| ==Phrack Magazine== | |
| Volume Four, Issue Forty-Three, File 15 of 27 | |
| [** NOTE: The following file is presented for informational purposes | |
| only. Phrack Magazine takes no responsibility for anyone | |
| who attempts the actions described within. **] | |
| *************************************************************************** | |
| Physical Access & Theft of PBX Systems | |
| A DSR Tutorial by : | |
| CO/der DEC/oder & Cablecast 0perator. | |
| (K)opywronged 1993, by Dark Side Research | |
| *************************************************************************** | |
| BACKGROUND | |
| ~~~~~~~~~~ | |
| July 1989, Mobil Oil Corporation Headquarters -- Fairfax, VA. | |
| Abundant technology, late hours, and shadows between city lights | |
| made up the typical environment CO/der DEC/oder repeatedly found | |
| adventure in. On one such night in the summer of '89, a reconnaissance | |
| outing landed him at the offices of Mobil Oil Corp. The door leading | |
| from the multi-level parking garage into the foyer was equipped | |
| with an access-request phone and a square black pad. The pad was flush | |
| with the wall, and sported a red LED in its center -- a rather imposing | |
| device used to read magnetic access cards. CODEC picked up the phone | |
| and listened to a couple rings followed by the voice of a security | |
| guard, "Good evening, security ..." | |
| "Evenin', this is Dick Owens with CACI graphics. I don't have a | |
| card, but just call upstairs and they'll verify." | |
| "Hold on, sir ..." | |
| Kastle Security's verification call registered as a sudden 90 VAC | |
| spike on Cablecast 0perator's meter. Clipped on the blue and white pair | |
| of CACI's incoming hunt group, Cable picked up on his TS-21: | |
| "Hello?" | |
| "This is Kastle Security. We've got a Dick Owens downstairs | |
| requesting access." | |
| "Yeah Sure. Let him in please." | |
| The security man took Codec off hold, "Okay sir, what entrance are | |
| you at?" | |
| "Garage level one." | |
| The door clicked, and in went the hacker-thief -- grinning. | |
| Another lock at the end of a hallway also hindered access, but a | |
| screwdriver, placed between door and frame, removed the obstruction with | |
| a quickly applied force. | |
| CACI was a graphics outfit sharing the same building with Mobil. | |
| After a perusal through its desks and darkened corridors turned up a | |
| cardkey for later use, Codec -- pausing casually along the way at the | |
| drunking fountain -- made his way to the opposite end of the hallway and | |
| into Mobil's mail receiving room. In contrast to elsewhere in the | |
| building, this room was chilly -- as if heavy air conditioning was | |
| nearby. There was also a faint roar of fans to enhance this notion. | |
| And behind a countertop in the direction of the noise, a split door could | |
| be seen through which mail and parcels were passed during business | |
| hours. Hardly an obstacle, he was on the other side in an instant. | |
| This "other side" was no less than a gateway to nirvana. At first he | |
| began taking in the sight of a mini-computer, console, and mass storage | |
| devices, but his eyes were virtually pulled to the giant on his left. | |
| It was the largest and most impressive PBX he had yet seen; a label | |
| above the five gargantuan, interconnected cabinets read, "AT&T SYSTEM | |
| 85." The hacker's heart raced -- he wanted to explore, control, and own | |
| the switch all at once. Within seconds his gloved hands caressed the | |
| cabinets while his hungry eyes scanned circuit pack descriptors, mouth | |
| agape. Codec grabbed some manuals, jotted down numbers to a modem | |
| stack, and reluctantly departed. A week later, he stole the switch. | |
| To the Dark Side Research group, the System 85 would be worth | |
| approximately $100,000 -- but to Mobil, the system was worth at least | |
| six times that figure. In its entirety it was more valuable, but DSR | |
| was only concerned with the guts; the digital circuitry of the system. | |
| When Codec reentered the building the following week, he was wearing a | |
| VOX headset attached to a hand-held 2-meter band (HAM) radio. This was | |
| strapped to his chest except for the rubber-whip antenna which protruded | |
| out of a hole in his jacket. His awestruck, gleeful countenance from | |
| a week prior had been replaced by a more grave expression, and the | |
| moisture now on his body was no longer from unconscious salivation | |
| but due to the sweat of anticipation and rapid movement. | |
| "Phase one complete," he spoke into the boom mic in front of his | |
| face. | |
| "Roger Nine-Two. Quit breathing on the VOX or adjust sensitivity, | |
| over." | |
| "Roger Nine-Three. Entering heavy EMI area," Codec acknowledged to | |
| one of the lookouts. | |
| Steps were retraced through the mail room, where several empty | |
