| ===Phrack Inc.=== | |
| Volume Three, Issue Thirty-one, Phile #3 of 10 | |
| /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\ | |
| / * * \ | |
| \ / | |
| / Hacking Rolm's CBXII/9000 \ | |
| \ by DH / | |
| / 05/24/90 \ | |
| \ * * / | |
| \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ | |
| Introduction | |
| ------------ | |
| IBM Rolm's CBXII/9000 is a very powerful machine. Powerful in the aspect | |
| that one has the switch(s) at his control. Controling switches means you can | |
| control the entire PBX environment (And it's users). | |
| This file will not get technical. Basically, I'm writing this file on | |
| the HOW-TO's of the internal works of CBXII and the basics of obtaining the | |
| dialups and account information need to access the machines. For further | |
| information on CBX's in general, read Epsilon's Phrack Phile on them, or | |
| consult Evil Jay's phile on OSL's. | |
| Obtaining Dialups | |
| --------- ------- | |
| Obtaining dialups unfortunately is the hardest part of hacking CBXII's. | |
| (Yes, even harder than hacking them). There are several ways to obtain the | |
| dialups. I would say a good bit of CBX's are at universities and hospitals | |
| where they own their own switches. Most of the time you can determine if they | |
| have one by calling the Telecommunications Department of the target location. | |
| Or, another way is to check with ROLM. If you *KNOW* that a target location | |
| has a CBXxx machine, you can call ROLM's 800 wats line and say your with the | |
| Telecommunications Department and your looking for the DIALUP. Rolm has files | |
| on all their CBXxx's and the Dialups also. They might ask you for a NODE # | |
| for the dialup, and you should usually respond with what node you want (Since | |
| different nodes handle different areas of the PBX). Basically, nodes start at | |
| ONE and usually goto THREE or FOUR, depending on the size of the PBX. | |
| CBXxx's are greatly compatible of IBM Rolm's Phone-Mail system (Which | |
| is a highly used and common voice mail system). This of course doesn't mean | |
| that every PHM (Phone-Mail) system has a CBXxx attached. But it is generally | |
| a good start. | |
| The following is a checklist to determine if the target location could | |
| have a CBXxx for controlling their switch. By no means however, if your target | |
| location has all of the following it could have a CBXxx. | |
| 1) Does the location handle it's own switch? | |
| If so, what kind, and who services it. | |
| 2) Does IBM Rolm handle any aspect of their telecommunications | |
| department? | |
| If so, this is a possible CBXxx location. | |
| 3) Does the location have Rolm Phone-Mail? | |
| These three guidelines are not requirements. I.E. -- The location | |
| could have a non-IBM PBX but still have a CBXxx for handling the switch. | |
| So who knows.. It's up to you and your bullshitting and scans. | |
| Hacking the CBXxx's | |
| ------- --- ------- | |
| Well, once you have obtained the dial-ups, you are almost halfway | |
| there. Hacking the CBX is the easy part. 1st off, IBM Rolm ships *ALL* | |
| of their machines with a default account (Yes, and they never change it). | |
| When the destination of the CBX recieves the machine, they use the default | |
| to create other accounts for employees, PBX operators, and administration. | |
| Rolm IBM also has a field support account embedded in the machine. These | |
| are different to each location and correspond to the serial number of the | |
| machine (Rolm's accounts can be obtained from Rolm's 800 technical support | |
| line). So, now that we know that there is a default account that telecom | |
| department uses to setup the other accounts after they recieve the machine, | |
| tells us that this is a priviledge account. And it is. | |
| USERNAME: SU | |
| PASSWORD: SUPER | |
| How nice for them to give us such power. Yes, it's a basic default | |
| with SuperUser priviledge. If for some reason the account default has been | |
| changed, their are other ways of getting in: | |
| 1) Call Rolm and get the Field account information. | |
| 2) Try first names of Telecom Dept. employees, and PBX Operators. | |
| 3) Use every Hacking skills you have (If any). | |
| Some older versions of CBX don't even require logging in with an | |
| account. Those versions are less responsive to the administrators needs, | |
