==Phrack Inc.== Volume One, Issue Three, Phile 1 of 10 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % _ _ _______ % % | \/ | / _____/ % % |_||_|etal/ /hop % % _________/ / % % /__________/ % % % % Proudly Presents % % % % Phrack Inc. Issue Three % % % % Released Feb 1, 1986 % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% The files contained in this issue of Phrack Inc. are as follows: 1: Index written by Cheap Shades 2: Rolm systems written by Monty Python 3: Making shell bombs written by Man-Tooth 4: Signalling systems around the world by Data Line 5: Private audience written by Overlord 6: Fortell systems written by Phantom Phreaker 7: Eavesdropping written by Circle Lord 8: Building a Shock Rod written by Circle Lord 9: Introduction to PBX's written by Knight Lightning 10: Phreak World News II written by Knight Lightning If you have an original file that you would like published in a future issue of Phrack Inc. Leave E-Mail to Taran King, Knight Lightning, or Myself on any system that we are on. If you cannot find us try and contact some member of Metal Shop to get into touch with us. Later, ________________ \Cheap/ \Shades/ \___/ \____/ ==Phrack Inc.== Volume One, Issue Three, Phile 2 of 10 The purpose of this file is to tell you what you would be dealing with if you stumble across this system, or if you know of a company that is using this system. It doesn't go into incredible detail, and is lacking in areas. It is not a guide to hacking into it, just letting you know what you would be dealing with. This is to pique your interest in the system. So What the Hell is ROLM? ------------------------- ROLM is a "Business Communications System" bought by IBM a few months ago, in an effort to compete effectively with AT&T, and get a larger share of the market, in a grand master plan to become "Big Daddy Blue" as opposed to "Ma Bell". It is a very complex system, with features such as PhoneMail, A Super-PBX, Local Area Networks, Public and Private Data Networks, Desktop Communications, and Call Management. The heart of the system is the Controller, called the CBX . This controls the entire network accessible through ROLM. Since 1983, the CBX was redesigned and upgraded to the CBX II. It is a PBX with much much more to offer, and that is ROLM's claim to fame. It is light years ahead of the regular PBX system. The CBX II ---------- The CBX II is the core of the ROLM network. It is computer driven and expandable from one node, with 165 channels, to 15 nodes providing 11,5200 2-way channels. The smaller business could have a model with a 16 user maximum limit, but it can go up to 10,000 users, though this would be quite rare . It can be accessed from outside lines as well as HardWired units, with a switching system to prevent busy signals on a port. Speed depends on the system in place, either the newer, faster ROLMbus 295, or the older standard ROLMbus 74. The larger the system, the faster as well. It is adjustable to accept different bandwidths for the various components, such as Telex, Voice, Data, Mainframe, LAN, Video , and anything hooked up to the system. Similar tasks can be bunched onto one channel as well, at high or low speeds. If multiplexing is used , the maximum speed is 192,000 bps, and if using a single interface, the top possible rate is a mindboggling 37,000,000 bps, which if you ask me, if just fluff and not too practical, so they are usually multiplexed. . Using the CBX II network, you might find just about any kind of mainframe, from HP, to DEC, to VAX, to the IBM 327 series. Note : There is a smaller version of this called the VSCBX. Phone Mail ---------- This is one of the little beauties of the system, something truly fun to fuck with. I called ROLM Headquarters in California to ask specific questions about ROLM, posing as a researcher, and I got the big runaround, transferred from department to department. Maybe you can get further than I. Their is 408-986-1000. The to PhoneMail from the outside is 800-345-7355. A nice computer-generated voice comes on asking you to enter your Extension number , and then enter the "" sign. Then enter your password. If you make around 3 or 4 bad attempts at an Extension of Password, it will automatically ring another number, assistance I assume, to find out why there has been an unsuccessful entry attempt. I haven't played around with this that much, so leave mail to Monty Python with whatever you find. Once entering an authorization with correct password, you will be presented with more options, leave messages to other people, and whatnot. You can hear your messages, forward them to another person, leave the same message to more than one person, change your welcome message, etcetera. The service is for those business-type pigs who never sit still for one minute, like they are permanently on speed. A Phone Mail Scenario --------------------- Let's say if Mr. Greed goes out to meet his secretary at a motel, but definitely has to get that important message from Mr. Rasta, who's bringing in $3 mil in Flake, and can't trust it to the person who would handle it . Mr. Greed would have given Mr. Rasta his phone and he would be forwarded to the Phone Mail network, where he would hear a message left my Mr. Greed, to anyone who would call. Mr. Rasta would leave his message and hang up. Then Mr. Greed could call up the 800-345-7355 , punch in his extension authorization number, and password. Or, if he was back at the office, he could get it there through DeskTop communications. Messages can be delivered without error, in the person's own voice, without other people knowing about it. Therefore, someone with enough knowledge could use an unused account and use it as his own service, without the knowledge of others. DeskTop communications ---------------------- ROLM has developed a Computer/Telephone integrated device for use with the Desktop communications. It is linked with the CBX II through fone lines, thus accessible by you and me from the outside. It is not hardwired, though it can approach hardwired speed. If you could get your hands on one of