| boxes marked "U.S. Mail" and a dolly were conveniently stored. The | |
| System 85 was shut down, cabinet by cabinet, as most of the circuit | |
| boards were hastily removed and boxed. Seven boxes were filled, | |
| requiring two trips with the dolly to a side door. | |
| "All units: ready for docking." | |
| "Roger Nine-Two. Standby. Nine-Three, okay for docking?" | |
| "Step on it, over ..." | |
| A Ford Escort with its hatch open raced up to where Codec and the | |
| boxes stood. Within fifteen minutes the circuit packs were unloaded in | |
| a public storage unit. Within half an hour, CO/dec DEC/oder, Cablecast | |
| 0perator, and the remainder of the night's crew were filling up with | |
| doughnuts of the nearby 7-11, observing local law enforcement doing the | |
| same. | |
| APRIL 1993: Security memorandum broadcast from wrq.com -- Internet | |
| "We've all heard of toll fraud as a way to steal telecommunications | |
| resources. Now the ante has been escalated. I've heard of a | |
| company on the East Coast that was having some minor troubles with their | |
| PBX. A technician showed up at the door and asked directions to the PBX | |
| closet. The company showed this person the way without checking any | |
| credentials, and about five minutes later the phones went completely | |
| dead. They went up to the PBX closet and found that several boards from | |
| the PBX had been removed and that the 'repairman' had departed." | |
| The theft of PBX circuit boards is a novel idea and seldom heard | |
| of, but -- as made apparent above -- it does occur. In the used PBX | |
| scene, often referred to as the "secondary" or "grey" market, there is | |
| always a demand for circuit packs from a wide variety of PBXs. The | |
| secondhand PBX industry grew from $285 million in 1990 to $469 million | |
| in 1992 -- despite the recession. | |
| The essence of any PBX is a rack or multiple racks of circuit | |
| cards/boards/packs, with an average grey market value of anywhere from | |
| $50 to $2000 each. The cards are lightweight, small in size, and can | |
| even withstand a moderate dose of abuse. Transport of misappropriated | |
| circuit boards is done without risk -- under and police scrutiny, a box | |
| of these looks like a mere pile of junk (or senior engineering project) | |
| in the trunk of your car. Furthermore, the serial numbers on the boards | |
| are seldom, if ever, kept track of individually, and these can be | |
| removed or "replaced" in any case. Unlike computer equipment or | |
| peripherals, PBX cards are extremely safe, simple, and non-proprietary | |
| components to handle -- even in quantity. | |
| Although you may wish to physically access PBXs for reasons other | |
| than theft, it will be assumed here that monetary gain is your motive. | |
| In either case, this introductory file makes it clear that access can be | |
| achieved with varying levels of ease. A PBX theft should be thought of | |
| in terms of two phases: reconnaissance and extraction. Recon involves | |
| finding and selecting prime targets. Extraction is the actual theft of | |
| the system. Both phases can be completed through "office building | |
| hacking," a wide variety of deception, breaking and entering, social | |
| engineering, and technical skills. | |
| Phase I : Reconnaissance | |
| PBXs are found where people's communications needs warrant the | |
| capabilities of such a system -- offices, schools, hotels, convention | |
| centers, etc. The PBXs we will concert ourselves with in this discourse | |
| however are those located in shared or multiple-leased office | |
| structures; the "typical" office buildings. The typical office building | |
| has enough floors to require an elevator, some parking space, a lobby, | |
| and a company directory (Because it is shared by more than one | |
| business). Companies that occupy an entire building by themselves are | |
| generally too secure to be worthwhile targets. | |
| Tenant companies in the typical building lease all different size | |
| office space -- some rent only 300 sq. ft., others take up entire | |
| floors. Those that use half a floor or more usually meet the criteria | |
| for PBX ownership. Obviously, the larger the firm's office at that | |
| site, the greater its PBX will be, so those business spread out over | |
| several floors will have the most valuable systems. This is not always | |
| an overwhelming factor in determining a target however. The smaller | |
| systems are often easier to get at -- and ultimately to remove -- | |
| because they tend to be located in utility closets off publicly | |
| accessible hallways as opposed to within a room inside an office space. | |
| Those closets, sometimes labeled "telephone" and even unlocked, will be | |
| found one or two per floor! Other closets may exist for electrical | |
