| .oO Phrack Magazine Oo. | |
| Volume Seven, Issue Forty-Nine | |
| File 3 of 16 | |
| // // /\ // ==== | |
| // // //\\ // ==== | |
| ==== // // \\/ ==== | |
| /\ // // \\ // /=== ==== | |
| //\\ // // // // \=\ ==== | |
| // \\/ \\ // // ===/ ==== | |
| ------------------------------------------------------------------------------ | |
| CUERVOCON 96 CUERVOCON 96 CUERVOCON 96 CUERVOCON 96 CUERVOCON 96 | |
| Tengo que hable con mi abogado. | |
| ---------------------------------------------------------------- | |
| What : A computer/telephony/security conference. (show this part to your | |
| boss.) | |
| Where: Fort Brown Hotel, Brownsville Texas. | |
| When : 28 & 29 December, 1996 | |
| Who : The usual gang of cretins. | |
| Why : It's winter, and it is 12 degrees outside. The dumpsters are frozen | |
| shut, and there are icicles on the payphones. Brownsville is at the | |
| Southern-most tip of Texas, right up against...Mexico. Yes, Mexico, | |
| land of cheap cerveza, four-dollar strippers, and liberal drinking | |
| laws. Mexico, where you too can own your very own Federal law | |
| enforcement official for a fistful of pesos. | |
| ---------------------------------------------------------------- | |
| Speakers | |
| Anybody wishing to speak at CuervoCon should send | |
| e-mail to the address at the bottom of this announcement. | |
| Currently the list includes: | |
| u4ea (by teleconfrence) | |
| Major | |
| ReDragon | |
| Caffiend (about her Breasts) | |
| daemon9 (about his Breasts) | |
| ---------------------------------------------------------------- | |
| Events | |
| "How Much Can You Drink?" | |
| "Fool The Lamer" | |
| "Hack The Stripper" | |
| "Hack The Web Server" | |
| "sk00l" | |
| "Ouija Board Hacking" | |
| ...as well as a variety of Technical Presentations. | |
| ---------------------------------------------------------------- | |
| General Information | |
| The Fort Brown Hotel will have available to us, 125 rooms at the holiday in @ | |
| $55 a room, and $75 rooms at the ramada @ $45 each. The Fort Brown was | |
| previously an actual fort when it was closed down by Uncle Sam. It became one | |
| large hotel until it was recently purchased and split into the Holiday Inn and | |
| the Ramada. The Fort Brown was chosen because it is across the street from | |
| the bridge to Mexico. You can call the Fort Brown Ramada at: | |
| 210-541-2921 | |
| You can call the Fort Brown Holiday Inn at: | |
| 210-546-2201 | |
| Call for reservations, make sure to tell them your with CuervoCon. | |
| Friday and Saturday the con will be in the 'Calvary' room. While Sunday we | |
| have the 'Fortress Room' where all the big speakers will be. Friday and | |
| Saturday we will have a few speakers and activities. Friday Night mainly, | |
| so we can have people arrive on time. We hope to have the con room open 24 | |
| hours a day. | |
| Brownsville is right on the Mexican border, adjacent to the Mexican town | |
| Matamoris. The Gulf of Mexico is 25 miles away. Brownsville has a population | |
| just over 100,000. The police force includes 175 officers, and a wide variety | |
| of federal law enforcement agencies have a strong presence there as well. | |
| The climate is semi-tropical, and the RBOC is SouthWestern Bell. | |
| Matamoris is the other half of brownsville. Home of over 1/2 a million | |
| people, it is known since the early 1900's as a pit of sin. The federale's | |
| are not to be fucked with and it is serviced by TelMex. It is known for its | |
| bars, strip clubs and mexican food. Matamoros also has an airport incase | |
| you live in Mexico and care to go, via aeromexico. | |
| Directions: | |
| In Texas Driving - Go anyway you can to get to US 77 South. Take 77 South | |
| till it ends in Brownsville. From there you will turn right on International. | |
| Proceed all the way down international, right before the bridge, turn left. | |
| The Fort Brown will be on the left. | |
| For those flying in - We are going to try to have a shuttle going. Also just | |
| tell the cab driver, Fort Brown. | |
| The Con Registration Fee, aka the pay it when you walk in our we will beat you | |
| up, is only 10$ and an additional 5$ for the 'I paid for eliteness sticker' | |
| which will let you into the special events, such as hack the stripper. | |
| ---------------------------------------------------------------- | |
| Celebrity Endorsements | |
| Here's what last years participants had to say about CuervoCon: | |
| "I attended the CuervoCon 95. I found many people there who, fearing a | |
| sunburn, wanted to buy my t-shirts!" -ErikB | |
| "I tried to attend, but was thwarted by "No Admittance to The Public" | |
| sign. I feel as though I missed the event of the year." - The Public | |
| "mmmm...look at all the little Mexican boys..." -Netta Gilboa | |
| "Wow! CuervoCon 95 was more fun that spilling my guts to the feds!" - | |
| Panther Modern | |
| "CuervoCon is our favorite annual event. We know we can give | |
| security a day of rest, because you people are all too drunk to | |