these computer/fones then I think you would have found something very useful at home, in your general life. But you could access the network without the special features of the fone, like one touch dialing, which is designed for the stupid lazy businessman. You can access company databases through the network, mainframes, other people, just about anything as if you were right there and told your secretary to do it for you. There is special software used by the computers or computer/fone but it can be improvised and is just an aid. It uses a special protocol . What is great is that everything is tied together through telefone lines, and not RS-232C! Thus, there is an access port....somewhere. Scan the 's around the office using ROLM. How do you know if it is using ROLM one way or the other. Compile a list of local businesses, call them up saying "This is ROLM Customer Support. We have a report of a complaint in your CBX II network, let me speak to your supervisor please." If they say "ROLM? CBX II? We don't use that" then just apologize and go elsewhere. Or say that you are from ROLM corp and would like to know if the company is interested in using it to network its system. Like, if they have it already, they would say that they had it. And if they didn't, you would just give them a fake . But you know what's REALLY Great? They have made the network link in mind for the person with a Computer IQ of about 0. Commands are in plain English. Here is a demonstration screen as seen in their brochure: CALL, DISPLAY or MODIFY Display groups ACCESSIBLE GROUPS: [00] PAYROLL [01] MODEM [02] IBMHOST [03] DOWJONES [04] DECSYSTM [05] MIS-SYSTM [06] DALLAS [07] SALES CALL, DISPLAY OR MODIFY? Call Payroll CALLING 7717 CALL COMPLETE **PAYROLL SYSTEM** ENTER ACCOUNT CODE: See, nothing is confusing, everything pretty self-explanatory. There may be more than one person wanting to do the same thing you are, so if there is, you would be put on a queue for the task. It seems that those with an IBM would be best suited for ROLM hacking, because ROLM is owned by IBM, and the PC's used by the network are IBM. A person with a simpler fone/Terminal couldn't access something like their DEC mainframe, or something like that. By calling in, you could not run an application, unless you had a special interface, but you could access the database, which any dumb terminal could do. However, there are security levels. Thus one with a privileged account could access more things than one without it. Like Joe Schmoe in Sales couldn't get to Payroll . It seems that for non-IBM's to access some of the parts of the network, you would need an interface to become the same thing as a RolmPhone. Excessive 's of bad logon attempts, which would be construed as a linking error would notify the network manager, And if they saw that there was no hardware error, eventually, they would think of if they were somewhat experienced, you guessed it, hackers. The PBX ------- ROLM has something called Integrated Call Management . Now, when designing ICM, they must have taken into account the abuse possible in plain ol' PBX's. So they put in something called Call Screening. This will enable the company to restrict calls to certain 's and prefixes. Calls to non-business 's or certain areas can be screened out <"No personal calls on my time, Johnson!">, with the exception of 1 specific that you want. There is a choice of having a codeless, screened PBX, or a PBX where accounts are assigned to each employee, and the 's they call get recorded to that account. There can be privileged accounts where a large volume of calls would go relatively un-noticed. But I don't think that large-scale abuse of this system would be easy or practical. Calls are routed AUTOMATICALLY through the service where the rates are cheaper to the location dialed, which is pretty fucking cool. And, the PBX is accessible from the outside, using Direct Inward System Access, making it AB-useable. But what about if there is Equal Access in that area? It doesn't matter, the CBX will automatically access the service without you having to worry about it BUT!: There is a use of Call Detail Recording, where information on all ingoing and outgoing calls are recorded. Conclusion ---------- Not a lot of research went into this file, but it did take a little while to type up, and all of the information is correct, to my knowledge. Anyone is free to expand on this file into a Part II. It was written to enlighten people about this system, and I hope this has helped a little bit. Sysops: You are free to put this file up as long as NONE of the credits are changed! . Please give us a chance. Coming soon, to a telephone near you: The Return of The Flying Circus. Look for it. --Later On Monty Python <01/11/86> ==Phrack Inc.== Volume One, Issue Three, Phile 3 of 10 ////////////////////\\\\\\\\\\\\\\\\\\\\ :::: :::: :::: "SHOTGUN SHELL BOMBS" :::: :::: from :::: :::: The Poor Man's James Bond :::: :::: by Kurt Saxon :::: :::: :::: :::: typed in by --] Man-Tooth [-- :::: :::: :::: \\\\\\\\\\\\\\\\\\\\//////////////////// These little goodies are affectionately known as "nut busters." They are simply shotgun shells enclosed in cardboard rolls with cardboard fins put on. On the primer end of the shell is glued a small cork with a hole drilled through it. A roofing nail fits in the hole snugly enough to stay in, but loose enough to plunge into the primer upon impact. Since the shell is not confined in the chamber of the gun, it will naturally not cause the same amount of damage. But if it goes off between a fellow's legs he can look forward to becoming a soprano. These bombs are thrown singly or by the handful into the air over milling crowds. The weight of the shell and stabilization by the fins causes the nut buster to head straight downward. It has tremendous effect as its presence is usually a suprise. The threat of more coming is guaranteed to route any mob. Not only does it go off on the pavement but it will also explode on contact with a person's head or shoulder. At night it is impossible to trace its point of origin. ----- ! \ /> ! \ /- Cork Fins ! ! v --------------------!