|
the line, the phone will stop ringing, and you will be able to hear everything
|
||||||
|
said in the room. If the phone keeps ringing, chances are that all is
|
||||||
|
fine..unless the bug requires a multi-frequency trigger..but these are very
|
||||||
|
rare..
|
||||||
|
|
||||||
|
So, we can see that 415-BUG-1111 really does work! It creates the tone..any
|
||||||
|
click heard is the Phone Co's (or whoever is bugging) speaker/tape recorder
|
||||||
|
picking up!
|
||||||
|
|
||||||
|
|
||||||
|
Have phun, and hope it helped!
|
||||||
|
|
||||||
|
The Gremlin
|
||||||
|
|
||||||
|
...call the Gremlin's Lair..201-536-7794..today!...
|
||||||
|
|
||||||
|
[Thanks again Metronet!]
|
||||||
|
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||||
|
|
133
textfiles.com/phreak/WIRETAPPING/caller
Normal file
133
textfiles.com/phreak/WIRETAPPING/caller
Normal file
@@ -0,0 +1,133 @@
|
|||||||
|
|
||||||
|
NOTES ON RECORDING CALLER ID signals ....(AND VOICE NOTES)
|
||||||
|
|
||||||
|
There have been a number of people who have complained that caller
|
||||||
|
id is not working perfectly in their area. I have been working
|
||||||
|
with ZyXEL to try to get it and distinctive ring working perfectly.
|
||||||
|
It now does work in most of Canada and the US.
|
||||||
|
Caller id works great combined
|
||||||
|
with distinctive ring.
|
||||||
|
I enjoy such features as, if the modem encounters a busy bbs, it
|
||||||
|
sets distinctive ring to answer a CALL return (another feature
|
||||||
|
from the phone company), then answers in originate mode. Thus you
|
||||||
|
can make contact with the bbs at the first opportunity after the
|
||||||
|
line clears, and not have your modem be disturbed by other calls.
|
||||||
|
|
||||||
|
For those (hopefully few) people who still have problems with
|
||||||
|
caller-id, here is a simple way to get information to allow
|
||||||
|
these problems to be resolved more quickly. In the past I circulated
|
||||||
|
a circuit to do this.
|
||||||
|
|
||||||
|
However, thanks to the new voice features, there is an easier way.
|
||||||
|
The idea is to record the ring/callerid signalling on a voice file
|
||||||
|
which can then be listened to, and uploaded to the engineers
|
||||||
|
if necessary. This also allows the cadence of the distinctive ring
|
||||||
|
to be measured if necessary.
|
||||||
|
|
||||||
|
It is REALLY simple to do also and is fun because you can even
|
||||||
|
listen to the signal and get a bit of an idea what might be wrong,
|
||||||
|
even without sending in the file. It is also instructive to
|
||||||
|
write a little voice display program to become more familiar with
|
||||||
|
this format-- since the signals are predictable, monotonic, and
|
||||||
|
thus relatively easy to analyse with a simple program.
|
||||||
|
|
||||||
|
One of the problems is that some exchanges do not seem to follow
|
||||||
|
the Bellcore specs for callerid. The way it is supposed to work,
|
||||||
|
is that after the first complete ring (or distinctive ring)
|
||||||
|
stops, there is a 500 ms
|
||||||
|
pause, then a 250 ms section of "continuous"
|
||||||
|
U characters sent (called a channel seizure signal), then a 150 ms
|
||||||
|
section of mark sent, then the data. A simple number will take
|
||||||
|
about 200 ms further. Then silence reigns until the next ring.
|
||||||
|
|
||||||
|
Now the tones used are 1200 hz for the mark or 1 bit, and
|
||||||
|
2200 for the space or 0 bit. Data is sent at 1200 baud in
|
||||||
|
an asychronous mode. (this is called bell 202 standard).
|
||||||
|
|
||||||
|
Now the The U character is interesting in that it is 1 bit on ,
|
||||||
|
one bit off.
|
||||||
|
Thus when it is being sent in a continuous mode, it also looks
|
||||||
|
like 250 ms of the frequency shift keying signal shaped as
|
||||||
|
a 600 hz square wave. What does this mean?? it means that
|
||||||
|
it sounds like a quarter second of 600 hz tone.
|
||||||
|
|
||||||
|
So you should hear a ring, a 1/2 second of silence, a 1/4 second
|
||||||
|
of 600 hz (fundamental) tone, and then a quarter second
|
||||||
|
of 1200 hz tone-- followed by a short blast of a higher note.
|
||||||
|
|
||||||
|
What can go wrong?? 1st, one problem is that some switches don;t
|
||||||
|
have a proper pause. you might get the U's not sent continuously
|
||||||
|
which might sound like a lower note. Third the mark might not
|
||||||
|
be long enough. next the frequencies may not be correct.
|
||||||
|
The data can come slowly--with up to 2 characters of mark
|
||||||
|
signals between data. (according to the spec). Thus you can
|
||||||
|
give ZyXEL some information without sending the file. Your local
|
||||||
|
exchange sends all these notes (they are not sent from long distance),
|
||||||
|
so they are not attenuated very much.
|
||||||
|
Please also try to find out what kind of switch the exchange has. This
|
||||||
|
information can often be obtained from 611 repair service from a
|
||||||
|
nice teckie. Another interesting thing is some of these switches have
|
||||||
|
more than one way caller id can be sent. They may just be set to
|
||||||
|
do it the non compliant way!! perhaps the technical people do not
|
||||||
|
know they have a choice.
|
||||||
|
|
||||||
|
Once you have the voice file,
|
||||||
|
Another crude way of timing, is to use a hex editor, and lop off pieces
|
||||||
|
from the end of the file (checking for the shielded code--and
|
||||||
|
preserving shielded data--make sure the file is properly terminated).
|
||||||
|
this way you can listen do some timing
|
||||||
|
by looking a t the size of the lopped off file. You can even look
|
||||||
|
at the raw data, and get the idea which area you are in. (espec
|
||||||
|
in 2 bit mode).
|
||||||
|
A less crude way, is to write a little program-- hey and what better
|
||||||
|
way for all you folks wanting to write a voice mail system to
|
||||||
|
force yourself to get started!. You can convert the voice file
|
||||||
|
into one readable by some of the standard voice/oscilloscope
|
||||||
|
sound blaster type programs. so you can see it on your screen.
|
||||||
|
|
||||||
|
The idea is to find out what went wrong, tell ZyXEL and provide
|
||||||
|
a backup recording.
|
||||||
|
|
||||||
|
Now-- you may ask,, how do I get started. WELLL,, there is
|
||||||
|
a little trick. You need to read the signals without actually
|
||||||
|
answering the line. The best way to do this is to fool the
|
||||||
|
phone company into thinking you have not answered the line.
|
||||||
|
One very easy way to do this is to get a capacitor and put it
|
||||||
|
in series with the line. I found a .68 microfarad 400 volt
|
||||||
|
non polarized (ie no + on one of the terminals)
|
||||||
|
capacitor (eg from radio shack).--just a cheap
|
||||||
|
mylar capacitor (could even be 200 volts). (but
|
||||||
|
.22 - 4 microfarad also seemed to work). and put it
|
||||||
|
in series with the line. ONe easy way to do this is to modify
|
||||||
|
your wall plug (which has screws ). Unscrew one red wire,
|
||||||
|
and put a capacitor in series with it and the other red wire
|
||||||
|
formerly going to the same terminal. You may want to leave
|
||||||
|
an extension phone plugged in on another outlet so you can
|
||||||
|
hear the ring (and answer any calls you get while playing).
|
||||||
|
|
||||||
|
Now bring up your zfax and select the voice utilties. pick
|
||||||
|
record voice and select the telco line. then before starting
|
||||||
|
the recording by pushing enter on the OK message,
|
||||||
|
have someone dial your phone. press enter about the time they
|
||||||
|
have finished dialing your phone. This will creat a nice short
|
||||||
|
voice file. PUSH ESCAPE as the second ring starts. This
|
||||||
|
should create a nice 30k file or so with all the info on it.
|
||||||
|
Then play back the voice and start analysing. You should be
|
||||||
|
able to hear it as well as a regular call on your internal
|
||||||
|
modem speaker. The ring will sound like a blast of sound--but
|
||||||
|
not too loud and you should hear a beat of nothing (.5 sec) then
|
||||||
|
beeep(600hz,1/4 sec) beep (1200hz 1/8 sec) bep (1800-2400hz 1/16 sec).
|
||||||
|
|
||||||
|
I am interested in any voice software people do also. Please
|
||||||
|
send me a note if you have some success. I would also love to
|
||||||
|
supply you with a ZyXEL modem, esp if you are in Canada.
|
||||||
|
(I can provide extra callerid software also)
|
||||||
|
|
||||||
|
George Vande Bunte PENG
|
||||||
|
OCOMP
|
||||||
|
416 5341508 gvb@telly.on.ca
|
||||||
|
238 Davenport Rd. Toronto m5r1j6
|
||||||
|
|
||||||
|
Please keep whole file together.
|
||||||
|
|
||||||
|
|
67
textfiles.com/phreak/WIRETAPPING/callwai.txt
Normal file
67
textfiles.com/phreak/WIRETAPPING/callwai.txt
Normal file
@@ -0,0 +1,67 @@
|
|||||||
|
|
||||||
|
|
||||||
|
==)--- P TO PAUSE S TO STOP ---(==
|
||||||
|
|
||||||
|
|
||||||
|
+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
|
||||||
|
* *
|
||||||
|
+ THE CALL WAITING TAP +
|
||||||
|
* *
|
||||||
|
+ WRITTEN BY: The Byte +
|
||||||
|
* *
|
||||||
|
+ DISTRIBUTED BY: Marauder +
|
||||||
|
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*
|
||||||
|
|
||||||
|
So, you have an enemy who talks behind your back, eh? Or, maybe you just
|
||||||
|
would like to "listen" in on your friend's conversations? Well, if you have
|
||||||
|
2 phone lines and call waiting on one of them, you are in luck. (Only one
|
||||||
|
prob|em: your friend must also have call waiting!)
|
||||||
|
|
||||||
|
Procedure:
|
||||||
|
|
||||||
|
[1] Call up your friend with the phone you want to listen with. When he
|
||||||
|
answers call waiting (he's already on the phone, and you are the 2nd
|
||||||
|
caller), then you either sit there or say: sorry, I have the wrong #.
|
||||||
|
|
||||||
|
[2] Next, you wait until he goes back to the other line (puts you on hold).
|
||||||
|
|
||||||
|
[3] Then, pick up your other line and call ->YOUR<- call waiting.
|
||||||
|
|
||||||
|
[4] Answer call waiting
|
||||||
|
|
||||||
|
[5] Then go back to him. (Answer, and then click back.. Click ->2<- times
|
||||||
|
Answer, and go back..)
|
||||||
|
|
||||||
|
[6] Hang up your second line
|
||||||
|
|
||||||
|
[7] You are now on the line!
|
||||||
|
|
||||||
|
[8] Listen and be Q U I E T ! He can hear you!
|
||||||
|
|
||||||
|
Techniques I use to prevent noise or confusion:
|
||||||
|
|
||||||
|
If you have call forwarding, turn it on and forward calls somewhere
|
||||||
|
before you start listening. If a call comes through on your call waiting
|
||||||
|
circuit, the people talking (your buddie and his pal) will not hear
|
||||||
|
anything, but after you answer call waiting and come back, they will
|
||||||
|
hear the other call hang up (two clicks). If you don't have call forwarding,
|
||||||
|
I suggest you get it if you are going to make a habit of this, because it
|
||||||
|
will become a major pain in the ass. When your call waiting rings, you are
|
||||||
|
removed from the "listening" conversation and placed back on his hold
|
||||||
|
circuit. In order to get back on, you must answer the phone and wait for
|
||||||
|
your party (when you answer the phone, tell the guy you are in a hurry and
|
||||||
|
you have to go or you'll call him back later or something) to hang up. When
|
||||||
|
he or she hangs up, you will be back on the conversation. Then, one of your
|
||||||
|
pals will say: What was that? (because of the clicks).. So, try to use call
|
||||||
|
forwarding if you can. Remember: Have fun, and don't abuse it. I am not sure
|
||||||
|
about it, because I just discovered it. It is illegal (what isn't these days)
|
||||||
|
because it is "invading privacy". I don't know if the phone company just did
|
||||||
|
not realize there was a flaw in it, or that was planned for line testing, I
|
||||||
|
am not sure. Have fun!
