| ==Phrack Inc.== | |
| Volume One, Issue Three, Phile 2 of 10 | |
| The purpose of this file is to tell you what you would be dealing with if | |
| you stumble across this system, or if you know of a company that is using this | |
| system. It doesn't go into incredible detail, and is lacking in areas. It is | |
| not a guide to hacking into it, just letting you know what you would be dealing | |
| with. This is to pique your interest in the system. | |
| So What the Hell is ROLM? | |
| ------------------------- | |
| ROLM is a "Business Communications System" bought by IBM a few months ago, | |
| in an effort to compete effectively with AT&T, and get a larger share of the | |
| market, in a grand master plan to become "Big Daddy Blue" as opposed to "Ma | |
| Bell". It is a very complex system, with features such as PhoneMail, A | |
| Super-PBX, Local Area Networks, Public and Private Data Networks, Desktop | |
| Communications, and Call Management. | |
| The heart of the system is the Controller, called the CBX <Computerized | |
| Business Exchange>. This controls the entire network accessible through ROLM. | |
| Since 1983, the CBX was redesigned and upgraded to the CBX II. It is a PBX with | |
| much much more <See 'Introduction to PBX's' available on your local bbs> to | |
| offer, and that is ROLM's claim to fame. It is light years ahead of the regular | |
| PBX system. | |
| The CBX II | |
| ---------- | |
| The CBX II is the core of the ROLM network. It is computer driven and | |
| expandable from one node, with 165 channels, to 15 nodes providing 11,5200 | |
| 2-way channels. The smaller business could have a model with a 16 user maximum | |
| limit, but it can go up to 10,000 users, though this would be quite rare <and | |
| quite God Damn expensive!>. It can be accessed from outside lines <like you> as | |
| well as HardWired units, with a switching system to prevent busy signals on a | |
| port. Speed depends on the system in place, either the newer, faster ROLMbus | |
| 295, or the older standard ROLMbus 74. <see Service manuals for exact details> | |
| The larger the system, the faster as well. It is adjustable to accept different | |
| bandwidths for the various components, such as Telex, Voice, Data, Mainframe, | |
| LAN, Video <ta-da! Picturefones in reality!>, and anything hooked up to the | |
| system. Similar tasks can be bunched onto one channel as well, at high or low | |
| speeds. If multiplexing is used <above>, the maximum speed is 192,000 bps, and | |
| if using a single interface, the top possible rate is a mindboggling 37,000,000 | |
| bps, which if you ask me, if just fluff and not too practical, so they are | |
| usually multiplexed. <Now, what a difference that is from 300 baud!>. Using | |
| the CBX II network, you might find just about any kind of mainframe, from HP, | |
| to DEC, to VAX, to the IBM 327 series. | |
| Note : There is a smaller version of this called the VSCBX. | |
| Phone Mail | |
| ---------- | |
| This is one of the little beauties of the system, something truly fun to | |
| fuck with. I called ROLM Headquarters in California to ask specific questions | |
| about ROLM, posing as a researcher, and I got the big runaround, transferred | |
| from department to department. Maybe you can get further than I. Their is | |
| 408-986-1000. The to PhoneMail from the outside is 800-345-7355. A nice | |
| computer-generated voice comes on asking you to enter your Extension number | |
| <which each employee has>, and then enter the "" sign. Then enter your | |
| password. If you make around 3 or 4 bad attempts at an Extension of Password, | |
| it will automatically ring another number, assistance I assume, to find out why | |
| there has been an unsuccessful entry attempt. I haven't played around with this | |
| that much, so leave mail to Monty Python with whatever you find. Once entering | |
| an authorization with correct password, you will be presented with more | |
| options, leave messages to other people, and whatnot. You can hear your | |
| messages, forward them to another person, leave the same message to more than | |
| one person, change your welcome message, etcetera. The service is for those | |
| business-type pigs who never sit still for one minute, like they are | |
| permanently on speed. | |
| A Phone Mail Scenario | |
| --------------------- | |
| Let's say if Mr. Greed goes out to meet his secretary at a motel, but | |
| definitely has to get that important message from Mr. Rasta, who's bringing in | |
| $3 mil in Flake, and can't trust it to the person who would handle it <ie: the | |
| person filling in for his sec with the tremendous tits who is getting balled by | |
| the dirty old fat man>. Mr. Greed would have given Mr. Rasta his phone and he | |
| would be forwarded to the Phone Mail network, where he would hear a message | |
| left my Mr. Greed, to anyone who would call. Mr. Rasta would leave his message | |
| and hang up. Then Mr. Greed could call up the 800-345-7355 , punch in his | |
| extension authorization number, and password. Or, if he was back at the office, | |
| he could get it there through DeskTop communications. Messages can be delivered | |
| without error, in the person's own voice, without other people knowing about | |
| it. Therefore, someone with enough knowledge could use an unused account and | |
| use it as his own service, without the knowledge of others. | |
| DeskTop communications | |
| ---------------------- | |
| ROLM has developed a Computer/Telephone integrated device for use with the | |
| Desktop communications. It is linked with the CBX II through fone lines, thus | |
| accessible by you and me from the outside. It is not hardwired, though it can | |