\ ! \ ! !-----! ! \ ! ! \> !------ ! ! !---! <-- Roofing nail ! ! !-----! ! / ! \ --------------------!/ \ ! ! ^ \-> ! / ^ \ ! / ! \ ----- ! Shell ! ! Close fitting 3-1/2 inch Aluminum Tubing Glued on Shell. SHOTGUN SHELL BOMB A clever use for a plain shotgun shell is as a muffler bomb. The shell is simply shoved up a car's exhaust pipe with a length of stiff wire until it drops into the muffler. After a few minutes on the road the shell explodes, totalling out the muffler and treating the driver to a sick kind of panic. ==Phrack Inc.== Volume One, Issue Three, Phile 4 of 10 Signalling Systems Around the World For those of you who have the desire to make international calls, this info may be of interest. Thanks to TAP and Nick Haflinger. CCITT 1. An old international system, now deceased. Used a 500 Hz tone interrupted at 20 Hz (Ring) for 1-way line signals. CCITT 2. Proposed "International Standard" that never caught on much. Used 600 Hz interrupted by 750 Hz. Still used in Australia, New Zealand and South Africa. CCITT 3. An early in-band system that uses 2280 for both line and register (!!). Used in France, Austria, Poland and Hungary. CCITT 4 A variation of 3, but uses 2040 and 2400 for end to end Tx of line and register. Used for international Traffic in Europe, but cannot be used with TASI (AKA Multiplex or "that dammed clipping"). CCITT 5 This is the most popular, and the one used in the US. 2400 and the infamous 2600 are used for link to link (not merely end to end line signals. Registers are handled via DTMF (Touchtones). Anyone know what 2400 does?? CCITT 5 bis. Just like above, but a 1850 Hz tone is used for TASI locking and transmission of line signals. CCITT 6 The newest and worst for phreaks. It uses digital data sent out-of-band to control the connection. In other words, the connection is made and billing started BEFORE you can get control. CCITT 5R1 A regional system like 5, but doesn't use the mysterious 2400 and can't use the multiplexer. CCITT 5R2 Probably the interface to AUTOVON, as it uses 120 Hz spaced tones for DTMF instead of 200. Also 3825 Hz is the blow-off tone instead of 2600. The "Extra" tones 1700 + 700 = Inward Operator 1700 + 900 = Delay operator, also, in TSPS,STP (a "Zero Plus" call from a coin phone) 1700 + 1100= KP1 (Start recognition of special tones) 1300 + 1700= KP2 (End recognition of special tones) 12-85 Data Line. CIS 72767,3207: TWX 650-240-6356 ==Phrack Inc.== Volume One, Issue Three, Phile 5 of 10 * PRIVATE AUDIENCE * (A BASIC LESSON IN THE ART OF LISTENING IN) BROUGHT TO YOU BY -[ THE OVERLORD ]- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- PART I: THE LAW Federal law: Section 605 of title 47 of the U.S code, forbids interception of communication, or divulagance of intercepted communication except by persons outlined in section 119 of title 18 (a portion of the Omnibus crime control and safe streets act of 1968). This act states that "It shall not be unlawful under this act for an operator of a switchboard, or an officer, employee, or agent of any communication common carrier who's switching system is used in the transmission of a wire communication to intercept or disclose intercepted communication." What all this legal bullshit is saying is that if you don't work for a phone company then you can't go around tapping people's lines. If you decide to anyway, and get caught, it could cost you up to 5 years of your life and $10,000. This, you are all assuming, means that if you tap someone else's line, you will be punished....wrong! You can't tap your own line either. The punishment for this is probably no more than a slap on the hand, that is if they actually catch you, but it's a good thing to know..............now on to the fun..... PART II: TAPPING Everyone has at some time wanted to hear what a friend, the principal, the prom queen, or a neighbor has to say on the phone. There are several easy ways to tap into a phone line. None of the methods that I present will involve actually entering the house. You can do everything from the backyard. I will discuss four methods of tapping a line. They go in order of increasing difficulty. 1. The "beige box": a beige box (or bud box) is actually better known as a "lineman" phone. They are terribly simple to construct, and are basically the easiest method to use. They consist of nothing more than a phone with the modular plug that goes into the wall cut off, and two alligator clips attached to the red and green wires. The way to use this box, is to venture into the yard of the person you want to tap, and put it onto his line. This is best done at the bell phone box that is usually next to the gas meter. It should only have one screw holding it shut, and is very easily opened. Once you are in, you should see 4 screws with wires attached to them. If the house has one line, then clip the red lead to the first screw, and the green to the second. You are then on the "tappee's" phone. You will hear any conversation going on. I strongly recommend that you remove the speaker from the phone that you're using so the "tappee" can't hear every sound you make. If the house has two lines, then the second line is on screws three and four. If you connect everything right, but you don't get on the line, then you probably have the wires backward. Switch the red to the second screw and the green to the first. If no conversation is going on, you may realize that you can't tap the phone very well because you don't want to sit there all night, and if you are on the phone, then the poor tappee can't dial out, and that could be bad...so....... method two. 2. The recorder: This method is probably the most widespread, and you still don't have to be a genius to do it. There are LOTS of ways to tape conversations. The two easiest are either to put a "telephone induction pickup" (Radio Shack $1.99) on the beige box you were using, then plugging it into the microphone jack of a small tape recorder, and leaving it on record. Or plugging the recorder right into the line. This can