|
||||||
|
-THE BYTE
|
||||||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||||||
|
[ Be careful and remember in no way ]
|
||||||
|
[ am I responsible for your actions ]
|
||||||
|
Uploaded to P-80 by John Tynes
|
||||||
|
|
||||||
|
'OUT OF BAND' TECHNIQUES. BY THE WAY,REAL PHREAKS
|
117
textfiles.com/phreak/WIRETAPPING/cordless.phk
Normal file
117
textfiles.com/phreak/WIRETAPPING/cordless.phk
Normal file
@@ -0,0 +1,117 @@
|
|||||||
|
<The Restaurant at the End of the Universe 609/921-1994 10Meg/BBS/AE/Catfur>
|
||||||
|
|
||||||
|
)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
|
||||||
|
)( How To Listen In On Cordless Telephone Conversations )(
|
||||||
|
)( )(
|
||||||
|
)( An Original 'Phile' By: Beowulf )(
|
||||||
|
)( )(
|
||||||
|
)( Call The Outhouse BBS 201-756-9575 )(
|
||||||
|
)( )(
|
||||||
|
)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
|
||||||
|
|
||||||
|
Have you ever wanted to know what your brother/sister/parents/ friends/enemies
|
||||||
|
were saying as they hid somewhere, cordless phone in hand? With this phile, now
|
||||||
|
you can! Just follow the simple instructions outlined inside.
|
||||||
|
|
||||||
|
First some information about cordless telephones:
|
||||||
|
|
||||||
|
The original cordless telephones (1978-about late 1983) were made to be used
|
||||||
|
on the 1.6 to 1.8 MHz band. If you will notice, 1.6 MHz is also the top end of
|
||||||
|
the AM broadcast band. These phones operate on AM (just like the radio
|
||||||
|
stations) and use the wiring in your house for an antenna. The power of these
|
||||||
|
phones is 1/10 of a watt in most cases, or about 1/50th of the power that your
|
||||||
|
average CB radio will put out. So, not having a lot of power, it is tough to
|
||||||
|
hear these phones. You know how they say '500 foot range'? Sure, that's the
|
||||||
|
range of the handset to the base, but not of the signals emitted by the base!
|
||||||
|
Which means that on good nights you can hear them for many miles (I live in NJ
|
||||||
|
an have heard telephones VERY loudly from NY City, 35 MILES away!).
|
||||||
|
|
||||||
|
The newer phones, however, are not as easy to hear. They operate on FM on the
|
||||||
|
49 MHz band, which is the same frequency which your little walkie-talkies that
|
||||||
|
you loved as a ten year old operate on. These phones require a little bit more
|
||||||
|
effort to be heard than do the old ones (and a little $$$). Never fear,
|
||||||
|
however, because about 1 out of 10 phones is the old style, and they are still
|
||||||
|
being made and sold today.
|
||||||
|
|
||||||
|
How To Do It:
|
||||||
|
|
||||||
|
For the old style phones, you will need to get a pocket size AM transistor
|
||||||
|
radio. The one I used was an AM/FM Realistic (bought for $9 at Radio Shack).
|
||||||
|
There should be a small plastic box inside the radio. This little 'box' is the
|
||||||
|
VFO (Variable Frequency Oscillator) which controlls the frequency of the radio.
|
||||||
|
Now of course, you aren't going to have a digital frequency counter (they only
|
||||||
|
cost $400, so everyone should have at least two of them) so before you do
|
||||||
|
anything, turn on the radio and tune to the top of the band and find the station
|
||||||
|
which is closest to the top of the broadcast band. Write down the frequency so
|
||||||
|
you have something to compare to later.
|
||||||
|
|
||||||
|
Now, turn off the radio, get a small size screwdriver, and adjust the small
|
||||||
|
screw(s) on the back of the little plastic box. Don't turn them more than a
|
||||||
|
quarter turn at a time. Now, when you have done your first 'tweak' of the
|
||||||
|
screws, turn on the radio and see where that station at the top of the band is
|
||||||
|
now on the frequency dial. When you have gotten the station 150-200 kHz down
|
||||||
|
from where it was, (like if the frequency was 1600, get it down between 1400 and
|
||||||
|
1450), you are all set to recieve cordless telephones at the top end of the
|
||||||
|
radio! Note: this little 'trick' may not work as well on all radios, but it is
|
||||||
|
worth a try. If worse comes to worse, you can turn them back.
|
||||||
|
|
||||||
|
The ideal distance is a close to the base as you can get, but this sucker
|
||||||
|
should pull in signals from up to 500 feet away with no problem. Simply go near
|
||||||
|
someones house with this, and then have fun!
|
||||||
|
|
||||||
|
|
||||||
|
Another way: Another way to do this, if the VFO adjustment trick doesn't
|
||||||
|
work, is to adjust the small metal boxes that have little colored screws in
|
||||||
|
them. These are the tuning coils for the reciever circuit, and they affect the
|
||||||
|
frequency also. Another possibility is a combination of turning the VFO screws
|
||||||
|
and the coils to try to get the desired effect. Good Luck!
|
||||||
|
|
||||||
|
Now for the tough ones, the new phones. The new phones work on the 49 MHz
|
||||||
|
band. You are going to need one of the 'new' walkie talkies that operate on 49
|
||||||
|
MHz ===- FM -=== (the cheap shit ones are AM). If you decide to invest in one
|
||||||
|
at Radio Shack or similar store, make damn sure you get FM walkie talkies. If
|
||||||
|
you get AM, you're screwed, unless you have a friend who is killer into
|
||||||
|
electronics or ham radio who has the knowledge to convert AM to FM. (Yes, it
|
||||||
|
can be done. I have done it with CB's, and it is great for CB because no one
|
||||||
|
can understand what you are saying unless they have a FM-converted
|
||||||
|
CB.....Hmm.....that may be my next text phile...look for it!!) Anyway.....when
|
||||||
|
you get your FM walkie talkie, you can do one of two things:
|
||||||
|
|
||||||
|
A) You can play the adjust the coils trick as mentioned in the last article
|
||||||
|
(there is no VFO because walkie talkies are crystal controlled).
|
||||||
|
|
||||||
|
B) You can change the crystal. Popular frequencies for cordless phones are
|
||||||
|
49.830, 49.860 and 49.890 MHz. These crystals can be obtained from electronic
|
||||||
|
supply houses (like ones that sell chips for your Apple) for about $2 or less
|
||||||
|
each.
|
||||||
|
|
||||||
|
And that just about concludes this phile. There are two other shortcut
|
||||||
|
methods that can be used to bypass this mess and get you listening in right
|
||||||
|
away.
|
||||||
|
|
||||||
|
1) Get a general coverage receiver. They cover all frequencies from 100 kHz
|
||||||
|
to 30 MHz, and will provide you with 'armchair' reception because you can hook
|
||||||
|
up a monster antenna. (I have a 1964 vintage model that I got for $10 sitting
|
||||||
|
on my desk with a 600 foot long piece of wire for an antenna....boy, I know
|
||||||
|
everything in my neighborhood before the ladies start gossiping!)
|
||||||
|
|
||||||
|
2) If you play guitar or bass, and have a 'wireless' system for your guitar
|
||||||
|
like the Nagy 49R, you can hook up a 12 volt lantern battery and go prowling
|
||||||
|
around listening for the phones. (Bass rules!)
|
||||||
|
|
||||||
|
Method 1 only works on the old phones because of the frequency limitations of
|
||||||
|
the reciever, and method 2 is for new phones only because the 'wireless' systems
|
||||||
|
only work on 49 MHz FM.
|
||||||
|
|
||||||
|
Have phun with your new knowledge, and look for more philes from me in the
|
||||||
|
future (that CB FM is a good idea.....hmmmm...)
|
||||||
|
|
||||||
|
|
||||||
|
)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
|
||||||
|
)( This has been on original phile by: Beowulf )(
|
||||||
|
)( Copyright June 1985 This file is for use on AE, Catsend, and )(
|
||||||
|
)( AE/BBS's only. )(
|
||||||
|
)( Call The Outhouse BBS 201-756-9575 24 hours a day! )(
|
||||||
|
)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
|
||||||
|
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||||
|
|
BIN
textfiles.com/phreak/WIRETAPPING/datatap.hac
Normal file
BIN
textfiles.com/phreak/WIRETAPPING/datatap.hac
Normal file
Binary file not shown.
61
textfiles.com/phreak/WIRETAPPING/detectbug.phk
Normal file
61
textfiles.com/phreak/WIRETAPPING/detectbug.phk
Normal file
@@ -0,0 +1,61 @@
|
|||||||
|
Title: Bugging, detecting bugs
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
[ Detecting Bugs on Home Phones ]
|
||||||
|
[ By: Dr. Jimmy and Mr. Jim ]
|
||||||
|
|
||||||
|
|
||||||
|
FIRST OF ALL TO TEST FOR BUGS, YOU NEED A VOM (MULTIMETER) THE HIGHER
|
||||||
|
THE IMPEDANCE THE BETTER (A DIGITAL WITH FET CIRCUITRY OR A VACUUM TUBE
|
||||||
|
VOLT METER IS THE BEST).
|
||||||
|
|
||||||
|
FIRST DISCONNECT THE PHONE LINE(S) AT BOTH ENDS. UNDO THE PHONE INSTRUMENT
|
||||||
|
AND HOOK IT UP TO THE ENTRY POINT OF THE PHONE LINE FROM THE OUTSIDE WORLD
|
||||||
|
(MA BELL DOES NOT LIKE YOU CUT HER OFF COMPLETELY.) THE SCHEME IS THE PHYSI-
|
||||||
|
CALLY ISOLATE YOUR HOUSE, APARTMENT, FROM THE OUTSIDE WORLD. BUT BEFORE YOU
|
||||||
|
DO THIS MEASURE THE LINE VOLTAGE (IT SHOULD BE APPROXIMATELY 48 VOLTS).
|
||||||
|
|
||||||
|
NOW WITH THE WIRES DISCONNECTED AT BOTH ENDS SET YOUR RESISTANCE SCALE TO A
|
||||||
|
HIGH READING AND MEASURE THE RESISTANCE OF THE PHONE LINE, IT SHOULD BE VERY
|
||||||
|
HIGH ON THE ORDER OF MILLION OHMS OR MORE, THIS IS THE NORMAL CONDITION,
|
||||||
|
SINCE YOU ARE MEASURING THE RESISTANCE OF AN OPEN CIRCUIT. IF IT IS MUCH LESS,
|
||||||
|
SAY 50-100KOHMS THEN YOU HAVE A DEVICE ON THE LINE THAT DOES NOT BELONG THERE,
|
||||||
|
PROBABLY A PARALLEL BUG.
|
||||||
|
|
||||||
|
NOW TWIST THE END OF THE DISCONNECTED WIRE AND GO TO THE OTHER END AND
|
||||||
|
MEASURE THE RESISTANCE OF THIS. THIS RESISTANCE SHOULD BE ABOUT ONE OHM OR
|
||||||
|
TWO AT THE MOST IN A BIG HOUSE WITH A LOT OF PHONES. IF IT IS MORE, THEN
|
||||||
|
YOU PROBABLY HAVE A SERIES BUG.
|
||||||
|
|
||||||
|
IF IN THE FIRST CASE, TAKING PARALLEL MEASUREMENTS USING A METER (NOT LED/
|
||||||
|
LCD) AND YOU NOTICE A "KICK" IN THE NEEDLE, YOU PROBABLY HAVE A LINE TAP
|
||||||
|
|
||||||
|
NOW IF YOU ALSO MAKE A MEASUREMENT WITH THE WIRE END TWISTED TOGETHER AND YOU
|
||||||
|
NOTICE THE RESISTANCE READS ABOUT 1-2KOHMS, THEN YOU MAY HAVE A DROP-OUT
|
||||||
|
RELAY. A DROP-OUT RELAY IS A RELAY THAT SENSES A PHONE GOING OFF HOOK, AND
|
||||||
|
SIGNALS A TAPE RECORDER TO START RECORDING.
|
||||||
|
|
||||||
|
ANOTHER TEST TO DO WITH THE PHONES STIL HOOKED UP TO THE OUTSIDE WORLD, ON HOOK
|
||||||
|
VOLTAGE IS ABOUT 48 VOLTS AND OFF HOOK IS ABOUT 6-10 VOLTS. ANY OTHER CON-
|
||||||
|
DITIONS MAY MEAN TELEPHONE SURVEILLANCE
|
||||||
|
|
||||||
|
IF YOU USE A WIDE RANGE AUDIO FREQUENCY GENERATOR AND CALL YOU HOUSE, APARTMENT
|
||||||
|
ETC. FROM ANOTHER PHONE AND SWEEP UP AN DOWN TE SPECTRUM, AND YOU NOTICE THE
|
||||||
|
PHONE ANSWERS ITSELF SOMEWHERE IN THE SWEEP YOU PROBABLY HAVE AN INFINITY
|
||||||
|
TRANSMITTER ON YOUR LINE.
|
||||||
|
|
||||||
|
THE ABOVE INFORMATION TELLS NOTHING BUT TELCO TAPS AT THE CENTRAL OFFICE,
|
||||||
|
OR ANYWHERE ELSE ALONG THE LINE, BUT THIS INFORMATION MAY TELL YOU THAT YOUR
|
||||||
|
WIFE, GIRLFRIEND(BOYFRIEND), OR BUSINES ASSOCIATE MAY BE MONITORING YOUR PHONE
|
||||||
|
ACTIVITIES.