| equipment, HVAC, plumbing, janitorial supplies, or for a combination of | |
| these uses in addition to telephone service. | |
| A phone closet is easily distinguishable whether or not a switch or | |
| key system is present. A web of low-voltage (22 AWG), multi-colored | |
| wiring will be channelled and terminated on a series of white "66" | |
| blocks mounted on the wall. These blocks are a few inches wide, and | |
| roughly a foot long, with rows of metallic pins that the wiring is | |
| punched into with a special tool. As a general rule, if the system is | |
| fastened to the wall and doesn't have at least one muffin fan built-in | |
| and running, it's either a measly key system or a PBX too small to | |
| deserve your attention. Those worthy of your time will stand alone as a | |
| cabinet with a hinged door, contain shelves of circuit cards, and | |
| emanate the harmonious hum of cooling fans. As an example, Mitel PBXs | |
| commonly fit cozily in closets -- sometimes even one of the newer ROLMs | |
| or a voice mail system. On the other hand, an NT SL-100 should | |
| not be an expected closet find. | |
| Wandering through office buildings in search of phone closets | |
| during business hours is easy, so long as you dress and act the part. | |
| You'll also want to look confident that you know what you're doing and | |
| where you're going. Remember, these buildings are open to the public | |
| and an employee of one company can't tell whether or not you're a client | |
| of another. When going in and out of the phone closets, who's to know | |
| you're not a technician or maintenance man? | |
| Apart from searching the closets, you can approach the secretaries. | |
| Feign being lost and ask to use the telephone. Steal a glance at the | |
| console and you'll know (with a little practice) what type of PBX | |
| they've got. This is very valuable information, for it may save you | |
| from unsuccessfully breaking into the closet (should it be locked) or | |
| the company itself. Secretaries are cute, courteous, and dumb. You | |
| shouldn't have a problem convincing her to give you the key to the phone | |
| closet if you're posing as a technician. If you're feeling as confident | |
| as you should be, you may even get a date with the bitch. And should | |
| you ever raise suspicion, you always have the option of bailing out and | |
| making a break for the stairwell. No business exec is going to chase | |
| you down. | |
| Some additional methods can be employed in conjunction with | |
| visiting the buildings, or as a precursor to such : | |
| -- Classified ads. A company with job openings is all the more | |
| vulnerable to your dark motives. Using the help-wanted section of your | |
| newspaper, look for receptionist and secretarial positions. Call and | |
| ask, "What type of phone system will I be required to handle?" You may | |
| also want to go in and apply for the job -- any job at a large firm will | |
| do. You'll learn the type of system installed, some details about | |
| security, etc; this is a very sophisticated way of "casin' the joint." | |
| -- Scanning for RMATS. Using your preferred wardialer (such as | |
| ToneLoc), scan business districts for PBX remote maintenance modems then | |
| CNA your finds. | |
| -- Targeting interconnects. Interconnects are PBX dealers that sell, | |
| install, and maintain the systems on contract. Capture a database of | |
| clients and you'll have a windfall of leads and pertinent info. AT&T | |
| allegedly sells its database by region. Also, intercept voice mail or | |
| company e-mail. Interconnects make decent targets themselves. | |
| -- Users groups and newsletters. Some of the extremely large PBX owners | |
| join users groups. Though this is abstract, owners will discuss their | |
| systems openly at the meetings. Newsletters are mailed out to members, | |
| often discussing special applications of specific locations in detail. | |
| Great for making sales contacts. | |
| Phase II : Extraction | |
| Removing the PBX calls for an assessment of obstacles versus | |
| available means and methods. The optimum plan incorporates a late | |
| afternoon entry with a nighttime departure. This means entering the | |
| building during business hours and hiding, either in the PBX closet | |
| itself or any room or empty space where you can wait until after hours | |
| to re-emerge. This is the most safest and effective of methods. You | |
| need not worry about alarms or breaking in from outside, and you can | |
| take advantage of one of the greatest weaknesses in corporate office | |
| security -- janitors. The janitorial staff, if you act and dress | |
| properly, will allow you to walk right into an office while they're | |
| cleaning. If you're already in an office and they enter, just act like | |
| you own the place and it'll be assumed you work there. If you prefer | |