| but can be useful to one also. Don't be discouraged if the SU password is | |
| changed, just call Rolm and get the field account. | |
| The following is the matrix before one access the machine. *Note that | |
| it clearly identifies* *Also: Accessible at 300 baud and e,7,1* | |
| CONNECT ID banner | |
| _Release version # / | |
| / /\ | |
| Rolm CBXII RELEASE 9004.0.65 RB74UCLA11956 | |
| BIND DATE: 8/SEP/88 \ | |
| YOU HAVE ENTERED NODE 1, CPU 2 \_Name of owner, IE: UCLA | |
| 11:14:30 ON FRIDAY 2/11/1990 (System ID) | |
| USERNAME: xxx | |
| PASSWORD: xxx | |
| INVALID USERNAME-PASSWORD PAIR. | |
| Once your in | |
| ---- ---- -- | |
| Once your in, you should have no problems wondering around the | |
| machine and using the utilities in the machine's operating system. There is | |
| very specific help functions inside the machine that will guide you through | |
| with no problems. At the CBX prompt: | |
| %. HELP ? | |
| or | |
| %. ? | |
| Should produce a valid listing of options and sub-functions. Every | |
| function can be followed with a '?' to give lists of valid sub-functions under | |
| that function or how the syntax of that function should be used. | |
| The following is a listing of commands for CBXII/9000: | |
| ABORT ACTIVATE ATTR BYE | |
| CANCEL CARD CDRSM CDT | |
| CHANGE CHG CLEAR CLR | |
| CMPCT CMSTS CNCL CNFG | |
| CONVERT COPY CPEG CTMON | |
| CTRA CTRTL CXCLR COPY | |
| CXCLR CXCON CXNET DACK | |
| DADD DAEVT DANS DBDMP | |
| DCAT DCF DCOM DDMA | |
| DDQ DDT DE DEACTIVATE | |
| DEFINE DELETE DEMOUNT DESUM | |
| DEX DFACK DFCOM DFEAT | |
| DFEVT DHTQ DHWS DIAG | |
| DIQ DISABLE DIWQ DKQ | |
| DML DMNT DMS DMTST | |
| DOWN DPATR DPMR DPMS | |
| DPPRI DPTR DQQ DRCT | |
| DREGS DSBLE DSQ DSST | |
| DSTAK DTCB DTDQ DWQ | |
| DX_TR ENABLE ENB ENBLE | |
| ETIO EX EXM EXN | |
| EXP EXPAND FINIT FORMAT | |
| FREER FSD GTOD HDBST | |
| HELP INSTALL KPFA LCT | |
| LIST LOAD LOGOFF LOGON | |
| LPEG LPKT LSCT LSL | |
| LST LTCB MNT MONITOR | |
| MOUNT MTRACE NEXT NSTAT | |
| PAGE PCNFG PDIO PFA | |
| PKTS PLIST PLTT PPFA | |
| PS PSH QAT QITM | |
| QTEST RCT RECEIVE RENAME | |
| REPLY RESTART RESTORE REVERSE | |
| RM RMOFF RPFA RSC | |
| RSCLK RSTOR RSTRT SAT | |
| SCAN SEND SET SHOW | |
| SITM SOCON SOUNC SSAT | |
| START STATE STATUS STEST | |
| STOD STOP STRT STS | |
| TDCD TEST TKSTS TRTL | |
| TST TX UNLK UNLOCK | |
| UP VERIFY XDEF XMIT | |
| XPND | |
| These commands can be executed from and '% ' prompt. If the command is | |
| followed by a '?', more information will be supplied about the command. | |
| Using the ICI | |
| ----- --- --- | |
| The Interactive Configuration Interface controls immediate changes in | |
| the switch and PBX environment. The Utility is explained in great detail | |
| through the actual running of it. You can access the ICI by typing: | |
| % CNFG | |
| CBXII/9000 | |
| INTERACTIVE CONFIGURATION INTERFACE | |
| CPU 2 | |
| 15:14:32 ON FRIDAY 5/02/1990 | |
| COMMAND: | |
| This is the main command prompt. From here you can exercise the '?' | |
| help list to get valid commands. There are four phases of the ICI utility: | |
| Modify, Create, List, and Delete. These can be used on Extentions, Trunks, | |
| Logon accounts, Feature Group sequences, Data_line access, Trunk Groups, ect. | |
| The following is a sample of using 'list' to list a current extention in the | |
| PBX: | |
| _Forward to EXTN 2000 | |
| COMMAND: LIST EXT 4038 / _Outside number | |
| / FORWARD ON / to forward to | |
| FORWARDING BSY RNA DND / | |
| EXTN TYPE COS TARGET1 TARGET2 I E I E I E RINGDOWN NAME | |
| ---- ---- --- ------- ------- - - - - - - -------- ---------- | |
| DS 4038 EXTN 56 2000 1 1 1 1 1 1 95551212 R.STABELL | |
| \ \ \ / / \ \ | |
| Extention / -Class of service if R Auto. Forward Owner of | |
| --Type of line BUSY I No Matter What EXTN. | |
| (Reg. Extention) N | |
| G | |
| Note: The 1's specifies to forward to target#1 & NO ANSWER | |
| (As 2's would mean forward to #2 target) | |
| This should detail how to modify a listing like above using the 'MODIFY' | |
| command in the ICI. Once modified, all transactions are processed immediately. | |
| Using the 'Delete' command one can delete extentions, trunks, ect. | |
| So now we have the following commands in ICI: MODIFY, DELETE, LIST, CREATE. | |
| Each can be used with the following "Nouns" to modify that "Noun": | |
| BUTTON_120 BUTTON_240 CDR_EXCLUDE CNFG_ERRORS | |