|
||||||
|
|
||||||
|
AN INFINITY TRANSMITTER,IS A NEAT DEVICE IT ALLOWS YOU TO CALL THE BUGGED PLACE
|
||||||
|
AND IT SHUTS OFF THE RINGER AND DEFEATS THE SWITCHHOOK, SO THE MOUTHPIECE NOW
|
||||||
|
BECOMES A ROOM BUG. IT WAS ORGINALLY SOLD FROM THE TRAVELLING BUSINESS MAN
|
||||||
|
TO MAKE SURE HIS WIFE WAS SAFE AT HOME NOT BEING ATTAKCED...
|
||||||
|
|
||||||
|
[ DETECTING PHONE BUGS - DR. JIMMY & MR. JIM ]
|
||||||
|
|
||||||
|
|
||||||
|
Downloaded From P-80 International Information Systems 304-744-2253
|
95
textfiles.com/phreak/WIRETAPPING/dltp1.txt
Normal file
95
textfiles.com/phreak/WIRETAPPING/dltp1.txt
Normal file
@@ -0,0 +1,95 @@
|
|||||||
|
|
||||||
|
|
||||||
|
MAD! PRESENTS...
|
||||||
|
|
||||||
|
A C-NET COMPATABLE MAD! FILE.
|
||||||
|
|
||||||
|
DETECTING LINE TAPS
|
||||||
|
PART #1
|
||||||
|
|
||||||
|
THE INFORMATION PRESENTED IN THE FOLLOWING FILE IS FOR ENTERTAINMENT PURPOSES ONLY.
|
||||||
|
IT IS NOT FOR CHILDREN OR THE MENTALLY UNBALANCED. THE AUTHORS OF THIS FILE TAKE NO
|
||||||
|
RESPONSIBILITY FOR ANY OF ITS CONTENTS.
|
||||||
|
|
||||||
|
|
||||||
|
INTRODUCTION BY THE COMMODORE KID.
|
||||||
|
|
||||||
|
WITH THE FBI WATCHING US ALL THE TIME, YOU CAN NEVER BE SURE IF ITS SAFE TO SAY
|
||||||
|
SOMETHING. EVEN IF YOUR NOT INTO GOOD STUFF, ITS STILL NICE TO KNOW THAT YOUR THE ONLY
|
||||||
|
ONE ON THE PHONE. YOU DON'T WANT YOUR SISTER LISTENING IN ON YOU. IT IS ALSO WELL
|
||||||
|
KNOWN THAT ALOT OF THE MAJOR BBS'S ARE BEING MONITORED BY THE FEDS. WELL, WE HOPE
|
||||||
|
THAT THE INFORMATION PRESENTED HERE WILL ALLOW YOU TO FEEL SAFER ON YOUR TELEPHONE.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
MOST TELEPHONE SURVEILLANCE DEVICES USED ON HACKERS NUMBERS ARE VERY SIMPLE. THEY
|
||||||
|
USUALLY SAVE THE GOOD STUFF FOR SPYS AND PEOPLE LIKE THAT. IT IS IMPOSSIBLE TO TELL
|
||||||
|
IF THE GOOD STUFF IS ON, BUT WE HAVE LISTED WAYS TO DETECT SOME OF THE CHEAPER MACHINES,
|
||||||
|
AND IN SOME CASES HOW TO SHUT THEM OFF OR SCREW THEM UP.
|
||||||
|
|
||||||
|
THE MLT-2. THIS DEVICE IS ONE OF THE MAINSTAYS OF BS (BELL SECURITY). ITS MAIN
|
||||||
|
WEAKNESS IS IN THAT GIVE TONES TO DO ITS OPERATION. A FRIEND OF MAD!'S IS CURRENTLY
|
||||||
|
WORKING ON A DEVICE HE PLANS TO CALL A PURPLE BOX THAT WILL DETECT THESE TONES. YOU
|
||||||
|
WILL JUST BE ABLE TO KEEP IT ON, AND IT WILL REPORT ON ANY SUCH TONES. WE WILL KEEP
|
||||||
|
YOU UPDATED IN FUTURE FILES. OK, IF THE MLT-2 IS IN MON (MONITOR) MODE, YOU CAN DO THE
|
||||||
|
FOLLOWING: A GOOD OLD LOUD 2600HZ WILL USUALLY SWITCH IT TO LOOP MODE. SOME TIMES A
|
||||||
|
7200 WILL EXECUTE A TT (DIAL MODE). THESE WILL GET THEM OFF YOUR BACK FOR A WHILE.
|
||||||
|
IF YOU OWN A MLT-2 ALSO, YOU CAN DAMAGE THE OTHER MLT-2. FIRST GET THE OTHER MLT-2 INTO
|
||||||
|
LOOP MODE. NOW WAIT TILL IT GETS TO LIN (TEST THE INSIDE PART OF THE LOOP). NOW DO
|
||||||
|
A K2. THIS WILL PUT THE MLT-2 INTO A STATE OF LIMBO. NOW TO FINISH UP, DO A MLT SOAK
|
||||||
|
TEST. THIS WILL PUT THE OFFENDING MACHINE OUT OF COMMISSION FOR A LITTLE WHILE. IF
|
||||||
|
YOU HAVE AN OMEGA BOX (NICE LITTLE THINGS), A FLAT TONE WILL PUT THE MLT-2 INTO A LRM
|
||||||
|
(FAST LOOP MEASUREMENT), THUS GETTING IT OFF YOUR LINE).
|
||||||
|
|
||||||
|
|
||||||
|
CONDUCTER TAGGER AND ANALYZER TEST.
|
||||||
|
|
||||||
|
THIS WILL SHOW YOU APPROXAMATLY HOW MANY PEOPLE ARE ON A LINE. FIRST YOU NEED TO HOOK
|
||||||
|
A VOLT/OHMS METER UP TO THE PHONE BOX IN YOUR WALL. HOOK THE LINE AND THE GROUND UP
|
||||||
|
TO THE RED AND GREEN WIRES. YOU CAN USE ONE MADE FOR IT, OR YOU CAN MODITY THE KIND
|
||||||
|
YOU USE TO CHECK BATTERYS BY PUTTING ALIGATOR CLIPS ON IT. NOW THE VOLT METER WILL RISE
|
||||||
|
AN FALL DEPENDING ON HOW MANY PEOPLE PICK UP THE PHONE, AND HOW GOOD THE CONNECTION IS.
|
||||||
|
IF YOUR SISTER PICKS UP THE PHONE, IT WILL FALL. IT PICKS UP OPERATORS, AND WHATEVER.
|
||||||
|
MOST OF THE CHEAPER TAPPING MACHINES WILL BE DETECTABLE. TAPE RECORDERS CAN ALSO BE
|
||||||
|
DETECTED. EVEN A PERSON ON A TEST PHONE WILL SHOW UP. ITS A GREAT TOOL. TRY USINGIT ON CONFERENCES SOME TIME.
|
||||||
|
|
||||||
|
IF YOU HAVE FRIENDS (OR ENEMYS) THAT LIKE TO LISTEN TO THEIR PHONE CONVERSATION OUT
|
||||||
|
A PHONE BOXES WITH TEST PHONE THERES SOMETHING YOU CAN DO ABOUT IT. THE FOLLOWING
|
||||||
|
INFORMATION COMES FROM ABBIE HOFFMAN AND GEORGE HAYDUKE IN THE CLASSIC BOOK 'GETTING
|
||||||
|
EVEN' THE COMPLETE BOOK OF DIRTY TRICKS.
|
||||||
|
|
||||||
|
CUT THE FEMALE END OFF AN ORDINARY EXTENSION CORD. UNSCREW THE MOUTHPIECE ON THE
|
||||||
|
TELEPHONE. YOU WILL SEE A TERMINAL FOR A RED WIRE AND ONE FOR A BLACK. ATTACH ONE OF
|
||||||
|
THE WIRES FROM THE EXTENSION CORD TO THE RED, AND ONE TO THE BLACK. NOW PLUG THE
|
||||||
|
EXTENSION CORD INTO A POWER SOCKET. ACCORDING TO HOFFMAN YOU ARE SENDING 20 VOLTS OF
|
||||||
|
ELECTRICITY BACK THROUGH EQUIPMENT MADE FOR 6 VOLTS. FIZZ.
|
||||||
|
|
||||||
|
|
||||||
|
NOTE! MAD! SUGGESTS YOU DO NOT TRY THIS. IT IS NOT RESPONSIBLY FOR ANY DAMAGE DONE TO
|
||||||
|
PHONE EQUIPMENT, OR TO YOU. ACTUALLY YOU WOULD BE SENDING 110 VOLTS THROUGH EQUIPMENT
|
||||||
|
MADE FOR 48. IF YOU ARE REALLY SERIOUS ABOUT DOING THIS, WE SUGGEST YOU GET A
|
||||||
|
TRANSFORMER TO STEP THE VOLTAGE LEVEL DOWN.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
ANY INFOMATION THAT IS PASSED OVER PHONE LINE CAN BE INTERCEPTED BY THE PHONE COMPANY.
|
||||||
|
THIS INCLUDES MODEM SIGNALS. REMEMBER, THEY INVENTED ALL THAT STUFF. IN PART TWO WE
|
||||||
|
WILL EXAMINE WAYS TO STOP THEM FROM MONITORING BBS'S AND EXAMINE OTHER EQUIPMENT.
|
||||||
|
|
||||||
|
|
||||||
|
THIS FILE WAS WRITTEN BY THE TRIO.
|
||||||
|
THE COMMODORE KID
|
||||||
|
DEATH-STALKER
|
||||||
|
MR. C0SMOS
|
||||||
|
|
||||||
|
GUEST WRITERS THIS WEEK WERE M, QVI, PHONE BANDIT, THE GREMLIN, AND EXORCIST.
|
||||||
|
|
||||||
|
MAD! IS A GROUP DEVOTED TO G-FILES. IF YOU HAVE ANY QUESTIONS, OR THERE IS ANYTHING
|
||||||
|
YOU WANT US TO WRITE ABOUT, CONTACT US AT MAD! WORLD HEADQUARTERS- PC MAIN (313)
|
||||||
|
386-4698
|
||||||
|
|
||||||
|
8/20/85
|
||||||
|
|
||||||
|
CALL THE CIA FOR ALL MAD FILES
|
||||||
|
607-324-0197 TELL'EM MAD SENT YA'
|
||||||
|
|
98
textfiles.com/phreak/WIRETAPPING/dltp2.txt
Normal file
98
textfiles.com/phreak/WIRETAPPING/dltp2.txt
Normal file
@@ -0,0 +1,98 @@
|
|||||||
|
|
||||||
|
MAD! PRESENTS...
|
||||||
|
|
||||||
|
A C-NET COMPATABLE MAD! FILE.
|
||||||
|
|
||||||
|
DETECTING LINE TAPS PART 2
|
||||||
|
|
||||||
|
|
||||||
|
THE INFORMATION PRESENTED IN THE FOLLOWING FILE IS FOR ENTERTAINMENT PURPOSES ONLY.
|
||||||
|
IT IS NOT FOR CHILDREN OR THE MENTALLY UNBALANCED. THE AUTHORS OF THIS FILE TAKE NO
|
||||||
|
RESPONSIBILITY FOR ANY OF ITS CONTENTS.
|
||||||
|
|
||||||
|
|
||||||
|
THANKS TO MR. X OF A BELL COMPANY WE HAVE LEARNED HOW TO DEFEAT MOST SURVEILLANCE
|
||||||
|
DEVICES USING BLUE/OMEGA BOXES. THE BLUES RANGE IS VERY LIMITED, BUT THE OMEGA BOXES
|
||||||
|
COVERS MOST OF THEM. SEE MAD!'S NEW OMEGA BOX HANDBOOK FOR MORE INFO.
|
||||||
|
|
||||||
|
DEVICE NAME RANGE TONE
|
||||||
|
NOTES.
|
||||||
|
|
||||||
|
MLT-2 1400-7200 4800
|
||||||
|
SEE DETECTING TAPS #1
|
||||||
|
|
||||||
|
MLT-1 1400-6400 1200
|
||||||
|
|
||||||
|
AT&T SCANCAT 900-1200 2600
|
||||||
|
SEE SCANNER BY CAN-AM PIRATING
|
||||||
|
NETWORK
|
||||||
|
|
||||||
|
SCANCAT 2 1200-2600 2600
|
||||||
|
|
||||||
|
ADS SCANNING SYSTEM 2600-4800 12000
|
||||||
|
|
||||||
|
BELL 1021 7200 12000
|
||||||
|
|
||||||
|
BELL 1100 400-800+1200-7200 GOLD 2600
|
||||||
|
SEE OMEGA BOX HANDBOOK AND FUN/OMEGA BOXES 1-2
|
||||||
|
|
||||||
|
MACE(NICKNAME IF YOU KNOW THE REAL NAME TO THIS MACHINE, PLEASE GIVE IT TO US.)
|
||||||
|
6200 GOLD 6200
|
||||||
|
THIS DOESN'T ALWAYS WORK.
|
||||||
|
|
||||||
|
ADS MONITORING TEST.
|
||||||
|
|
||||||
|
ADS IS THE NEW TRACE/MONITORING TEST BEING USED BY AT&T, MCI, SOON SPRINT, AND MORE.