| approach hardwired speed. If you could get your hands on one of these | |
| computer/fones then I think you would have found something very useful at home, | |
| in your general life. But you could access the network without the special | |
| features of the fone, like one touch dialing, which is designed for the stupid | |
| lazy businessman. You can access company databases through the network, | |
| mainframes, other people, just about anything as if you were right there and | |
| told your secretary to do it for you. There is special software used by the | |
| computers or computer/fone but it can be improvised and is just an aid. It uses | |
| a special protocol <Don't know what, try to get your hands on one by trashing a | |
| sales office>. What is great is that everything is tied together through | |
| telefone lines, and not RS-232C! Thus, there is an access port....somewhere. | |
| Scan the 's around the office using ROLM. How do you know if it is using | |
| ROLM one way or the other. Compile a list of local businesses, call them up | |
| saying "This is ROLM Customer Support. We have a report of a complaint in your | |
| CBX II network, let me speak to your supervisor please." If they say "ROLM? CBX | |
| II? We don't use that" then just apologize and go elsewhere. Or say that you | |
| are from ROLM corp and would like to know if the company is interested in using | |
| it to network its system. Like, if they have it already, they would say that | |
| they had it. And if they didn't, you would just give them a fake <or if | |
| you're nice the for the local sales office obtainable in the list below>. | |
| But you know what's REALLY Great? They have made the network link in mind | |
| for the person with a Computer IQ of about 0. Commands are in plain English. | |
| Here is a demonstration screen as seen in their brochure: | |
| CALL, DISPLAY or MODIFY | |
| Display groups | |
| ACCESSIBLE GROUPS: | |
| [00] PAYROLL [01] MODEM [02] IBMHOST | |
| [03] DOWJONES [04] DECSYSTM [05] MIS-SYSTM | |
| [06] DALLAS [07] SALES | |
| CALL, DISPLAY OR MODIFY? | |
| Call Payroll | |
| CALLING 7717 <which would be the ID code for the PAYROLL file> | |
| CALL COMPLETE | |
| **PAYROLL SYSTEM** <or whatever they want to call it> | |
| ENTER ACCOUNT CODE: | |
| See, nothing is confusing, everything pretty self-explanatory. There may be | |
| more than one person wanting to do the same thing you are, so if there is, you | |
| would be put on a queue for the task. It seems that those with an IBM would be | |
| best suited for ROLM hacking, because ROLM is owned by IBM, and the PC's used | |
| by the network are IBM. A person with a simpler fone/Terminal couldn't access | |
| something like their DEC mainframe, or something like that. By calling in, you | |
| could not run an application, unless you had a special interface, but you could | |
| access the database, which any dumb terminal could do. | |
| However, there are security levels. Thus one with a privileged account | |
| could access more things than one without it. Like Joe Schmoe in Sales couldn't | |
| get to Payroll . It seems that for non-IBM's to access some of the parts of the | |
| network, you would need an interface to become the same thing as a RolmPhone. | |
| Excessive 's of bad logon attempts, which would be construed as a linking | |
| error would notify the network manager, And if they saw that there was no | |
| hardware error, eventually, they would think of if they were somewhat | |
| experienced, you guessed it, hackers. | |
| The PBX | |
| ------- | |
| ROLM has something called Integrated Call Management <from here on known as | |
| ICM>. Now, when designing ICM, they must have taken into account the abuse | |
| possible in plain ol' PBX's. So they put in something called Call Screening. | |
| This will enable the company to restrict calls to certain 's and prefixes. | |
| Calls to non-business 's or certain areas can be screened out <"No personal | |
| calls on my time, Johnson!">, with the exception of 1 specific that you want. | |
| There is a choice of having a codeless, screened PBX, or a PBX where | |
| accounts are assigned to each employee, and the 's they call get recorded to | |
| that account. There can be privileged accounts where a large volume of calls | |
| would go relatively un-noticed. But I don't think that large-scale abuse of | |
| this system would be easy or practical. Calls are routed AUTOMATICALLY through | |
| the service where the rates are cheaper to the location dialed, which is pretty | |
| fucking cool. And, the PBX is accessible from the outside, using Direct Inward | |
| System Access, making it AB-useable. | |
| But what about if there is Equal Access in that area? It doesn't matter, | |
| the CBX will automatically access the service without you having to worry about | |
| it <hell, this is totally unnecessary for a hack/phreak, cause we ain't paying | |
| for the damn call anyhow!> | |
| BUT!: There is a use of Call Detail Recording, where information on all | |
| ingoing and outgoing calls are recorded. | |
| Conclusion | |
| ---------- | |
| Not a lot of research went into this file, but it did take a little while | |
| to type up, and all of the information is correct, to my knowledge. Anyone is | |
| free to expand on this file into a Part II. It was written to enlighten people | |
| about this system, and I hope this has helped a little bit. | |
| Sysops: You are free to put this file up as long as NONE of the credits | |
| are changed! <this means the Phrack, Inc. AND Personal credits>. Please give us | |
| a chance. | |
| Coming soon, to a telephone near you: The Return of The Flying Circus. Look | |
| for it. | |
| --Later On | |
| Monty Python <01/11/86> | |