| not to be seen, keep hidden until the cleaning is done on your floor. | |
| (Be sure not to make the idiotic mistake of hiding in the janitor's | |
| closet). Although the custodians will lock the doors behind them, any | |
| alarms in the building will remain off until cleaning for the entire | |
| structure is complete. | |
| There is simply nothing so elegant as entering the building during | |
| the daytime hours, hiding, and re-emerging to wreak havoc when | |
| everyone's gone. (A patient wait is required -- take along a Phrack to | |
| read). Unfortunately, entry will not always be so easy. The phone | |
| closet may have a dead-bolt lock. There may be no feasible hiding | |
| place. People may constantly be working late. Because of all the | |
| potential variables, you should acquire a repertoire of means and | |
| methods. Use of these methods, though easy to learn, is not so quickly | |
| mastered. There is a certain "fluidity of technique" gained only | |
| through experience. Deciding which to use for a given situation will | |
| eventually come naturally. | |
| -- Use of tools. You can easily get around almost any office building | |
| using only screwdrivers. With practice, prying doors will be quick and | |
| silent. Although some doors have pry-guards or dead-bolts, about every | |
| other phone closet you'll encounter can be opened with a screwdriver. | |
| Before forcing the gap between door and frame, try sliding back the | |
| locking mechanism. For best results, work it both ways with a pair of | |
| screwdrivers; a short one for leverage, a longer one for manipulation. | |
| For dead-bolts, a pipe wrench (a wrench with parallel grips) can | |
| turn the entire lock 90 degrees. Interior doors are cheaply | |
| constructed; if you can wrench the lock, it'll turn and the bolt will be | |
| pulled back into the door. Quality dead-bolts have an inclined exterior | |
| to prevent it from being gripped. For these, diamond-cutting string can | |
| be applied. This is available at select plumbing supply houses for $150 | |
| upwards. | |
| -- Ceilings and adjacent offices. Not only are the doors cheap inside | |
| office buildings, so are the walls. If you're having trouble with a | |
| door or lock, push up a ceiling tile with your screwdriver and see if | |
| the wall stops or is continuous. If it stops, you may choose to climb | |
| over. If you're already inside an office and find a particular room | |
| locked, climbing is always an option because walls are never continuous | |
| between rooms. Walls are seldom continuous between business either; if | |
| you can't get into a particular office space, try through adjacent | |
| space. | |
| -- Brute force. If making noise is not a serious concern, a crowbar | |
| will pry any door open. For most situations requiring this level of | |
| force, a sleek, miniature bar is all you need. You can also saw or | |
| hammer your way through any interior wall. Once you've made a hole in | |
| the sheetrock, you can practically break out the remainder of an opening | |
| yourself using only your hands. | |
| From the outside, windows can be broken or removed. Office | |
| building glass is installed from the outside, so by removing the seal | |
| and applying a suction device, you can pull the entire window out. | |
| Breaking the glass is not too difficult, but frighteningly loud. Using | |
| a screwdriver, push the blade between the edge and its frame and pry. | |
| Eventually you'll have holes and cracks running across the window. | |
| Building glass is typically double-paned; once through the exterior | |
| layer, you'll have to break the next. Because the second layer isn't as | |
| thick, you have the option of prying or smashing. This sounds extremely | |
| primitive -- it is, but it may be the only method available to you. | |
| Highly-alarmed office structures do not have the windows wired. When | |
| there's a 5,000-port NEC NEAX 2400 in view and alarms everywhere else, | |
| you'll break the fucking glass. | |
| -- Alarm manipulation. Entire files could be written on this subject. | |
| Some relevant facts will be touched on here; no MacGyver shit. | |
| Our "typical" office building, if alarmed, has one of three types | |
| of alarm plans. The alarm system is either externally-oriented, | |
| internally-oriented, or both. More often than not, externally-oriented | |
| alarm systems are encountered. These focus on keeping outside intruders | |
| from entering the building -- interior offices are secured only by | |
| locks. Alarm devices such as magnetic switches and motion detectors are | |
| in place solely in lobby areas and on doors leading from outside. If | |
| you know in advance that you can readily enter any of the offices, the | |
| alarm is harmless. After entering, go directly into the office and look | |
| out the window. Eventually, security or police will arrive, look | |