|
||||||
|
IT IS VERY FAST AND ACCURATE, BUT IT HAS MANY MANY FAULTS.
|
||||||
|
|
||||||
|
AFTER MUCH TESTING WE FOUND THAT IF YOU DO A 7200 AND ADS IS ON THE LINE, A VOLT METER
|
||||||
|
WILL GO GO CRAZY. A SIMPLE GOLD WILL MAKE A POP IF ADS IS ON THE LINE. FOR A LOT
|
||||||
|
MORE ON ADS SEE MAD!'S UPCOMING DETECTING LINE TRACES.
|
||||||
|
|
||||||
|
TAP TEST NUMBERS
|
||||||
|
|
||||||
|
LATELY MAD! HAS AS BEEN SEEING ALOT OF THOSE TAP TEST #'S. OUR FRIENDS AT THE PHONECOMPANY SAID THERE ARE SUCH #'S, BUT THEY WILL ONLY DETECT CERTAIN THINGS. HERES A
|
||||||
|
SMALL LIST. MAD! IS NOT SURE IF THEY WORK, AND DIDN'T HAVE TIME TO TEST THEM. WE
|
||||||
|
WILL PRINT THE RESULTS IN AN UPCOMING FILE. IF THEY DO, WE WILL PRINT ABOUT 25 OF
|
||||||
|
THEM.
|
||||||
|
|
||||||
|
THIS CAME FROM SOMEONE NAMED HACKER SMITH, BUT WERE NOT SURE WHAT SYSTEM. HERE IT IS...
|
||||||
|
|
||||||
|
|
||||||
|
I GOT A # TO SEE IF YOUR BEING TRACED. WHEN YOU CALL IT USING YOUR PHREAKING
|
||||||
|
SERVICE,YOU SHOULD HEAR A TONE THAT GOES UP IN FREQUENCY,THAT MEANS YOUR NOT BEING
|
||||||
|
TRACED. IF YOU HEAR A STEADY TONE, THEN YOUR BEING TRACED AN YOU'D BETTER HANG UP IN
|
||||||
|
LESS THAN 30 SECONDS OR YOU RUN THE RISK OF BEING TRACED...THE # IS 617-890-9900.
|
||||||
|
ENJOY,
|
||||||
|
HACKER SMITH
|
||||||
|
|
||||||
|
ALSO YOU SEE THE NUMBER POSTED AROUND 200-XXX-XXXX. THIS IS A ADS SYSTEM USED BY BELL
|
||||||
|
LINEMEN FROM PHONE BOXES (SEE THE MAD! FILE ON TEST PHONES FOR INFO ON PHONE BOXING.).
|
||||||
|
IT IS NOT A TRACE TEST AT ALL.
|
||||||
|
|
||||||
|
THERE MAY OR MAY NOT BE A DETECTING TAPS 3, DEPENDING ON HOW MUCH MORE INFO WE GET.
|
||||||
|
WATCH FOR DETECTING LINE TRACES COMING SOON TO A BBS NEAR YOU.
|
||||||
|
|
||||||
|
THIS FILE WAS WRITTEN BY THE MAD!
|
||||||
|
BULLPEN.
|
||||||
|
|
||||||
|
THE COMMODORE KID <CK> COMPLIER WRITER MR. C0SMOS <APPLE CAT> ELECTRONICS INFO WRITER
|
||||||
|
|
||||||
|
THE GREMLIN <THE NEXT PRESIDENT OF THE UNITED STATES> THE WORLDS GREATEST EXPERT ON
|
||||||
|
THE OMEGA BOX
|
||||||
|
MR. X <A BELL EMPLOYEE WHOS ONE OF US> TELEPHONE INFORMATION
|
||||||
|
|
||||||
|
AND THE MANY PEOPLE WHO HELP US OUT... DEATH-STALKER THE DEFENDER DEMON PHONE BANDIT
|
||||||
|
MR. Y 8-BALL AND MANY MANY MORE.
|
||||||
|
|
||||||
|
MAD! IS A GROUP DEVOTED TO G-FILES. TO CONTACT US CALL THE MAD! MAILBOX ON THE ? MAIN
|
||||||
|
BBS (313)-278-9629 OR PIRATES CORNER 1 (313)-386-4698.
|
||||||
|
|
||||||
|
9-9-85
|
||||||
|
|
||||||
|
CALL THE CIA 607-324-0197 FOR ALL
|
||||||
|
THE MAD FILES AND TELL THEM
|
||||||
|
RITZ CRACKER SENT YA'
|
||||||
|
|
||||||
|
|
||||||
|
|
316
textfiles.com/phreak/WIRETAPPING/eaves1.txt
Normal file
316
textfiles.com/phreak/WIRETAPPING/eaves1.txt
Normal file
@@ -0,0 +1,316 @@
|
|||||||
|
12/19/91 11:14pm
|
||||||
|
|
||||||
|
Basic Eavesdropping #1
|
||||||
|
The Electronic Ear
|
||||||
|
------------------
|
||||||
|
Written By The Freddy
|
||||||
|
In Association With The National Newtwork of Anarchists and Nihilists (NNAN)
|
||||||
|
|
||||||
|
Introduction
|
||||||
|
------------
|
||||||
|
This text file is the first in a series on the topic of eaves-
|
||||||
|
dropping. My trusty Webster's Compact Dictionary defines eavesdropping as
|
||||||
|
the art of listening secretly. This can be useful to the young anarchist
|
||||||
|
in many ways. Suppose that, as a beginning phreak, you are given the
|
||||||
|
undubious assignment of being the lookout. Well, you want to hear the
|
||||||
|
guard coming while being as far away as possible. Or you stake out your
|
||||||
|
mark's house to find out as much as you can before you get your revenge.
|
||||||
|
Well, again, you want to hear as much as possible without making yourself
|
||||||
|
known. To find out how to properly accomplish these and many other tasks,
|
||||||
|
read on.
|
||||||
|
|
||||||
|
Disclaimer
|
||||||
|
----------
|
||||||
|
This document was intended for informational purposes ONLY, the author and
|
||||||
|
the National Network of Anarchists and Nihilists do not endorse or support
|
||||||
|
any illegal action presented here or in any other documents which we
|
||||||
|
release. The only motivation for the writing of this document is purely
|
||||||
|
for educating the general public. The author and the National Network of
|
||||||
|
Anarchists and Nihilists will not be held responsible for any actions by
|
||||||
|
the reader of this document.
|
||||||
|
|
||||||
|
Description
|
||||||
|
-----------
|
||||||
|
The Electronic Ear is alot like those "high tech" Listenaiders
|
||||||
|
which boost sound. Think of the possibilities. With the Electronic Ear
|
||||||
|
you can hear whispers 500 feet away or a conversation half a block away.
|
||||||
|
You can listen in and record for all posterity the conversation on the tape
|
||||||
|
of your choise. Of course, it is illegal to listen in on and/or record a
|
||||||
|
conversation without the permission of the parties doing the conversing.
|
||||||
|
Two versions will be presented. One that uses a parabolic dish (like on
|
||||||
|
satellites); the other uses a highly directional shotgun microphone. Both
|
||||||
|
use the same easy to build superamplifier circuit.
|
||||||
|
|
||||||
|
Parts List
|
||||||
|
----------
|
||||||
|
Amplifier Circuit
|
||||||
|
-----------------
|
||||||
|
R1 10 k-ohm resistor
|
||||||
|
R2 100 ohm resistor
|
||||||
|
R3 4.7 M-ohm resistor
|
||||||
|
R4,R6 3.3 k-ohm resistor
|
||||||
|
R5 220 ohm resistor
|
||||||
|
C1 220 pF disc
|
||||||
|
C2,C3,C5 0.47 <20>F disc
|
||||||
|
C4 1.0 <20>F polarized electrolytic
|
||||||
|
IC1 LM387 integrated amplifier IC
|
||||||
|
D1 1N34A
|
||||||
|
S1 SPST switch
|
||||||
|
Mike Electret condenser microphone
|
||||||
|
(1) Project box, 2 3/4 by 5 1/8 by 1 3/4
|
||||||
|
(1) 1/8 inch microphone input audio jack
|
||||||
|
(1) 1/8 inch sound output audio jack
|
||||||
|
|
||||||
|
All resistors are 5 to 10 percent tolerance, 1/4 watt.
|
||||||
|
All capacitors are 10 to 20 percent tolerance, rated at 35 volts or more.
|
||||||
|
LM387 amp is available in kit form from:
|
||||||
|
|
||||||
|
ALLEGRO ELECTRONICS SYSTEMS
|
||||||
|
3E MINE MOUNTAIN
|
||||||
|
CORNWALL BRIDGE, CT 06754
|
||||||
|
(203)672-0123
|
||||||
|
|
||||||
|
Mail order company. Catalog available.
|
||||||
|
|
||||||
|
Construction Of The Amplifier Circuit
|
||||||
|
-------------------------------------
|
||||||
|
The Amplifier Circuit is based on an LM387 dual preamp IC. In
|
||||||
|
layman's terms, the preamp first increases the amplification from the
|
||||||
|
microphone about 47,000 times, and then limits the audio signals of only 1
|
||||||
|
volt peak to peak or less to go to the output jack. This will save your
|
||||||
|
ears in case one of your less scrupulous friends shoots a cap gun in front
|
||||||
|
of the mike. Use a universal solder board for the circuit.
|
||||||
|
Construction is pretty straightforward. I have included both the
|
||||||
|
schematic and a picture of what the finished circuit should look like.
|
||||||
|
|
||||||
|
Schematic Of The Amplifier Circuit
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
C6 220pF o To tape Power supply
|
||||||
|
----|(--ground | circuit decoupling/filtering
|
||||||
|
| C5 \./ or C2
|
||||||
|
| .47 <20>F --- headphone ---|(---
|
||||||
|
| | amp | .1<EFBFBD>F |
|
||||||
|
| ----o----------------o V+ o--o--|(--o--ground
|
||||||
|
| | | | C1
|
||||||
|
| D1 \/ | | 1000<30>F
|
||||||
|
| 1N34A - | |
|
||||||
|
| | | | Recorder interface
|
||||||
|
|___________o | | J1
|
||||||
|
| | | (o)------
|
||||||
|
R5 / / R6 | Tip| |
|
||||||
|
220 ohm \ \ 3.3 k-ohm |5 \/ |
|
||||||
|
/ / /\ ---/\/\/\/---o--ground
|
||||||
|
\ \ / \ | R1
|
||||||
|
| | / \ o 10 k-ohm
|
||||||
|
S1 ----o 6 / IC1b \ 3
|
||||||
|
o-o /o--o-------| -------/ LM387 \-------o-ground
|
||||||
|
/ | | /--------------------\ |
|
||||||
|
| | |7 |8 C4 1.0 <20>F|
|
||||||
|
| | | | + |
|
||||||
|
| |------------o |----o---|(---
|
||||||
|
| | |
|
||||||
|
| R4 / |
|
||||||
|
| 3.3 k-ohm \ |
|
||||||
|
| / |
|
||||||
|
| \ |
|
||||||
|
| | |
|
||||||
|
| \./ C3 |
|
||||||
|
| ---.47 <20>F |
|
||||||
|
| +| | Headphone amp
|
||||||
|
| | | J1
|
||||||
|
| ------------------o | (o)-------
|
||||||
|
| | 4| | Tip| |
|
||||||
|
| / /\ | | |
|
||||||
|
| \ R3 / \ | C2 \./ |
|
||||||
|
| / 4.7 M-ohm / \ | 4.7<EFBFBD>F --- |
|
||||||
|
| \ / IC1a \ | | C1 |
|
||||||
|
| | / LM387 \ | | .1<EFBFBD>F |
|
||||||
|
| | /-------------------\ | o--|(---o
|
||||||
|
| | 2| 1| | Q1 | |
|
||||||
|
| --------------o --------- 2N2222 | |
|
||||||
|
| | c e | R4 |
|
||||||
|
| R2 / V+ o------o----\ /--o-\/\/\-o-ground
|
||||||
|
| 100 ohm \ | \/ 1 k-ohm|
|
||||||
|
| / R2 / ---- \
|
||||||
|
| \ 22 k-ohm\ b| R3 /
|
||||||
|
| | / | 27 k-ohm\
|
||||||
|
| C2 \./ \ | /
|
||||||
|
| .47 <20>F --- C1 --------o-------------
|
||||||
|
| R1 | 220 pF \
|
||||||
|
|----\/\/\/\-----o----|(------- / R1
|
||||||
|
10 k-ohm | | \ 1 k-ohm
|
||||||
|
| ---------o---ground /
|
||||||
|
| | |
|
||||||
|
Mike o
|
||||||
|
|
||||||
|
Suggested Parts Layout
|
||||||
|
----------------------
|
||||||
|
Headphnone Mike Jack
|
||||||
|
Jack_____ _____
|
||||||
|
--| |-----| |------------------------------------------------
|
||||||
|
| | | | | -------- |
|
||||||
|
ON/OFF | --- --- _____|______|____ |
|
||||||
|
switch --- ______________________________________ | | |
|
||||||
|
O--| | | __________ | | | |
|
||||||
|
--- | -|__________|- _|_ _|_ | | | |
|
||||||
|
| | | | | | | | | |
|
||||||
|
| | ____/------------\____ | | | | | | | |
|
||||||
|
| | \------------/ | | | | | | Battery | |
|
||||||
|
| | | | | | | | | |
|
||||||
|
| | _|_ -|- -|- | | | |
|
||||||
|
| | | | _ _ _ _ | | | |
|
||||||
|
| | | | _|_|_|_|_|_|_|_|_ | | | |
|
||||||
|
| | | | | | | | | |
|
||||||
|
| | | | | | | | | |
|
||||||
|
| | -|- |_______________| | | | |
|
||||||
|
| | |_| |_| |_| |_| | | | |
|
||||||
|
| | Circuit board | | | |
|
||||||
|
| -------------------------------------- | | |
|
||||||
|
| ----------------- |
|
||||||
|
|_______________________________________________________________|
|
||||||
|
|
||||||
|
|
||||||
|
Notes
|
||||||
|
-----
|
||||||
|
If you cannot understand the schematic, then get a friend to make
|
||||||
|
it for you. You should be able to build the circuit with a minimal amount
|
||||||
|
of electrical experiance.