be done by taking a walkman plug, and cutting off the earphones, then pick one of the two earphone wires, and strip it. There should be another wire inside the one you just stripped. Strip that one too, and attach alligators to them. Then follow the beige box instructions to tape the conversation. In order to save tape, you may want to use a voice activated recorder (Radio Shack $59), or if your recorder has a "remote" jack, you can get a "telephone recorder control" at Radio shack shack for $19 that turns the recorder on when the phone is on, and off when the phone is off. This little box plugs right into the wall (modularly of course), so it is best NOT to remove the modular plug for it. Work around it if you can. If not, then just do you best to get a good connection. When recording, it is good to keep your recorder hidden from sight (in the Bell box if possible), but in a place easy enough to change tapes from. 3. The wireless microphone: this is the BUG. It transmits a signal from the phone to the radio (FM band). You may remember Mr. Microphone (from Kaytel fame); these wireless microphones are available from Radio Shack for $19. They are easy to build and easy to hook up. There are so many different models, that is is almost impossible to tell you exactly what to do. The most common thing to do is to cut off the microphone element, and attach these two wires to screws one and two. The line MIGHT, depending on the brand, be "permanently off hook". This is bad, but by phucking around with it for a while, you should get it working. There are two drawbacks to using this method. One, is that the poor asshole who is getting his phone tapped might hear himself on "FM 88, the principal connection". The second problem is the range. The store bought transmitters have a VERY short range. I suggest that you build the customized version I will present in part four (it's cheaper too). Now on to the best of all the methods.... 4. The "easy-talks": This method combines all the best aspects of all the the other methods. It only has one drawback... You need a set of "Easy-talk" walkie talkies. They are voice activated, and cost about $59. You can find 'em at toy stores, and "hi-tech" catalogs. I think that any voice activated walkie talkies will work, but I have only tried the easy-talks. First, you have to decide on one for the "transmitter" and one for the "receiver". It is best to use the one with the strongest transmission to transmit, even though it may receive better also. De-solder the speaker of the "transmitter", and the microphone of the "receiver". Now, go to the box. put the walkie talkie on "VOX" and hook the microphone leads (as in method three) to the first and second screws in the box. Now go home, and listen on your walkie talkie. If nothing happens, then the phone signal wasn't strong enough to "activate" the transmission. If this happens, there are two things you can do. One, add some ground lines to the microphone plugs. This is the most inconspicuous, but if it doesn't work then you need an amplifier, like a walkman with two earphone plugs. Put the first plug on the line, and then into one of the jacks. Then turn the volume all the way up (w/out pressing play). Next connect the second earphone plug to the mice wires, and into the second earphone outlet on the walkman. Now put the whole mess in the box, and lock it up. This should do the trick. It gives you a private radio station to listen to them on: you can turn it off when something boring comes on, and you can tape off the walkie talkie speaker that you have! PART IV: WIRELESS TRANSMITTER PLANZ This is a tiny transmitter that consists on a one colpitts oscillator that derives it's power from the phone line. Since the resistance it puts on the line is less than 100 ohms, it has no effect on the telephone performance, and can not be detected by the phone company, or the tappee. Since it is a low-powered device using no antenna for radiation, it is legal to the FCC. (That is it complies with part 15 of the FCC rules and regulations). It, however is still illegal to do, it's just that what you're using to do it is legal. This is explained later in part 15... "no person shall use such a device for eavesdropping unless authorized by all parties of the conversation" (then it's not eavesdropping is it?). What this thing does, is use four diodes to form a "bridge rectifier". It produces a varying dc voltage varying with the auto-signals on the line. That voltage is used to supply the the voltage for the oscillator transistor. Which is connected to a radio circuit. From there, you can tune it to any channel you want. The rest will all be explained in a minute.... PARTS LIST item | description ----------------------------------------------------------------- C1 | 47-Pf ceramic disk capacitor C2,C3 | 27-Pf mica capacitor CR1,CR2,CR3,CR4 | germanium diode 1n90 or equivalent R1 | 100 ohm, 1/4 watt 10% composition resistor R2 | 10k, 1/4 watt 10% composition resistor R3 | .7k, 1/4 watt 10% composition resistor L1 | 2 uH radio frequency choke (see text) L2 | 5 turns No.20 wire (see text) Q1 | Npn rf transistor 2N5179 or equivalent ----------------------------------------------------------------- L1 may be constructed by winding approximately 40 turns of No. 36 enamel wire on a mega-ohm, 1/2 watt resistor. The value of L1 is not critical. L2 can be made by wrapping 5 turns of No. 20 wire around a 1/4 inch form. After the wire is wrapped, the form can be removed. Just solder it into place on the circuit board. It should hold quite nicely. Also be sure to position Q1 so that the emitter, base, and collector are in the proper holes. The schematic should be pretty easy to follow. Although it has an unusual number of grounds, it still works. |------------------L1----------------| -- | CR1 / \ CR2 |----------------| A--------------/ \ --| ----| | | | \ / | | | C2 L2 | CR3 \ /CR4 | C1 R2 |----| | R1 -- | | | gnd C3 | | | | ----| |-----| | gnd | | | | | |-----|----Base collector | | R3 \ / B-----------------------| | \/\ <- Q1 gnd \/ | | emitter(gnd) The odd thing