| CNFG_QUEUE CNFG_STATUS CNFG_USERS COM_GROUP | |
| COS_FEAT DATA_ACCESS DATA_DEVICE DATA_GROUP | |
| DATA_LINE DATA_SUBMUX DLI ETS | |
| EXTEN FAC FAC_TYPE FAMILY | |
| FEAT_CODE FIRST_DIGIT HD_GROUP LEX | |
| LOGON_PROFILE MAP MEM_PARTS PARAM | |
| PICK POWER Q_TYPE ROUTE_LIST | |
| RP RPD RPI RPS_120S_ON | |
| RPS_240S_ON SAT_NAME SEARCH_SEQ SECTION | |
| SECURITY_GROUP SERVICE_LIST SIO_PARTS SLI | |
| SPEED T1D3 T1D3_GRP TRUNK | |
| TRUNK_GROUP VPC | |
| The FAMILY, LOGON_PROFILE, and CNFG_USER all deal with the accounts on | |
| the system. One can use MODFIY or CREATE to set them up an account with SU | |
| access. The FAMILY noun is the listing of the groups with different access, | |
| to different "nouns" available. I.E.: Not everyone can access the CHANGE | |
| LOGON_PROFILE to create an account. | |
| To create an account with SU access, type (while in ICI): | |
| % CREATE LOGON_PROFILE | |
| ENTER NAME (1-12 CHAR): TEST | |
| ENTER PASSWORD: TEST | |
| RETYPE: TEST | |
| Next it will ask you for a family. For SU access, type "SYSTEM_ADMIN". | |
| After family, the machine should prompt you for a "verb". Verbs are the actual | |
| functions or commands, so in this environment you can set the commands a user | |
| can access. So, for SU, enter "ALL" for every command access. | |
| To get a valid listing of users online, try this: | |
| % LIST CNFG_USERS | |
| NUMBER OF USERS MAX NUMBER OF USERS | |
| 3 5 | |
| PORT USER_NAME START_TIME HOW_LONG | |
| 17 SU 17:47:57 0:28:34 | |
| 2 FIELD 18:16:03 0:0:28 | |
| 3 MARYB 18:16:03 0:10:03 | |
| Using the Monitoring Utility | |
| ----- --- ---------- ------- | |
| This command is one of the more powerful commands in the CBXxx system. | |
| The monitor command should be invoked from within the main function command | |
| level and not in the ICI level. The monitoring command allows you to actually | |
| watch or monitor TRUNKS and EXTENTIONS. So, if I were to type: | |
| % MONITOR EXT 4038 | |
| 10:02:43 ON FRIDAY MAY/02/1990 | |
| EXT# STATE DI CODE DIGITS PROCESS STATUS | |
| ---- --------------- -- ---- ------------- ------------ ------ | |
| 4038 IDLE STN FWD NUM FWD | |
| \ \ / / / \ | |
| Extention Not in use Standard \ / Forwarded | |
| Extention \ / | |
| Forwarded to | |
| a number | |
| This shows the extention to be IDLE and not in use. But, with forwarded | |
| call processes to a standard number. You would have to use ICI to look up the | |
| number it's forwarded to if you wanted. | |
| % MONITOR EXT 4038 | |
| 10:03:44 ON FRIDAY MAY/11/1990 | |
| EXT# STATE DI CODE DIGITS PROCESS STATUS | |
| ---- -------------- -- ---- ------------- ----------- ------ | |
| 4038 DIAL TONE STN FWD NUM FWD | |
| 4038 DIALING Y 9 / \ \ \ | |
| 4038 DIALING Y 92 S F N \Extention | |
| 4038 DIALING Y 923 t o u Forwarded | |
| 4038 DIALING Y 9233 a N r m | |
| 4038 DIALING Y 92334 n u w b | |
| 4038 DIALING Y 923345 d m a e | |
| 4038 DIALING Y 9233456 a b r r | |
| 4038 DIALING Y 92334564 r e d | |
| 4038 CONN T025N N \ d r e | |
| / \ / \ d | |
| \ \ \_Dialing NO \_Number dialed | |
| \_Extention \ | |
| Connected to | |
| Outside trunk T025N | |
| This monitoring shows the extention actually dialing the number, and then | |
| connecting to an outside truck. Unfortunatley, one we cannot monitor without | |
| access to a bell switch. | |
| Monitoring can also be done with trunks. I will not display any trunk | |
| monitoring since it is quite simple to decypher. | |
| Manipulating the switch | |
| ------------ --- ------ | |
| There are many ways you can manipulate the CBX's to gain accounting | |
| information on data lines within the PBX environment. One sure-fire method | |
| would be to forward an actual data dial-up extention to a bridge or loop and | |
| then write an emulation to intercept the user's account information real-time | |
| as they connect to your fake dial-up. | |
| Or perhaps if an university uses the CBX, one could maybe forward the | |
| computer help desk extention to a bridge or loop and as an unsuspecting user | |
| calls up, ask him what machine and account info he has access to for a help | |
| log sheet you are taking. | |
| Who cares. Who knows. There are thousands of things you can do to use | |
| the CBX to your advantage. Hell, you have the whole switch at your command. | |
| DH - 05/11/90 | |
| _______________________________________________________________________________ | |