|
||||||
|
If you plan to connect the output to the line input of a tape
|
||||||
|
recorder, use a 10 k-ohm potentiometer as a level control and be sure to
|
||||||
|
use shielded cable to reduce unwanted hiss.
|
||||||
|
Test the circuit before building the rest of the Electronic Ear.
|
||||||
|
Connect a electret condenser mike to the input jack and a pair of
|
||||||
|
headphones to the output. Don't put the headphones directly over your
|
||||||
|
ears. I found this out the hard way. Turn the circuit on and listen for
|
||||||
|
the squealing sound of the oscillating circuit. If you don't hear it, go
|
||||||
|
to the next step. If there is an oscillation problem, increase the value
|
||||||
|
of C6 to 330 pF or 470 pF. Also try increasing R5 from 220 ohms to a
|
||||||
|
higher value that will reduce or eliminate oscillation, but it will also
|
||||||
|
decrease the gain of the circuit. If oscillation is still a problem, then
|
||||||
|
try replacing R3 with a 1.5 m-ohm resistor. This should decrease the
|
||||||
|
overall gain of the circuit.
|
||||||
|
|
||||||
|
The Parabolic Dish
|
||||||
|
------------------
|
||||||
|
Parts List
|
||||||
|
----------
|
||||||
|
1 Spun aluminum or plastic parabolic dish
|
||||||
|
1 10 inch length of 12 gauge wire
|
||||||
|
2 #12 crimp on connector
|
||||||
|
|
||||||
|
Dish available from:
|
||||||
|
|
||||||
|
EDMUND SCIENTIFIC CO
|
||||||
|
P.O. BOX 5408
|
||||||
|
SCOTTSDALE, AZ 85261
|
||||||
|
(609)573-6250
|
||||||
|
|
||||||
|
Mail order company. Catalog available.
|
||||||
|
|
||||||
|
Construction Of The Parabolic Dish
|
||||||
|
----------------------------------
|
||||||
|
The most effective way of tuning in on distant sounds is to use a
|
||||||
|
parabolic dish. I used an 18 inch diameter dish purchased surplus from
|
||||||
|
Edmund Scientific. Other dishes, both metal and plastic, will do.
|
||||||
|
The microphone must be positioned at the focal point of the dish.
|
||||||
|
You could use the complicated algebra method, but an easier way is to
|
||||||
|
position the dish in full sunlight and move small piece of paper in and
|
||||||
|
out of the center until you see a small, bright spot. Measure the distance
|
||||||
|
from the paper to the base of the dish and you have the focal point. If
|
||||||
|
the dish is not reflective, try covering it with aluminum foil.
|
||||||
|
You want to mount the microphone to a standoff. This can be made
|
||||||
|
from a coat hanger adjusted to fine tune the focal point. The microphone
|
||||||
|
should be physically insulated from the standoff using double sided tape.
|
||||||
|
The finished standoff and mike should look like this:
|
||||||
|
|
||||||
|
_________
|
||||||
|
/ \
|
||||||
|
| \
|
||||||
|
| |
|
||||||
|
| |-|
|
||||||
|
Coat | | | Crimp-on spade
|
||||||
|
hanger | | | connector (bend
|
||||||
|
bent | --|-| out tongue)
|
||||||
|
to |
|
||||||
|
shape |
|
||||||
|
|
|
||||||
|
|
|
||||||
|
|
|
||||||
|
|
|
||||||
|
|-|
|
||||||
|
| | Crimp-on spade
|
||||||
|
| | connector
|
||||||
|
|-|
|
||||||
|
|
|
||||||
|
|
||||||
|
Attach the amplifier to the side of the dish using some hardware or
|
||||||
|
double sided tape.
|
||||||
|
Paint the dish flat black so it does not glint in the sunlight.
|
||||||
|
Also, add a 1/4" 20 bolt and sleeve coupling to one side of the dish to
|
||||||
|
provide a meansto secure it to a tripod. This works quite well.
|
||||||
|
|
||||||
|
_
|
||||||
|
/
|
||||||
|
/ Parabolic
|
||||||
|
/ dish
|
||||||
|
Amplifier /
|
||||||
|
circuit /
|
||||||
|
|---/
|
||||||
|
| |
|
||||||
|
| |--\ o\
|
||||||
|
| | \-----/
|
||||||
|
|---\
|
||||||
|
\
|
||||||
|
\
|
||||||
|
\
|
||||||
|
/\\
|
||||||
|
/ \\_
|
||||||
|
\ /
|
||||||
|
|__|
|
||||||
|
/ \
|
||||||
|
/ \ Tripod
|
||||||
|
/ /\ \
|
||||||
|
|
||||||
|
The Shotgun Mike
|
||||||
|
----------------
|
||||||
|
Parts List
|
||||||
|
----------
|
||||||
|
1 40 inch lenght of 4 inch PVC or ABS plastic pipe
|
||||||
|
1 4 inch end cap to fit onto one end of pipe
|
||||||
|
1 3 inch round speaker (replaces Mike)
|
||||||
|
|
||||||
|
Construction Of The Shotgun Mike
|
||||||
|
--------------------------------
|
||||||
|
The Shotgun Mike is cheaper to build than the parabolic dish. It
|
||||||
|
does not collect as much sound, though, but it is more directional.
|
||||||
|
The speaker needs to be physically isolated from the tube to reduce
|
||||||
|
the effects of vibration. I have found that a pice of 2 inch thick foam
|
||||||
|
cut to 4 1/2 inches in diameter works well. Punch or cut out a small
|
||||||
|
circle in the center so it looks like a doughnut.
|
||||||
|
Solder an 8 inch length of shielded cable to the terminals of the
|
||||||
|
speaker. Press the magnet of the speaker through the small hole and slip
|
||||||
|
the foam and speaker into one end of the tube.
|
||||||
|
Solder the other end of the speaker wire to a 1 1/8 inch plug.
|
||||||
|
Drill a hole in the end cap for the speaker wire, mount the amplifier, and
|
||||||
|
you're set. The finished product should look like this:
|
||||||
|
|
||||||
|
Amplifer PVC pipe
|
||||||
|
circuit ---------------------------------------------------
|
||||||
|
##########||----| /
|
||||||
|
##########|| F | / Speaker
|
||||||
|
##########|| o |-|
|
||||||
|
##########|| a |-|
|
||||||
|
##########|| m | \
|
||||||
|
##########||----| \
|
||||||
|
--------------------------------------------------
|
||||||
|
|
||||||
|
Conclusion
|
||||||
|
----------
|
||||||
|
Now that you know how to build an Electronic Ear, you probably want
|
||||||
|
to know how to use it. That will be upcoming in a future installment.
|
||||||
|
Until then, build one yourself. I can be reached at The DeaTh BoX
|
||||||
|
BBS--(714)970-6710--which is the home of NNAN. Well, it's getting late so
|
||||||
|
until next time, adieu.
|
||||||
|
|
||||||
|
12/24/91 1:27am
|
429
textfiles.com/phreak/WIRETAPPING/es.txt
Normal file
429
textfiles.com/phreak/WIRETAPPING/es.txt
Normal file
@@ -0,0 +1,429 @@
|
|||||||
|
Electronic bug detection
|
||||||
|
''''''''''''''''''''''''
|
||||||
|
|
||||||
|
Electronic bug detection will probably be the most difficult aspect of this entire
|
||||||
|
field, as you will be working on your own, without the aid of much useful information
|
||||||
|
that can be gathered from the telephone company or other agencies. (Most telphone bu
|
||||||
|
gs, except the sophisticated ones, can be detected by an overload on the phone line
|
||||||
|
itself) A good tool for bugging detection is a normal AM-FM radio receiver, portable,
|
||||||
|
with a telescopic antenna. For application, extend the antenna in the room suspecte
|
||||||
|
d of being bugged and tune the receiver carefully from the bottom to the top, covering
|
||||||
|
all the FM frequencies, at the same time, talking to yourself continually. At one
|
||||||
|
point, if a bug is present, you will be able to hear your voice through the receiver,
|
||||||
|
although the voice may be indistishguishable, because of top volume feedback. This
|
||||||
|
feedback will always be a deafening continuous howl, scream, or high-pitched whistle.
|
||||||
|
To learn the exact location of the bug, cut the volume of the receiver, and slowly
|
||||||
|
move around the room. The feedback will increase in volume as you get closer to the
|
||||||
|
bug. When a bug is discovered, there is a moment of confusion and fear in reguards to
|
||||||
|
its elimination. In one sense, destroying a bug is an admission of guilt, and can
|
||||||
|
do nothing more than provoke the enemy to rebug in a more sophisticated manner. For
|
||||||
|
that reason, I would hesitate to remove a bug. Instead I would attempt to use it
|
||||||
|
against the bugger himself, by feeding him flase and misleading information.
|
||||||
|
In some cases the bugger may have taken precautions on this type of detection and,
|
||||||
|
by readjustment of his oscillating capacitor, he may be transmitting on a range below
|
||||||
|
the sensitivity of your radio. In this case employ your television set in the same
|
||||||
|
manner as you did the radio, using the ultrahigh frequency knob. As you move across
|
||||||
|
the range of frequencies, keep your eyes on the picture, until you have found a pattern
|
||||||
|
of dark wavy lines that move in relation to your own voice, coupled with top-volum
|
||||||
|
e feedback. The actual location of the bug is a little more difficult, unless your TV
|
||||||
|
set is battery operated, but by use of several extension cords and slow movement, this
|
||||||
|
can be accomplished.
|
||||||
|
The feedback technique can also be used when the bugging involves (citizens band)
|
||||||
|
walkie-talkie. One of the simplest methods of bugging is to tape down the transmitter
|
||||||
|
button on a cheap walkie-talkie, and plant it to where the conversation is to be hel
|
||||||
|
d. The process of detection is exactly the same as above, except that, instead of using
|
||||||
|
a radio ro TV set, one uses a tunable CB receiver to check for feedback.
|
||||||
|
Although the previous "feedback technique" can be effective, it is time-consuming and
|
||||||
|
not 100 percent efficient. For these reasons, electronic experst have invented an
|
||||||
|
marketed a small meter, which detects transmitters. The interesting problem that th
|
||||||
|
ese experts have overcome was, with all the high-powered radio and TV stations
|
||||||
|
transmitting, how would it be possible for an individual to detect a low-powered
|
||||||
|
transmitter, such as a microphone? This was overcome by simply reversing the gauge.
|
||||||
|
In other
|
||||||
|
words, when the meter was "wide open,"no signal was present. However, the closer the
|
||||||
|
meter was taken to the transmitting device, the less of the reading the meter registers.
|
||||||
|
These fie~- meters are available from most large electronic companies and range
|
||||||
|
in price from about $10 to $200, depending on quality and strength.
|
||||||
|
A device similar to the "strength meter," which a Texas company has marketed, utilizes
|
||||||
|
a small bulb, which blinks only in the presence of a bug. The true value of this device
|
||||||
|
is that it is capable of seperating normal radio wave (which do not affect it
|
||||||
|
) from the dangerous radio signals emitted from a bug. It is available from Dee
|
||||||
|
Company, Houston, Texas for about $200.
|
||||||
|
If your not electronically minded, or just not equiped to find the tap on your phone,
|
||||||
|
Continental Telephone has a device that allows you, through the use of its meter, to
|
||||||
|
determineif the wire is tapped, and, if so, where it is located. Unfortunately th
|
||||||
|
is device (called "the Private Sentry) costs $250.