| around, then reset the alarm and leave -- so long as you haven't left | |
| any trace of your entry (damaged doors, ceiling tile fragments, etc). | |
| Although common areas and corridors will be briefly scanned, no company | |
| offices will be entered. | |
| Internally-oriented alarm plans include alarms on individual | |
| offices and are more difficult to reckon with. However, the sensors are | |
| only on the doors; any method that avoids opening the door can still be | |
| used. | |
| Access controls like cardkeys are impressive in appearance but do | |
| not automatically represent an alarm. If you open the door without | |
| inserting a cardkey, the system must be equipped to know whether a | |
| person entered the building or exited. Thus, only those systems with | |
| motion detectors or a "push button to exit" sign and button can cause an | |
| alarm at the cardkey-controlled door. Otherwise the door and cardkey | |
| device is no more than a door with an electronic lock. There are always | |
| exceptions to the rules, of course; never trust any alarm or access | |
| control system. Sometimes a system will be programed to assume any | |
| opened door is someone entering, not exiting. Check for sensors -- | |
| mounted flush on the door frame -- look carefully, they'll sometimes be | |
| painted over. Check both sides and top of the frame. If a sensor is | |
| found (or when in doubt) hold the door open for about ten seconds, then | |
| wait and watch for up to an hour to see if there's a silent alarm. | |
| For the "push button to exit" entrances, you can sometimes use a | |
| coat hanger or electricians fish tape to push the button from outside | |
| using cracks around the door. Where motion detectors automatically open | |
| the entrance, similar devices can be employed to create enough commotion | |
| to activate the detector (depending on detector type). | |
| Disabling part of the alarm system may be a possibility during the | |
| day. Chances are, if you can access the control CPU you've also got a | |
| place to hide, and the control box is often alarmed against tampering | |
| anyway. Many of the latest systems are continuously monitored from a | |
| central station. If not, you can disconnect the alarm box from its | |
| phone line. Your best approach however is to alter a door | |
| sensor/magnetic switch circuit. You can use a piece of conductive hot | |
| water duct tape to trick the sensor into thinking the door is always | |
| closed. This tape looks like tin foil with an adhesive on one side. | |
| Obtain a similar sensor and test at home before relying on this -- | |
| magnetic switches come in many shapes and forms. The better systems | |
| don't even check for normally-open or normally-closed states, but for | |
| changes in the loop's resistance. This means simply cutting or | |
| shorting the lead wires won't suffice. But if the conductive tape won't | |
| do, you can always just cut the leads and return in a couple days. If | |
| the cut hasn't been repaired, then you have an entry point. Building | |
| managers become lax with an alarm system after it's been installed for a | |
| while and there haven't been any break-ins. Other loops are disabled | |
| after late-working employees repeatedly off the alarm. One other option | |
| is to cut and splice both parts of the sensor back into the loop so that | |
| it remains unaffected by movement of the door. The throughways to | |
| target for any of these alterations are minor side doors such as parking | |
| garage or stairwell exits. You should be pleasantly surprised with the | |
| results. | |
| -- Locks and picks. (This could be another textfile in itself). | |
| Lockpicking is an extremely useful skill for PBX appropriation but | |
| requires quite a bit of practice. If you aren't willing to invest the | |
| time and patience necessary to become effective with this skill, | |
| screwdrivers are the next best thing. Furthermore, with all the | |
| different types and brands of locks in existence, you'll never be able | |
| to solely rely on your lockpicking skills. Acquire this ability if your | |
| involvement in underworld activities is more than just a brief stint... | |
| You can more readily take advantage of the skills possessed by | |
| locksmiths. Because the offices within a typical building all use the | |
| same brand lock with a common keying system, any of the locks can yield | |
| the pattern for a master key to the whole system. Obtain a spare lock | |
| from the basement, maintenance room, or anywhere extra doors and | |
| hardware are stored, and take it to a locksmith. Request a key for that | |
| lock and a master. Many of the offices should now be open to you. | |
| Some keys are labeled with numbers -- if the sequence on the key | |
| equals the number of pins in the lock, you can write down the number and | |