about this bug that we haven't encountered yet, is that it is put on only one wire (either red or green) so go to the box, remove the red wire that was ALREADY on screw 1 and attach it to wire 'A' of the bug. Then attach wire 'B' to the screw itself. You can adjust the frequency which it comes out on the FM channel by either smooshing, or widening the coils of L2. It takes a few minutes to get to work right, but it is also very versatile. You can change the frequency at will, and you can easily record off your radio. PART FIVE: HELPFUL HINTS First of all, With method one, the beige box, you may notice that you can also dial out on the phone you use. I don't recommend that you do this. If you decide to anyway, and do something conspicuous like set up a 30 person conference for three hours, then I suggest that you make sure the people are either out of town or dead. In general, when you tap a line, you must be careful. I test everything I make on my line first, then install it late at night. I would not recommend that you leave a recorder on all day. Put it on when you want it going, and take it off when you're done. As far as recording goes, I think that if there is a recorder on the line it sends a sporadic beep back to the phone co. I know that if you don't record directly off the line (i.e off your radio) then even the most sophisticated equipment can't tell that you're recording. Also, make sure that when you install something, the people are NOT on the line. Installation tends to make lots of scratchy sounds, clicks and static. It is generally a good thing to avoid. It doesn't take too much intelligence to just make a call to the house before you go to install the thing. If it's busy then wait a while. (This of course does not apply if you are making a "midnight run"). All in all, if you use common sense, and are *VERY* careful, chances are you won't get caught. Never think that you're unstoppable, and don't broadcast what you're doing. Keep it to yourself, and you can have a great time. -[ OVERLORD ]- THANKS TO: The CircleLord TARAN KING Knight Lightning The Forest Ranger P-80 systems Watch for more advanced tapping, how they catch you, and verification in the near future. ==Phrack Inc.== Volume One, Issue Three, Phile 6 of 10 Fortell Systems Written by Phantom Phreaker Call The Alliance at 618-667-3825 Fortell systems seem to be a system to monitor lines. They can only be used to monitor lines within their own NPA. A Fortell system is at 716-955-7750. Whene you call, you will hear: 'Hello. This is the Taradyne Fortell system. Please enter ID code' The ID for this system is 722877*. After you type that in (DTMF) it will ask 'please enter line number' where you then type the PRE+SUFF of the number you wish to check within the NPA of the Fortell. After you enter a number, it will repeat the number you entered. Now it will ask you to 'please enter mode'. The modes are: 1-Calling on other line 2-Calling on test line 3-Line test results If you enter mode 1, you will have these commands available: 1-Fault location 2-Other testing 7-Test ok, Monitor 8-Hang up 9-Enter next line number If you enter 7 here, it will repeat what you selected, and ask for an ID code which can be any 6 digit number followed by a *. Now it will dial and tell you: 'Subscriber busy-busy-monitor test in progress conversation on line-short on line' 2-Monitor test 3-Overide and test 4-Wait for idle If you enter 2, (Monitor Test) it will tell you the busy status again. If you enter 3, it will override, or tell you 'Not available in this CO'. If you enter 4, (Wait for idle) it will wait until the line is idle. If you enter 1 (Fault Location) at the main list you will get these options: 1-Open location 3-Short location 4-Cross location 5-Ground location 8-Hang up If you enter 2 (Other testing) here, you will have these commands: 2-Loop Ground OHMS 3-Dial tone test 5-Pair ID 8-Hang up If you enter Mode 2, you will have these options:(Other testing) 2-Other testing 7-Test ok, Monitor 8-Hang up 9-Enter next line number It will repeat what you selected. If you select 2 here, you will now have these commands: 2-Loop Ground Omhs 8-Hang up If you select 7 at the main list after mode 2, it will ask for an ID which is any 6 digit number followed by a *. Now it will dial and check the number. If the number is busy, it will say 'Subcriber busy-monitor-test in progress- conversation on line-short on line-please hang up-waiting for idle' Now you can just type * to go back to the main list of commands. If you enter MODE 3, if you have done a test before, it will give you the results of the test. If you haven't done a test, it will tell you so with 'No test results available' You can abort back to the main commands list by typing a *. By typing a 9 at several places you will be taken back to the beginning where it asks you to 'enter line number' PP-01/06/86 ==Phrack Inc.== Volume One, Issue Three, Phile 7 of 10 *************************************************************** * * * Electronic Eavesdropper * * * * by * * * * Circle Lord * * * *************************************************************** Have you ever considered buying one of those hi powered microphones often seen in eletronics magazines, but thought it was to much to buy and to small to card? The circuit shown in this file will provide you with the information to build one for a lot less money. These audio eavesdropping devices are probably one of the hottest items in the underground due to their ability to pick up voices through thick walls. You can also attach the speaker wires to a tape recorder and save all the conversation. As one can see these are great for blackmailing a teacher, classmate, principal, neighbor, or whoever you seek services from... Parts list: -=EM-------------------------- M1 Amplifier Module. (Lafayette 99C9037 or equiv.) M2 9-VDC battery. M3 Microphone R1 20K poteniometer with spst switch. S1 Spst switch on R1 SP1 8-ohm speaker T1 Audio transformer (Radio Crap part 273-1380) Schematics +------+--------M1 1 1 1 1 1red 1blu 1 1 1 1 transformer 1 1 1 1 1yel 1grn +------+ 1 1 +-----+ +-----+ 1 1 1 1 b1 b1 r+M2+b o+S1+o 1 l1 l1 e1 1l r1 1r 1 k1 u1 d1 1k g1 1g 1 ********************** 1 * yel>*-+ ++ * * R 1 * M1 * 1-+ 1 * red>*-+ 1 1 * * 1<< ********************** 1 b1 1g y1 1 l1 1r e1 1 k1 1y l1 1 1 1 +----------+ +SP1+ S1 here is on the potentiometer M3 can be an earphone earpiece ---- / / / / / / ircle / ord ---- ---- ==Phrack Inc.