|
||||||
|
|
||||||
|
|
||||||
|
Electronic jamming
|
||||||
|
''''''''''''''''''
|
||||||
|
|
||||||
|
Most of the devices written about so far in this chapter are legal, with regulations
|
||||||
|
placed on their application, but the very possession of certain jamming devices is
|
||||||
|
illegal. These jamming devices basically destroy the effectiveness of a bug rather t
|
||||||
|
han locate it. The reason the FCC has put strict regulations on these is the effect
|
||||||
|
they have on other means of communications, such as completely destroying AM radio
|
||||||
|
reception, rendering TV sets useless, making communications on police band radios impos
|
||||||
|
sible, and even to some degree interfering with aircraft communications. To be truly
|
||||||
|
effective as any-bugging devices they must cover the whole spectrum of radio
|
||||||
|
frequencies, which in turn will cause interference to other outside receivers and
|
||||||
|
transmitte
|
||||||
|
rs. For this reason control is of the essence. When determining what exactly you wish
|
||||||
|
to jam, you must also determine the frequency to be used, so as not to interfere with
|
||||||
|
other signals. If you decide to use a jamming device for an illegal purpose, you
|
||||||
|
must at all cost maintain mobility. (Jamming from the back of a moving truck has been
|
||||||
|
prooven effective) Mobility is necessary, because the FCC also employs detecting and
|
||||||
|
locating devices for use against underground radio stations and unregulated jammin
|
||||||
|
g devices.
|
||||||
|
There are basically two types of jamming devices, the first of which is not
|
||||||
|
manufactured commercially and would have to be built by the individual. This type is
|
||||||
|
called "spa~-gap device," and is more powerful than the other, covering greater
|
||||||
|
distance.
|
||||||
|
The second type is refered to as "the white noise device," and is manufactured by
|
||||||
|
Continental Telephone, Dectron Industries, Inc., and Telsec, with a price range from
|
||||||
|
about $150 to $350, depending on strength.
|
||||||
|
|
||||||
|
|
||||||
|
Electronic scramblers
|
||||||
|
'''''''''''''''''''''
|
||||||
|
|
||||||
|
Electronic scramblers are devices that simply act as an an~-bug mechanisms by
|
||||||
|
transforming normal speech patterns into unintelligable sounds. The most primative
|
||||||
|
method, outdated today, is recording a message on a tape recorder, and then transmitting
|
||||||
|
it
|
||||||
|
, either by playing it backward or at a different speed. Although this method may
|
||||||
|
momentarily frustrate the bugger, if he has half a brain, it won't take him long to
|
||||||
|
decode your message. The basic principle of scramblers, or any coding device, is to
|
||||||
|
ren
|
||||||
|
der the message useless to anyone except the desired recipient in cont
|
||||||
|
|
||||||
|
There are several types of electronic scramblers, all effective but all sharing the
|
||||||
|
same disadvantage - price. The most inexpensive one I found in any catalogue ran about
|
||||||
|
$500, but then anyone with the slight knowledge of burglary will not be put off by
|
||||||
|
this obstacle. The most popular type is manufactured by Dectron, and is used as an
|
||||||
|
extension to the telephone. The spech is garbled before it enters the mouthpiece of
|
||||||
|
the phone, and decoded after it has left the receiver. A pair of these run just over
|
||||||
|
$500, but the real disadvantages to these devices is that the individual code your
|
||||||
|
devices are working with is retained in a vault by the company, so that anyone with
|
||||||
|
access to that vault can break down your security.
|
||||||
|
The second device used for scrambling is manufactured by an English company, and it
|
||||||
|
works on the principle of inverting the normal speech patterns. In other words, it
|
||||||
|
makes low notes high, and high notes low. This offers the individual a little bit mo
|
||||||
|
re security, as each person's speech frequency is as differnt as his fingerprints.
|
||||||
|
Their major disadvantage is price. It sells for between $1,000 and $1,500.
|
||||||
|
The third type of scrambler is used only for radio transmission. This device can also
|
||||||
|
be purchased through Dectron, for about the same price as mentioned before. The radio
|
||||||
|
scrambler works on basically the same principle as all other scrambling devices
|
||||||
|
, in that it inverts or disorders the frequency and pitch of the speech pattern while
|
||||||
|
it is being transmitted, and then reverses the garble to render it understandable to
|
||||||
|
the receiver.
|
||||||
|
|
||||||
|
|
||||||
|
Mail order & retail electronic outlets
|
||||||
|
''''''''''''''''''''''''''''''''''''''
|
||||||
|
|
||||||
|
I have listed below some of the major electronic mail order and retail outlets. Many
|
||||||
|
companies that sell this type of equipment do so only to police officers, and require
|
||||||
|
the purchaser to prove his relationship with some law enforcement agency. For th
|
||||||
|
at reason they have not been included. These companies listed are all involved in the
|
||||||
|
manufacturing and/or sales of eavesdropping and surveillance equipment.
|
||||||
|
|
||||||
|
S.A.C. Electronics,
|
||||||
|
4818 West Jefferson Blvd.,
|
||||||
|
Los Angeles 18, California
|
||||||
|
|
||||||
|
Baker Electronics Co.,
|
||||||
|
R.R. 3,
|
||||||
|
Greencastle, Indiana
|
||||||
|
(mail-order plans and kits only)
|
||||||
|
|
||||||
|
Dehart Electronics,
|
||||||
|
P.O. Box 5232,
|
||||||
|
Sarasota, Florida
|
||||||
|
|
||||||
|
Continental Telephone Supply Co.,
|
||||||
|
17 West 46th Street
|
||||||
|
New York, N.Y.
|
||||||
|
(fantastic catalog)
|
||||||
|
|
||||||
|
Martel Electronics Sales, Inc.,
|
||||||
|
2356 S. Cotner Ave.,
|
||||||
|
Los Angeles, California
|
||||||
|
|
||||||
|
R & S Research, Inc.,
|
||||||
|
2049 Richmond Ave.,
|
||||||
|
Houston, Texas
|
||||||
|
|
||||||
|
Mittleman Manny,
|
||||||
|
136 Liberty Street,
|
||||||
|
New York, N.Y.
|
||||||
|
(only custom devices $400 )
|
||||||
|
|
||||||
|
Clifton,
|
||||||
|
11500 N.W. 7th Ave.
|
||||||
|
Miami, Florida
|
||||||
|
|
||||||
|
Consolidated Acoustics,
|
||||||
|
1302 Washington Street,
|
||||||
|
Hoboken, N.J.
|
||||||
|
{only listening devices)
|
||||||
|
|
||||||
|
Ekkottonics Co.,
|
||||||
|
P.O. Box 5334,
|
||||||
|
Milwaukee, Wisconsin
|
||||||
|
{(che})
|
||||||
|
|
||||||
|
Dectron Industries, Inc.,
|
||||||
|
13901 Saticoy Street
|
||||||
|
Van Nuys, California
|
||||||
|
(only an~-bugging equipment)
|
||||||
|
|
||||||
|
Dee Co.,
|
||||||
|
Box 7263,
|
||||||
|
Houston, Texas 77008
|
||||||
|
|
||||||
|
T~-Tron of Dallas,
|
||||||
|
330 Casa Linda Plaza,
|
||||||
|
Dallas, Texas
|
||||||
|
{(discount bugging equipme})
|
||||||
|
|
||||||
|
Security Electronics,
|
||||||
|
11 East 43rd Street,
|
||||||
|
New York, N.Y.
|
||||||
|
|
||||||
|
Telephone Dynamics Corp.,
|
||||||
|
1333 Newbridge Road,
|
||||||
|
North Bellmore, N.Y.
|
||||||
|
{(only miniture microphon})
|
||||||
|
|
||||||
|
Simlar Electronics, Inc.,
|
||||||
|
3476 N.W. 7th Street,
|
||||||
|
Miami, Florida
|
||||||
|
|
||||||
|
Tracer Systems,
|
||||||
|
256 Worth Ave.,
|
||||||
|
Plam Beach, Florida
|
||||||
|
|
||||||
|
The federal Communications Commission and the Supreme Court have been uptight about
|
||||||
|
wiretapping and eavesdropping for some time. They have both passed laws and made
|
||||||
|
regulations concerning electronic surveillance. For these reasons, I would emphasize
|
||||||
|
t
|
||||||
|
he utmost care and knowledge in the application of these devices. What is intersting
|
||||||
|
is the actual wording of the law, where any interstate wireta{(interstate does not mean
|
||||||
|
interstate, it applies to all tapping through some strange log}) except in a matt
|
||||||
|
er of security is against the FCC's regulations and is punishable by a fine of no more
|
||||||
|
than $10,000 or five years in jail. The neat little exception made for security gives
|
||||||
|
all of government agencies, particularly the FBI and the CIA, and all local polic
|
||||||
|
e departments, free license to practice all and any forms fo surveillance without any
|
||||||
|
restrictions. Although certain cases have been dismissed in court cases because of
|
||||||
|
"tainted" methods of collecting evidence, in reality if the government feels an indiv
|
||||||
|
idual is a security ris{(for any reas}) it can produce tapes in court that have been
|
||||||
|
gathered by wiretapping, supposedly not as evidence, but the defendant goes to jail
|
||||||
|
anyway.
|
||||||
|
America, at this point, is operating on a li~-size Monopoly Board. Everyone who isn't
|
||||||
|
in jail or going dirrectly to jail is buying and selling thousands of pieces of paper,
|
||||||
|
with absolute seriousness of purpose, unable to realize that there will be only
|
||||||
|
one winner, and when he gets out of jail, he's going to kick all their asses.
|
||||||
|
|
||||||
|
|
||||||
|
Broadcasting free radio
|
||||||
|
'''''''''''''''''''''''
|
||||||
|
|
||||||
|
In any underground, throughout history, a prime concern has been communications or
|
||||||
|
propaganda. Propaganda, as a word, has ugly connotations, but in reality it means
|
||||||
|
nothing more than the distribution of information. This country has begun to develop
|
||||||
|
a
|
||||||
|
n underground network of communications, in the many small newspapers which has cropped
|
||||||
|
up all over the country. Although there is a spark, there is also a monstrous lack of
|
||||||
|
communications, once you get outside any of the large metropolitan areas. In pr
|
||||||
|
eparation of writing this book, I had to do a great deal of reference work. In this
|
||||||
|
reading encompassed almost all extremities of the political spectrum, from far left to
|
||||||
|
far right. These extremities are so alike, and could be so powerful if they ever g
|
||||||
|
ot over their preconceived impressions of each other and started to communicate. This
|
||||||
|
is the reason I feel the underground has to take propaganda one step further, from the
|
||||||
|
printed page, to the radio broadcast.
|
||||||
|
|
||||||
|
The radio is a factor of ext~-
|
||||||
|
ordinary importance. At moments
|
||||||
|
when war fever is more or less
|
||||||
|
palpitating in every one region
|
||||||
|
or a country, the inspiring,
|
||||||
|
burning word increases this fever
|
||||||
|
and communicates it to every one
|
||||||
|
of the future combatants. It ~-
|
||||||
|
plains, teaches, fires, and f~-
|
||||||
|
es the future positions of both
|
||||||
|
friends and enemies. However,
|
||||||
|
the radio should be ruled by the
|
||||||
|
fundamental principle of popular
|
||||||
|
propaganda, which is truth; it
|
||||||
|
is preferable to tell the truth,
|
||||||
|
small in its dimensions, then a
|
||||||
|
large lie artfully embellished.
|
||||||
|
~-Che Guevara
|
||||||
|
Guerrilla warfare
|
||||||
|
|
||||||
|
Kwame Nkrumah, in his HANDBOOK OF REVOLUTIONARY WARFARE, also stresses the use of
|
||||||
|
radio propagnda. He breaks it down into two basic forms: The first and most important
|
||||||
|
is the same as Che was writing about in the above quotation, this being to communic
|
||||||
|
ate truth to people of the country about the struggle. Nkrumah takes this idea one step
|
||||||
|
futher, and says that really to communicate the underground must speak on many different
|
||||||
|
levels, and this is a key point. How can an anarchist who has a rig~-wing ba
|
||||||
|
ckground understand or relate to a le~-wing anarchist, who uses Marxist terminology?
|
||||||
|
This forces the underground to communicate with many different frames of reference.
|
||||||
|
This hasn't happened in this country: Everyone from far left to far right is hung up
|
||||||
|
with dogmatic ideals, over used terminology, and is absolutely blind to practicality.
|
||||||
|
Nkrumah's second concept of propaganda is for the purpose of subverting the enemy.
|
||||||
|
|
||||||
|
An indispensable primarily to
|
||||||
|
battle is to attack the mind of
|
||||||
|
the enemy, to undermine the will
|
||||||
|
to fight so that th result of
|
||||||
|
the battle is decided before the
|
||||||
|
fighting begins. The revoluti~-
|
||||||
|
ary army attacks an irresolute
|
||||||
|
and demoralized army.
|
||||||
|
~-Nkrumah
|
||||||
|
Handbook of
|
||||||
|
Revolutionary
|
||||||
|
Warfare
|
||||||
|
|
||||||
|
This use of propaganda to discourage the enemy has also a great place in the struggle
|
||||||
|
that is going on in this country today. It has been used to a small degree, with
|
||||||
|
fantastic success, around military bases. There was a regiment of the National Gaurd
|
||||||
|
that refussed to go to Chicago during the National Democratic Convention. Underground
|
||||||
|
newspapers and handbills have encouraged G.I.'s to dissent and desert, and have shown
|
||||||
|
them that it is possible. The effectiveness demonstrated by this demoralizing fo
|
||||||
|
rm of propagnda depicts nothing more than the real turmoil that exists. The successful
|
||||||
|
effect of this communication has resulted from one aspect of its natu~--that being its
|
||||||
|
passionate reguard for truth.