| lock brand, and get a duplicate of the key cut. | |
| There is also a little locksmithing you can do on your own. With a | |
| #3 triangular "rat tail" file and a key blank to the brand lock you are | |
| targeting, you can make your own key. Blanks are either aluminum or | |
| brass and scratch easily -- this is no accident. By inserting a key | |
| blank in the lock and moving it from side to side, you'll create | |
| slate-colored scratch lines on the blank from the lock's pins. The | |
| lines will indicate where to begin filing a valley -- there'll be one | |
| for each pin. Move the file back and forth a few times and re-insert | |
| the key to make new lines. Use the point of the file only when | |
| beginning the valley; successive passes should not create a point at the | |
| bottom of the cut but leave a flat gap. When no new scratch appears on | |
| the bottom of a particular valley, don't file the valley any deeper -- | |
| it's complete. Eventually, all the valleys will be cut and you'll have | |
| a key to open the lock. | |
| Last but certainly not least, you can drill most locks where a | |
| little noise can be afforded. Using a 1/4 inch Milwaukee cordless drill | |
| with about a 1/8 inch carbide-tipped bit, you can drill a hole the | |
| length of the lock's cylinder. Drill approximately 1/8 inch directly | |
| above the keyhole. This destroys the lock's pins in its path, and | |
| allows others above to fall down into the hole. Now the cylinder will | |
| turn with any small screwdriver placed in the keyhole and open the lock. | |
| Little practice is demanded of this technique, and it's a hell of a lot | |
| of fun. | |
| -- Elevator manipulation. Elevators can be stubborn at times in | |
| rejecting your floor requests. Companies that occupy entire floors must | |
| prevent an after-hours elevator from opening up on their unattended | |
| office. If there's a small lock corresponding or next to that floor's | |
| selection button, unscrew the panel and short out the two electrical | |
| leads on the other end of the lock. Continue to short the contacts | |
| until you press the button and it stays lit -- you'll then arrive at | |
| your desired floor. | |
| The elevator motor and control room is located either on the roof | |
| or penthouse level and can be frequently found accessible. Besides | |
| being a place to hide, sometimes you can find a bank of switches that | |
| override the elevator's control panel (if for some reason you can't open | |
| it or it's cardkey-controlled) and get to your floor that way. Two | |
| people with radios are needed to do this -- one in the equipment room, | |
| one in the elevator. Watch for high voltage and getting your coat | |
| caught in a drive belt ... | |
| Operation Integrity | |
| By taking advantage of daytime access, hiding places, and some of | |
| the more sophisticated methods, there's no need to become an alarm | |
| connoisseur or full-blown locksmith to liberate PBX equipment. When | |
| you can't avoid nighttime activity or an activated alarm system, then be | |
| sure to take extra precautions. Have lookouts, two-way radios, even a | |
| police scanner. Don't use CB radios, but rather HAM transceivers or | |
| anything that operates on proprietary frequencies. This will require a | |
| small investment, but there's no price on your safety. | |
| Office buildings in downtown areas tend to be more secure than | |
| those in the suburbs or outlying areas. Location and surroundings are | |
| important considerations when your operation takes place at night. It | |
| should also be noted that a building without a security guard (typically | |
| the norm) may still subscribe to sporadic security checks where | |
| rent-a-cops drive around the building at some regular interval. | |
| With regard to transportation and storage, rent vehicles and | |
| facilities in alias names where appropriate. Use taxis to pick you up | |
| when you're departing with only a briefcase or single box of cards. No | |
| matter what the time may be, anyone seeing you enter a taxi in front of | |
| the office will assume you're legit. | |
| It is our sincere wish that you apply this information to the | |
| fullest extent in order to free yourself from becoming a mere tool of | |
| capitalism, and use this freedom to pursue those things in life that | |
| truly interest you. We have tried to summarize and convey enough | |
| basic information here to provide you with a complete underground | |
| operation possibility. All material in this file is based on actual | |
| experience of the authors and their associates. | |
| For information on the sale of PBX or other telecommunications | |
| equipment, or for any other inquiry, contact the Dark Side Research | |
| group at the following Internet address : | |
| codec@cypher.com | |
| *************************************************************************** |