== Volume One, Issue Three, Phile 8 of 10 *************************************************************** * * * Making a Shock Rod * * * * By * * * * Circle Lord * * * *************************************************************** This handy little circuit is the key to generating THOUSANDS of volts of electricity for warding off attackers (notice the plural). It generates it all from a hefty 6-volt source and is easily fit into a tubular casing. Originally used as a fence charger, this circuit can be put to other uses such as: charging a whole row of lockers at school, a row of theater seats, or a metal bleacher set in the gym. More on this later. To build this, all you need is a GE-3 transistor, a 6.3-volt transformer, and a handful of spare parts from old radios. The ammount of shock you wish to generate is determined by the setting of potentiometer R1, a 15,000 ohm variable resistor. Hint: for maximum shock, set R1 at maximum! *************************************************************** Item * Description *************************************************************** C1 * 500uF, 10-WVDC electrolytic capacitor C2 * 2000uF, 15-WVDC electrolytic capacitor M1 * 6-VDC battery M2,M3 * Leads Q1 * GE-3 transistor (2n555 will also do) R1 * 15K potentiometer R2 * 160-ohm resistor S1 * Spst switch T1 * 6.3-VAC filament transformer (Triad F-14x or equiv.) X1 * 1N540 diode *************************************************************** Schematics: +---C1--------------+ 1 1 HOT 1 +-----+ 1 LEAD +---1 R1* + 1 +--->)( +-->* 1 1 1 )( 1 * +--+ 1 1 )(--> 1 1 1 1 1 1 1 TO 1 1 1 1 1 1 1 GND 1 * C2 1 +---1----+ 1 R2 1 1 1 1 1 * 1 1 1 X1 1 +---+--+--1---------1-->-+ 1 +/- 1 1 +*M1*-*S1*+ GND - ---- / / / / / / ircle / ord ---- ---- ==Phrack Inc.== Volume One, Issue Three, Phile 9 of 10 @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ _ _ _______ @ @ | \/ | / _____/ @ @ |_||_|etal / /hop @ @ __________/ / @ @ /___________/ @ @ PRIVATE @ @ @ @ Presents... @ @ @ @ \\\\\=-{ Knight Lightning's }-=///// @ @ @ @ "Introduction to PBXs" @ @ @ @ @ @ Written on January 3, 1986 @ @ @ @ @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ This file is a personal continuation of the PBX entry in the MCI Telecommunications Glossary. _______________________________________________________________________________ A telephone exchange serving an individual organization and having connections to a public telephone exchange is called a Private Branch Exchange (PBX). The PBX performs a switching function by connecting any extension in the private organization to an outside line. A PBX is actually a private switch that connects a group of telephones within an individual organization. Calls placed outside this individual group are connected to a telephone company's central office switch through trunks. A PBX may be operated by an attendant from the private organization or the switching system may be done automatically. Other terms that are commonly used interchangeably with PBX are: Private Automatic Branch Exchange (PABX), Private Automatic Exchange (PAX), and Computerized Branch Exchange (CBX). Although these terms were originally used to identify specific switch structures, today they are often used as synonyms. PBXs can use any of three basic switching methods: step-by-step (SxS), Cross-bar (X-bar), and computer controlled, to perform the basic function of switching. However, in addition to detecting calls and establishing a transmission link between two telephones, PBXs can do much more. The common control, often called a central processing unit (CPU), controls the switching matrix that connects the stations and trunks. The switching matrix of a PBX performs the same job as does an operator at a manual switchboard or a common control central office switch. The CPU, however, gets its instructions from the "stored program", which contains directions for activities, such as detecting calls, sending them over the best available route, and recording billing information. These computerized electronic switches are used to perform routine, as well as unique, functions that simply weren't practical or even possible with electromechanical switches. Just as in the public switched network, PBX switches make connection between instruments, or "key telephone sets". We're all familiar with key telephone sets, whether we know them by name or not. They're the business telephones that have six push-button keys lined up below the dial--a red button marked "hold" and five buttons or lines with flashing lights. Systems with PBXs and key sets have a great deal of flexability in planning for their needs because they can set up their codes to accomplish the functions needed in their particular situations. In fact, the PBX can be programmed so that each individual extension within a system can take advantage of features applicable to its own business needs. Some of the features that are availiable with PBXs and key systems are: call transfer, which allows internal or external calls to be transferred from one telephone to any other phone in the system; automatic push-button signaling, which indicates the status of all phones in the system with display lights and buttons; one-way voice paging, which can be answered by dialing the operator from the nearest telephone in the system; camp-on, in which a call made to a busy phone automatically waits until the line is idle; and internal and external conference capabilities, which enables outside callers to conference with several inside users. Some features automatically handle incoming telephone calls. Automatic call waiting not only holds calls made to a busy extension until the extension is free, but also signals the person being called