|
||||||
|
Printing a revolutionary newspaper is a great deal easier than forming a underground
|
||||||
|
radio station. Althought the government has strict restrictions on printed material,
|
||||||
|
it is nothing like the regulations it places on radios and television broadcasting
|
||||||
|
. The FCC runs the radio networks with an iron hand, wih the ever present threat of
|
||||||
|
revoking a license. For this reason, any radio station which is striving to be
|
||||||
|
absolutely free must make the ultimate break with the FCC. This can be accomplished
|
||||||
|
in tw
|
||||||
|
o ways. The first and most dangerous, but at the same time the most effective, is by
|
||||||
|
using high powered equipment, jamming out other stations, from a mobile base of
|
||||||
|
operations. The FCC has incredibly sophisticated equipment, and can locate any pirate
|
||||||
|
r
|
||||||
|
adio station in a matter of minutes. For this reason, mobility is essential.
|
||||||
|
Transmitting from the back of a disguised truck has been used successfully, although
|
||||||
|
the movement of the truck while broadcasting must be constant, never repeating the same
|
||||||
|
pat
|
||||||
|
tern, but at the same time keeping within the broadcast power area. This means of
|
||||||
|
transmission is especially effective at gathering, such as demonstrations and riots to
|
||||||
|
keep people informed as to the movement of the enemy. The best method of obtaining e
|
||||||
|
quipment is building your own, as to buy a large transmitter requires the individual
|
||||||
|
to be licensed. Not only that, it's expensive. You can build your own from plans and
|
||||||
|
equpiment purchased through mail order, from most of the companies listed earlier i
|
||||||
|
n the text file.
|
||||||
|
The second method for getting around the strict FCC regulations is legal. Under the
|
||||||
|
FCC's l~-pow~-transmission regulations, one can legally broadcast below 100 milowatts
|
||||||
|
at any empty space on the AM or FM dial, without registering or being licensed. T
|
||||||
|
he disadvantages are obvious: One can be only broadcast up to one mile. Even within
|
||||||
|
that mile, interference from the hi~-power commercial stations is present. And if
|
||||||
|
enough people get into this form of broadcasting the FCC is going to make some sort of
|
||||||
|
regulation against it. This method is not just theoretical, it has been inplemented
|
||||||
|
on the Lower East Side, by John Giorno and his Guerrilla Radio. He broadcast from the
|
||||||
|
top of the St. Mar~-~-t~-Bowerie's belltower at 1400 on the AM dial, and calims he
|
||||||
|
did everything the FCC said he couldn't. I am sorry to say I did not hear the
|
||||||
|
broadcast, as I was out of the o~-mile area at the time.
|
||||||
|
|
||||||
|
|
||||||
|
Telephone and communications sabotage
|
||||||
|
'''''''''''''''''''''''''''''''''''''
|
||||||
|
|
||||||
|
Telephone sabotage can be applied on many levels. First I am going to explain what
|
||||||
|
I am not going to write about. I feel there is no need for me to explain how to make
|
||||||
|
free phone calls by telling the operator that you dialed the wrong number, just as
|
||||||
|
I am not going to get into explaining how to use a number 14 washer with scotch take
|
||||||
|
in a pay phone, or cheating on credit card calls, or spitting on a penny. These are
|
||||||
|
all explained in FUCK THE SYSTEM, a pamphlet on living freely in New York City. The
|
||||||
|
interst I have in telephone sabotage is purely communicational and commercial.
|
||||||
|
Commercial inn the sense, that over the past few years my absolute hatred of vending
|
||||||
|
machines and pay phones has led me to break into almost every kind I could find.
|
||||||
|
Parking meters are the easiest by far: All you need is a hammer and chisel or a larg
|
||||||
|
e money wrench. Soda machines are almost as easy, but real delight comes from ripping
|
||||||
|
a Kotex machine off the wall of a womans restroom, or sticking an explosive charge in
|
||||||
|
the coin slot of a pay toilet. I have never been able to break into a pay teleph
|
||||||
|
o~--smash them, yes, put them out of order, but never able to open them up and remove
|
||||||
|
the coins. This is for several reasons: One is the time element, as most public phones
|
||||||
|
are easily seen, and the other is that all public phones are installed with amaz
|
||||||
|
ing locks, which have completely baffled me.
|
||||||
|
To get back to the purpose of this section, I must emphasize the importance of
|
||||||
|
breaking down the enemie's communications. This in turn results in confusion and chaos.
|
||||||
|
Imagine, for a moment, a squad car without menas of communicating with its precinct,
|
||||||
|
or an enemy aircraft with its radio jammed. This act of breaking down the enemy's
|
||||||
|
lines of communications is not and end in itself, rather it is a tact~--a small, but
|
||||||
|
extremely important, part of a total operation.
|
||||||
|
When considering communications, it is best to start from primative base and work up
|
||||||
|
to more sophisticated tactics. The first and simplest method for rendering a telephone
|
||||||
|
inoperative is only temporary. It entails calling the phone company that a cert
|
||||||
|
ain number be disconnected. This will work for individuals, but not for agencies or
|
||||||
|
law enforcement organizations. An important factor in any form of telephone sabotage
|
||||||
|
is the time aspect of verificati~--in other words, the amount of time it takes the
|
||||||
|
phone company to trace a call. The phone company can tell right away if you are calling
|
||||||
|
from a pay phone, so this should be avoided. Call from a private phone which you can
|
||||||
|
not be connected with, and limit your conversation to under ninety seconds. IMP
|
||||||
|
ORTANT: Most law enforcement organizations, companies, corporations, and businesses
|
||||||
|
have more than one phone line, and in most cases one or more will be unlisted.
|
||||||
|
A common misconception is that a person can render a phone useless by dialing a number
|
||||||
|
and, before the party answers, leave the phone off the hook. This si not true, and
|
||||||
|
doesn't work. Even if the caller does not hang up the phone, the receiver can get
|
||||||
|
a dial tone by hanging up himself and holding the hook down for a little over thirty
|
||||||
|
seconds. Although this method does not work in the cit{(I know because I have
|
||||||
|
experimented with }), I have heard reports that it has been used in rurla areas with
|
||||||
|
varyi
|
||||||
|
ng degrees of sucess. I would suggest trying it out with a friend, to see if it is
|
||||||
|
effective in your area.
|
||||||
|
The other truly effective method is the most dangerous. It entails the actual cutting
|
||||||
|
of the phone wires. This is much easier in a rural area where the phone lines are above
|
||||||
|
the ground, and there are not so many of them. It should be noted that compl
|
||||||
|
ete telephone communications with a small town or village can be broken in less than
|
||||||
|
ten minutes. Probably the most important thing here is having a complete understanding
|
||||||
|
of what you are doing, and using the correct tools. Phone lines do carry electric
|
||||||
|
al charges and, without the complete knowledge of what you are doing and without the
|
||||||
|
correct tools, it would be very easy to electrocute yourself. In rural areas, the basic
|
||||||
|
tools should be: rubb~-soled shoe{(sneake}); pliers with rubber grips; large heav
|
||||||
|
~-duty wire or tin cutters, also with rubber grips; a pair of surgical rubber gloves;
|
||||||
|
a small flashligh{(operate at nig}); and a body strap to allow you free movement of your
|
||||||
|
hands once at the top of the pole. IMPORTANT, before attempting any telephone w
|
||||||
|
ire cutting, get hold of a copy of telephone repairman's manual, and read it.
|
||||||
|
This same operation can be preformed in urban areas, although the process is much more
|
||||||
|
involved. In most urban areas the phone lines run beneath the street level, and they
|
||||||
|
are`usually`)
|
||||||
|
|
||||||
|
to the phone lines in the sewers, there are also all the hi~-voltage electric lines.
|
||||||
|
If you cut into one of these, I don't care how well insulated you are, you'll fry. An
|
||||||
|
urband saboteur should either be in possession of a detailed map of the phone lin
|
||||||
|
es, available at any municipal library, or carry a small electric line locator, so that
|
||||||
|
he can find the right line to cut. The urban guerrilla, on this sort of mission, should
|
||||||
|
carry all the tools the rural guerrilla would have, except he should exchange
|
||||||
|
the body strap for a rubb~-insulated hack saw, also add a crowbar. The hack saw is for
|
||||||
|
the mtal encasement that surrounds all phone and electric wires in the sewers. Access
|
||||||
|
to the sewers is pretty easy, as most manholes will take you into an amazing com
|
||||||
|
plex of all differe~-sized tunnels, where you can get thoroghly lost, unless you have
|
||||||
|
had the foresight to study a map of the sewers, also available from any municiple
|
||||||
|
library. Know exactly where you are going, know all the obstacles that you may come
|
||||||
|
in
|
||||||
|
contact with, and have several routes of escape planned, in case of an emergency.
|
||||||
|
Needless to say, if you decide to go into the sewers, dress accordingly. It's cold,
|
||||||
|
damp infested with rodents, and dark, and many tunnels are partially full of water.
|
||||||
|
A word of caution about using explosives to sever phone lines: In the sewers, don't.
|
||||||
|
In Paris in 1945, the French resistance decided that to aid the oncoming Allied troops,
|
||||||
|
they would cut all lines of communication from the Nazi headquarters and Berli
|
||||||
|
n. This proved insuccessful, for many reasons, but the important fact was that they
|
||||||
|
did attempt to use explosives in the sewer system. A small charge was placed right
|
||||||
|
on the phone lines, and denoted from a good distance away. The phone line was cut, b
|
||||||
|
ut unknown to the resistance, so was a gas main, right next to lines. The result:
|
||||||
|
phone lines cut, a large number of civilians dead, and a block and a half completely
|
||||||
|
leveled. Not only was the area totally destroyed, it was flooded by the bursting of
|
||||||
|
t
|
||||||
|
he water mains which also shared the sewers with the phone wires.
|
||||||
|
One can use small explosive charges in rural areas, as the lines are above the ground.
|
||||||
|
|
||||||
|
|
||||||
|
DOWNLOADED FROM P-80 SYSTEMS 304-744-2253
|
||||||
|
|
254
textfiles.com/phreak/WIRETAPPING/faxint.phk
Normal file
254
textfiles.com/phreak/WIRETAPPING/faxint.phk
Normal file
@@ -0,0 +1,254 @@
|
|||||||
|
FAX INTERCEPTION
|
||||||
|
|
||||||
|
This article is reprinted from Full Disclosure #23. Copyright (c) 1991 Full
|
||||||
|
Disclosure. Permission granted by publisher to reprint when subscription
|
||||||
|
information provided: Full Disclosure, Box 903-R, Libertyville, Illinois
|
||||||
|
60048, Phone: (708) 395-6200, Fax: (708) 395-6022, BBS: (708) 395-3244, Toll
|
||||||
|
free: (800) 786-6184. Subscriptions: $18 for 12 issues.
|
||||||
|
|
||||||
|
As with the introduction of all new communications technologies, there is a
|
||||||
|
time lag between the availability of the technology and commercial
|
||||||
|
development of interception devices. Accompanying the use of both are
|
||||||
|
unanticipated risks and the potential for misuse and misunderstandings.
|
||||||
|
|
||||||
|
False Sense of Security
|
||||||
|
|
||||||
|
With the widespread proliferation of fax machines came increased use. In
|
||||||
|
general, a document transferred has been given the same sort of validity as
|
||||||
|
one sent or received by U.S. Mail. In general, such communications were
|
||||||
|
originally secure. Now that interception equipment is available, the sense of
|
||||||
|
security has become false.
|
||||||
|
|
||||||
|
For all practical purposes, fax is a remote photocopying machine. The process
|
||||||
|
begins with the sending unit converting the image on the page into a
|
||||||
|
digitized image (numbers in an electronic format) and transmitting it as a
|
||||||
|
noise sounding signal over a phone line. The receiving fax converts the
|
||||||
|
signal into dots and prints it.
|
||||||
|
|
||||||
|
Since the image is transmitted over standard phone lines, the communication
|
||||||
|
is subject to interception. However, rather than tapping the line with a tape
|
||||||
|
recorder or simply listening to the oral communications, an interception
|
||||||
|
device that makes sense of the specialized signal is necessary. Sometimes
|
||||||
|
this is done by recording the transmission and later converting the recording
|
||||||
|
of the modem signal to a computer image, sometimes it is done 'on the fly' as
|
||||||
|
the signal is being intercepted.
|
||||||
|
|
||||||
|
Simple Fax Intercepts
|
||||||
|
|
||||||
|
Why not just use a standard fax machine for interception? The signal
|
||||||
|
sequences and handshaking at the time machines first connect complicates the
|
||||||
|
possibility. During startup, the machines automatically select one of several
|
||||||
|
built in protocols depending on line conditions. That is why on really noisy
|
||||||
|
connections, the transmission of a page can take much longer. Directly
|
||||||
|
connecting a 3rd fax machine to the line may confuse this process. Both the
|
||||||
|
receiving unit and the intercepting machine would be sending signals about
|
||||||
|
line conditions and protocol. However, if a 3rd fax machine did manage to get
|
||||||
|
properly synchronized to the signal in use without interfering with the
|
||||||
|
initial handshake, it would print an image identical to the one received by
|
||||||
|
the intended recipient. We had mixed results when we tried this in our lab.
|
||||||
|
Sometimes we managed to get all three machines synchronized. Using unmodified
|
||||||
|
fax machines to attempt intercepts didn't provide sufficient reliability to
|
||||||
|
be considered a viable approach. Indeed, continued attempts of this approach
|
||||||
|
would likely put both sender and recipient(s) on notice that something was
|
||||||
|
wrong as connections would be repeatedly lost.
|
||||||
|
|
||||||
|
This doesn't mean that it is really complicated to intercept faxes. The
|
||||||
|
Philadelphia Inquirer reported in September 1990 that Japanese hackers have
|
||||||
|
been stealing valuable information from corporations by using fax
|
||||||
|
interception. The article claimed it could be done by anyone with a little
|
||||||
|
knowledge of electronics. We agree, we have intercepted faxes in our lab.
|
||||||
|
(See front cover for one such example.)
|
||||||
|
|
||||||
|
Doing It Right
|
||||||
|
|
||||||
|
The latest commercially available fax interception devices generally use fax
|
||||||
|
boards in IBM PC or compatible computers. The actual hardware used for fax
|
||||||
|
interception is often the same as used by normal computer-fax systems. The
|
||||||
|
software is more sophisticated. Rather than attempting to synchronize with
|
||||||
|
the sending unit by sending protocol information, it adjusts to whatever
|
||||||
|
protocol the two main players have established and stores the signal
|
||||||
|
information.
|
||||||
|
|
||||||
|
After interception, the electronic information is stored in the computer and
|
||||||
|
is available for review, to be printed, altered or discarded. Such equipment
|
||||||
|
can be left unattended for long periods if necessary, or monitored for the
|
||||||
|
instant use of information in cases where law enforcement is standing by
|
||||||
|
waiting for some specific bit evidence.
|
||||||
|
|
||||||
|
Cellular Fax Interception
|
||||||
|
|
||||||
|
Cellular phone based fax machines provide ripe opportunity for `hacker'
|
||||||
|
intercepts, since the signal is available via low cost police scanners. No
|
||||||
|
physical connection to a common carrier network is necessary. There is
|
||||||
|
absolutely no risk of being detected.
|
||||||
|
|
||||||
|
Commercial fax interception equipment gets more complicated, though. Since
|
||||||
|
fax messages might be on the same phone lines as voice or other computer
|
||||||
|
modem communications, some of the interception devices automatically route
|
||||||
|
different types of communications to different interception devices. This
|
||||||
|
provides the interceptor with a separate recordings of voice phone calls,
|
||||||
|
faxes, and other computer communications.
|
||||||
|
|
||||||
|
Such fax interceptions are based upon the interceptor having a specific
|
||||||
|
target. Distributing the sorts of information received for analysis isn't
|
||||||
|
much different from an ordinary, now old fashioned, wiretap.
|
||||||
|
|
||||||
|
Broadband Interception
|
||||||
|
|
||||||
|
Presorting of signals and voice communications as described above makes
|
||||||
|
broadband scanning for fax messages easy. The interception of satellite or
|
||||||
|
microwave links has become possibile. Cooperation by a common carrier with
|
||||||
|
the government has happened in the past, and strikes a chord of dangerous
|
||||||
|
reality today. But it really takes little by way of home fabricated equipment
|
||||||
|
to monitor much of the satellite link traffic. Commercial equipment is also
|
||||||
|
available. One commercial fax interception unit can decode up to 150
|
||||||
|
simultaneous fax transmissions from a 6,000 phone line satellite link.
|
||||||
|
|
||||||
|
Such broadband interception can also be done on oral calls, however, the task
|
||||||
|
of listening to all the conversations for the important ones is much, much
|
||||||
|
greater compared to scanning faxes. First, faxes are usually much more direct
|
||||||
|
and to the point than normal phone conversations (not so much about Sunday's
|
||||||
|
game). Additionally, optical character recognition (OCR) process can be used
|
||||||
|
to convert much of the text to standard computer data and then be
|
||||||
|
mechanistically selected for closer scrutiny by an automated search of
|
||||||
|
keywords of interest. Encryption of a fax could also be noted, perhaps
|
||||||
|
triggering further attention.
|
||||||
|
|
||||||
|
The risks resulting from broadband interceptions are henious. Your fax could
|
||||||
|
be intercepted not because you were a selected target of law enforcement,
|
||||||
|
industrial spies or miscreant hackers, but because of the route your fax
|
||||||
|
travelled through the common carrier networks. Broadband interceptions become
|
||||||
|
a modern day version of general warrants. Satellite signals don't respect
|
||||||
|
borders. Interception in nations with no privacy concerns for radio signals
|
||||||
|
of what we, as users, understand to be Constitutionally protected
|
||||||
|
communications has become a real threat. There are areas contained within our
|
||||||
|
national frontiers where the United States Constitution does not apply.
|
||||||
|
Foreign embassies present one such clearcut example. The status on Indian
|
||||||
|
Reservations is not cleancut.
|
||||||
|
|
||||||
|
Dangers of Fax
|
||||||
|
|
||||||
|
The February 13, 1990 issue of the American Bankers' Association publication
|
||||||
|
``Bankers Weekly'' reported that ``In one incident, a bank suffered a $1.2
|
||||||
|
million loss through fraudulent funds transfer requests which were
|
||||||
|
accomplished using nothing more than business letterhead, tape and sissors.''
|
||||||
|
A fax machine made such simple tools effective. Inordinate reliance on
|
||||||
|
technology permitted the loss to actually happen.
|
||||||
|
|
||||||
|
The journal continues that there is a need for legislation (changes to the
|
||||||
|
Uniform Commercial Code) to put a stop to the problem. Unfortunately,
|
||||||
|
legislative efforts alone cannot correct the problem. The first step, is an
|
||||||
|
understanding of the technology.
|
||||||
|
|
||||||
|
Once the technology is understood, administrative procedures can be
|
||||||
|
implemented by users of fax machines to protect themselves. That protection
|
||||||
|
cannot be successful without understanding the limitations of the machinery.
|
||||||
|
Taking any communications device for granted is a high risk path.
|
||||||
|
|
||||||
|
New Techniques For Fraud
|
||||||
|
|
||||||
|
The advent of fax technology has opened the door to new methods of fraud.
|
||||||
|
Those intent on committing fraud have always devised methods of bypassing
|
||||||
|
normal authentication systems in order to steal. As technology evolves, these
|
||||||
|
methods also evolve. Protective measures must follow suit.
|
||||||
|
|
||||||
|
Faxes represent a multiple whammy. People who send faxes have some geographic
|
||||||
|
distance between them. Because of past reliance on semi-automated
|
||||||
|
communications, formal verification proceedures are bypassed, substituting
|
||||||
|
the mysterious nature of modern communications. There was a time, even
|
||||||
|
recently, that tellers at banks asked for positive identification even in the
|
||||||
|
case of small cash transactions inside a bank. Yet today we witness orders
|
||||||
|
for large sums being processed simply because ``it came by fax.'' This is
|
||||||
|
truly a conspiracy of laxness and misinformation.
|
||||||
|
|
||||||
|
A written purchase order from a company is likely to have a particular form,
|
||||||
|
and include a signature. One attempting to issue a fraudulent purchase order
|
||||||
|
would need to forge both the form and the signature. Additionally, envelopes
|
||||||
|
and possibly a postage meter imprint from the issuing company would also be
|
||||||
|
needed. Elsewhere in this issue we reprint a letter from the Federal
|
||||||
|
Communications Commission. The letterhead was, for reasons we have been
|
||||||
|
unable to determine, typed instead of printed. Some of the recipients we've
|
||||||
|
talked to have placed calls to verify the authenticity of the letter. As it
|
||||||
|
turns out, the letter was authentic and official.
|
||||||
|
|
||||||
|
A purchase order sent by fax on the other hand, can be created by cutting,
|
||||||
|
pasting and xeroxing together parts of other orders from the company. When
|
||||||
|
received by fax, the fake would appear legitimate.
|
||||||
|
|
||||||
|
PC's & Fax: The Miscreants Gun
|
||||||
|
|
||||||
|
The advent of PC based fax boards exaggerates these problem. A fax that
|
||||||
|
originates, is received by, or intercepted by a personal computer (PC) fax
|
||||||
|
board really opens the door for miscreants.
|
||||||
|
|
||||||
|
A fax, when stored on a PC is easily modified using ordinary commercial
|
||||||
|
software intended for preparation of graphics. An image of the fax can be
|
||||||
|
brought up on the screen and parts of it altered or cut and pasted
|
||||||
|
electronically. For example, a purchase order could have a shipping address
|
||||||
|
altered. A signature could be removed from one document and placed on
|
||||||
|
another. All such operations can be done on a computer screen in moments.
|
||||||
|
Document changes that could take a professional forger hours to accomplish
|
||||||
|
could be done in minutes by an amateur, even an underage one.
|
||||||
|
|
||||||
|
Bogus faxes can be created to be sent to another fax, or incoming faxes could
|
||||||
|
be altered by an employee and printed as authentic. Detection is difficult to
|
||||||
|
impossible, depending on verification techniques used at audit.
|
||||||
|
|
||||||
|
The difficulty of intercepting standard U.S. Mail or voice phone calls and
|
||||||
|
altering the content by a third party is enormous compared to fax messages.
|
||||||
|
Before a fax message is printed, it is just a series of electrical signals.
|
||||||
|
Any alternations result in changes without a trace of the alteration.
|
||||||
|
|
||||||
|
The receipt of a fax is <B>not<D> a confirmation of its content, unless other
|
||||||
|
corroborative authentication validates the information.
|
||||||
|
|
||||||
|
Someone with access to a phone closet can route incoming fax line to a PC.
|
||||||
|
The fax can then be connected to a different phone line. All incoming faxes
|
||||||
|
would be first received by the PC and the operator could alter, erase, or
|
||||||
|
forward without change those faxes to the standard fax machine. A pre-review
|
||||||
|
and alteration if desired scheme can be effected. The same can not easily be
|
||||||
|
accomplished with normal voice phone calls, or the U.S. Mail.
|
||||||
|
|
||||||
|
With the advent of the Caller-ID services, this information should soon be
|
||||||
|
incorporated into fax machines, so the true number of the caller will be
|
||||||
|
placed on the fax. This will still do nothing to prevent transmission of
|
||||||
|
bogus faxes over that phone line.
|
||||||
|
|
||||||
|
Protect Yourself
|
||||||
|
|
||||||
|
The best rule for protecting one's interests when using faxes is to use them
|
||||||
|
only with other confirmation or as confirmation of other communications. They
|
||||||
|
should never be used for final copies of contracts, purchase orders or other
|
||||||
|
important documents that could have a significant impact if altered, or
|
||||||
|
entirely fabricated. Where would we be if our WW2 treaties terminating
|
||||||
|
hostilities were faxed documents. Additionally, information that would not be
|
||||||
|
given out over a standard phone conversation, subject to a wiretap, or other
|
||||||
|
listeners (via a speakerphone, extension, etc), should not be sent by fax.
|
||||||
|
There is no way to tell who may pick up a received fax and read it. In fact,
|
||||||
|
it is more likely an unintended party will read a fax than pick up an
|
||||||
|
extension phone and eavesdrop on a voice call (intentionally or not).
|
||||||
|
|
||||||
|
It should be kept in mind that any errant employees or others that could get
|
||||||
|
access to the fax phone line(s) could intercept all faxes sent or received
|
||||||
|
and make use of the fax images for whatever purpose they desired.
|
||||||
|
|
||||||
|
The intercepted faxes can be used to collect or create incriminating
|
||||||
|
evidence, industrial espionage, or as the base of documents to be used in
|
||||||
|
forgery. There's a whole new meaning to autograph collection.
|
||||||
|
|
||||||
|
Conclusion
|
||||||
|
|
||||||
|
Fax technology in its current form provides a useful service for business and
|
||||||
|
others. However, the risks must be examined so the use doesn't go beyond that
|
||||||
|
which is appropriate given its current functionality / risk ratio.
|
||||||
|
|
||||||
|
In conclusion, the convenience of a fax must be weighed against its risks and
|
||||||
|
procedures implemented to authenticate incoming and outgoing faxes as well as
|
||||||
|
what information is communicated by fax. As with all technologies, it must be
|
||||||
|
understood so that it can be used for purposes that are appropriate for the
|
||||||
|
needs of the technology and the user. A lack of understanding can leave the
|
||||||
|
user exposed to unnecessary danger, liability and loss. When used with an
|
||||||
|
understanding of the benefits as well as the pitfalls, a fax machine can
|
||||||
|
greatly enhance productivity.
|
||||||
|
|
||||||
|
Downloaded From P-80 International Information Systems 304-744-2253
|
Reference in New Issue
Block a user