that a call is waiting and informs the caller that he is on hold. Automatic call forwarding will send calls to employees who are temporarily in locations other than their offices, provided they "inform" the PBX where they can be found. Automatic call distribution automatically send an incoming call to the first extension that's not busy--a useful feature for situations in which any one of a group of persons in the organization can adequately respond to incoming calls. Another example is automatic call back, which allows a caller who reaches a busy line to ask the PBX to return his or her call when the line is free. Still other features provide services such as night telelphone answering, telephone traffic monitoring, and network or hot-line connection. These examples are but a sample from the features possible with computerized PBXs. =============================================================================== This is a very brief description of how to use and what to expect on a PBX. ------------------------------------------------------------------------------- Basically, you call the PBX and you will have to enter a code that can be anywhere from 4 to 6 digits (Note: some PBXs do not require codes). Then you will hear a dial tone. From here you would under normal circumstances dial: 9 + 1 (or 0) + NPA-PRE-SUFF, for long distance dialing or dial 8 for local dialing. The most common use of the PBX is to call Alliance Teleconferencing, a teleconference service offered by AT&T. To do this dial: 0700-456-1000,1002,1003,2000,2001,2002. Note: PBX codes are usually very simple and usually 4 digits. EX: 0000, 1111, 1234, etc =============================================================================== Look for a file on Alliance Teleconferencing coming soon... _______________________________________________________________________________ This has been a Knight Lightning presentation... @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ ==Phrack Inc.== Volume One, Issue Three, Phile 10 of 10 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Phreak World News II Compiled by \\\\\=-{ Knight Lightning }-=///// _______________________________________________________________________________ Retraction ---------- We at Phrack Inc, respectfully retract all statements made in last issue concerning Stronghold East Elite and the LOD. We are sorry for any inconvenience this may have caused you. _______________________________________________________________________________ Phreaks Against Geeks --------------------- This group was formed as a joke by The W(hack)o Cracko Brothers Inc. on a conference in December of 1985. The charter members were TWCB, taRfruS, Blue Adept, The Clashmaster, and a few others. Since then, Catcher in the Rye and the Slovak have tried to join. Later that month, Boston Strangler and Micro Man formed PAP, which stands for Phreaks Against Phreaks Against Geeks. Other opposers of PAG include: Hack Attack, The Detective, Kleptic Wizard and The Overlord 313. It is not known if these others are now in PAP or not. All of this nonsense was really started on the Dartmouth System and is mainly a local feud of phreaks in the Boston (617 NPA) area. _______________________________________________________________________________ Brainstorm Gets 10 Megs ----------------------- Finally, after several months of promises, Brainstorm (ELITE) now has a 10 Meg Hard-drive. As of January 1, 1986 Modern Mutant cleared the userlog of Brainstorm and a membership drive was started. Note: To become a member of Brainstorm, you will have to take a small (and more or less easy) filter. Some other new features on Brainstorm are online games; Karate, Football, and a hacking simulation. _______________________________________________________________________________ Anarchy Inc. Disbanded ---------------------- Anarchy Inc., a once very famous g-phile writing organization, has been disbanded. Basically because most of its membership are now attending college. _______________________________________________________________________________ Dartmouth Conferences To Be Abolished? -------------------------------------- This message was given on January 9, 1986 when a user would try to join a conference. XCaliber, Fantasie, Spectre, etc are not available until tomorrow. Due to pressure from Kiewit and some users, conferences have been disabled for one day. Hopefully this will remind some people that the conferences are a public service on the part of a few people and are not a "right". Recent abuse of the conferences has made caring for these conferences almost more trouble than they are worth. These abuses have also caused some users to complain to Kiewit. Too many complaints and they might vanish altogether. If everyone will work at keeping the conferences reasonably clean and free of abuse life will be much easier. Thank you for your time and appologies for the lack of conferences. You are no longer connected to conference "XYZ". Later, Corwin got pissed off by the password abuse that was going on and killed almost all non-Dartmouth student passwords. It is also rumored that he took down the DUNE bbs, however Apollo Phoebus says that it is a temporary thing and that DUNE will be going back up soon. _______________________________________________________________________________ MCI Employee Bust ----------------- Employees at MCI were creating fake accounts and then running up massive bills. Then later they would either credit the accounts or say that the subscriber reported code abuse. Any employee found doing this was fired. Another way these employees were cheating the company was by reporting code abuse on their own accounts, however MCI Security using CNA quickly caught these employees. Note: MCI Security has stated that the only real way that they can catch abusers of the phone company is by calling the numbers that the abusers call and asking them who they know making these calls. Information has been provided through MCI Security _______________________________________________________________________________ MCI/IBM Merge ------------- MCI Telecommunications company has merged with IBM and their phone industry SBS. This was an effort to join the two as strong allies against AT&T. IBM computers Vs. AT&T computers MCI Telecommunications Vs. AT&T Telecommunications Changes arising from this merger (if any) are not known, but none are expected for some years. _______________________________________________________________________________ The Life And Crimes of the W(hack)o Cracko Brothers --------------------------------------------------- The date is somewhere in December of 1984. Peter writes a code hacker for the Hayes and tells Tim NOT to use it on Sprint because they trace. Sometime later that night Tim received a call from Scan Man, sysop of P-80. Scan Man said he needed TWCB to hack him some Sprint codes cause he didn't have the time or a Hayes. Tim did it for him on the 314-342-8900 Sprint extender. He left it on all night and the next day while he was in school. Sprint traced him. At 9:00 AM the next morning agents from the FBI, AT&T, Western Union, GTE, and Southwestern Bell, arrived at TWCB's house. They were let in, bringing with them cameras and tape recorders among other equipment. Upon seeing this Peter blew into an upstairs extension and cancelled the dialing program, but not before the agents made sure it was the right place. All of TWCB's computer equipment was confiscated and Tim was taken downtown shortly after being picked up at school. Peter was sick and left home. Tim was later released in his mother's custody. They each received probation and 100 hours of county service. That was then... Recently TWCB has come under investigation for the following: Drug use and dealing, burglary, forgery, and fraudulent use of a credit card. Peter: 8 Class A Felony charges 1 Class A Misdemeanor charge 1 Class B Misdemeanor charge Tim: 6 Class A Felony charges 2 Class B Misdemeanor charges Note: Some of these misdemeanors are for not returning library books. Also it has been said that Tim has been in jail 11 times. Both members of TWCB are now enrolled in a reform school. The information in this article has been provided by TWCB, directly and/or indirectly. _______________________________________________________________________________ Blue Adept: Gone For Good ------------------------- Blue Adept, known for being an all around loser and Dartmouth impersonator, decided to try blue boxing. For some reason he decided to call an out-of-state trunk direct. Later that month Blue Adept and his parents received a phone bill with a charge around $386.00. This led to his being restricted from using the phone. Sometime after this incident Blue Adept received an invitation to join on a conference. He wasn't home but his parents decided to stay on and listen in. Blue Adept is not allowed on conferences anymore and all calls to him are now screened. _______________________________________________________________________________ Overlord 313 Busted: Step dad turns him in ------------------------------------------ Overlord's step-dad always would be checking his computer to see what was on it and what was nearby. Last week he noticed the credits in Overlord's file on Wiretapping, which can be seen in this issue of Phrack. He reported his findings to Overlord's mom. She had a talk with him and he promised to stop his evil ways. His step-dad didn't believe him for a second. 1/11/86 Step-dad goes on business trip, where he meets Ma Bell executive Don Mitchell. Step-dad asks all sorts of different questions regarding use of MCI dialups and Alliance Teleconferencing, and talks about how his step-son does all these things and more. Don strongly suggests that he reports this to the phone company... 1-13-86 HE DOES ------- No legal action against Overlord has taken place as of now. Information Provided by The Overlord of 313 _______________________________________________________________________________ Maelstrom 305 Busted -------------------- While I am not at liberty to revel all the information concerning this bust I will mention the bare facts. Maelstrom hacked into the Southern Bell Data Network (SBDN). This system happened to be local to him so he did not bother to use an extender. Unfortunately this system also had ANI (Automatic Number Identification). His computer and other equipment as well as all his files were confiscated as evidence. Information provided by the Maelstrom of 305 _______________________________________________________________________________ Whackoland BBS -------------- This bbs is now up and running strong. Its sysops are of course...TWCB Inc. 300/1200 Baud, and 40 Megs. It has unique features and great mods as well as Elite Sections. Call today... 314-256-8220. Note: Only 100 users will be kept so if you are just a beginner please don't bother to call. _______________________________________________________________________________ R.I.P. Broadway Show -------------------- The Broadway Show BBS in New York is now down, and Broadway Hacker will soon be in Washington DC. This C-64 run bbs, was one of the best in its time, but later it became a hangout for rodents. >From its ashes rises a new bbs, however its name has not been released as of this writing. Broadway Hacker will sysop this bbs for about a week and then turn it over to the new sysop. His name is not yet know, probably since he hasn't a handle yet. Although this new bbs will appear legal and have some legal sections it is indeed a phreak bbs, and should be checked out. 718-615-0580 _______________________________________________________________________________ Speed Demon Elite Down? ----------------------- This bbs sysoped by Radical Rocker has suddenly disappeared leaving the caller with a message of the line being disconnected. No other information is available. _______________________________________________________________________________ Well that's all for this issue's Phreak World News. If you have anything of news Knight Lightning/Taran King/Cheap Shades _______________________________________________________________________________