| give us any trouble..." - AT&T | |
| "No moleste, por favor." - TeleMex | |
| Don't miss it! | |
| ---------------------------------------------------------------- | |
| Have you ever hacked a machine in your hometown from a foreign | |
| country? | |
| Have you ever had to convert dollars into pesos to get your bribe right? | |
| Have you ever spent time in a foreign prison, where your "rights as an | |
| American" just don't apply? | |
| Have you ever been taken down for soemthing that wasn't even illegal | |
| half an hour ago? | |
| YOU WILL! And the con that will bring it to you? | |
| CUERVOCON 96 | |
| ---------------------------------------------------------------- | |
| CUERVOCON 96 CUERVOCON 96 CUERVOCON 96 CUERVOCON 96 CUERVOCON 96 | |
| brought to you by | |
| - S.o.B. - TNo - PLA - Phrack - The Guild - F.U.C.K. - SotMESC - | |
| Contact Information | |
| info@cuervocon.org | |
| www.cuervocon.org - Look here for updates. | |
| Voice mail system coming up soon. | |
| ---------------------------------------------------------------- | |
| ----<>---- | |
| *** The truth behind the Adult Verification Services | |
| ('porno' will set you free) | |
| *** By your passively skeptical author, t3. | |
| *** 10.30.96 | |
| Let's speak for a minute about 'porno'. 'Porno' has saturated the | |
| Net to a level in which it's difficult *not* to see it, regardless if | |
| you're looking for it. It can be found on the largest web site and the | |
| smallest ftp site. It can be found on Usenet, it can be found with any | |
| one of numerous search engines. Let's not delude ourselves, porno is | |
| *everywhere* and anyone with the motor skills to click a mouse can have access | |
| to it. | |
| About a year ago a concept came along called 'Adult Verification'. This first | |
| started out by people writing crude cgi scripts that would query every person | |
| as to their age. 'Are you 18' it would say, and even a sexually aware 9-year | |
| old would know to say 'yay' to this. | |
| Soon thereafter, someone topped this 4-line piece of code by writing a login | |
| interface, most likely it was incorporated into Netscape or some other, less | |
| worthy browser. This program made use of the actual browser to authenticate | |
| users. Of course one needed a login and password, of which had to be manually | |
| added after ample proof of age was received. If one merely wanted to | |
| cover one's ass, this would not be a logical solution. | |
| This all occurred during which the CDA (Communications Decency Act) had | |
| actually existed. On June 7, 1995, the CDA was passed through the Senate | |
| to the President, signed, and made a law: | |
| (1) in the heading by striking `Broadcasting obscene | |
| language' and inserting `Utterance of indecent or profane | |
| language by radio communication; transmission to minor of | |
| indecent material from remote computer facility, electronic | |
| communications service, or electronic bulletin board service'; | |
| et al...Now it was illegal to transmit 'indecent material' on the | |
| Internet. If this were to actually be adhered to, the Net would shrink | |
| so drastically that the current topology would last ten years before | |
| needing an upgrade. | |
| Is was soon apparent that this act was not going to fly. Groups like the | |
| EFF and the ACLU suddenly became extremely busy. Companies such as Apple | |
| and Microsoft challenged the constitutionality of such a law and took | |
| this directly to court. It was also apparent that the transmission of | |
| 'indecent material' would not disappear, but merely go further underground. | |
| Indeed, this is exactly what happened. Soon thereafter Adult Verification | |
| services began popping up. AVS (Adult Verification Services), Adultcheck, | |
| Adultpass, and a slew of others came up with an idea. | |
| The idea was to verify a person's adult status by acquiring one's credit | |
| card number. This would, ahem, without a doubt, prove that the individual | |
| was 18. Why? Because you had to be 18 to have a credit card of course! | |
| Someone obviously didn't take into consideration the five or so million | |
| pre-adults that would make it their goal to surpass such shotty | |
| authentication. | |
| It began by the government stating that a credit card is a legal means of | |
| verifying one's age, this allowing those distributing 'porno'graphic | |
| materials to continue distributing to those 18 and over. The initial | |
| means that the 'providers of porn' used to do this was to basically | |
| verify the format of the card and not actually run a check on it. As | |
| most of us all know, there have been plenty of "Credit Card Generators" | |
| produced in the last five years, quite capable of fooling these shotty | |
| authentication systems. | |
| As this authentication was obviously lacking in the "authentication" | |
| part, the next step was to actually validate the cards. This began and | |
| ended nearly as quickly, for finding a credit card (for example, in | |
| mommy's purse), junior could peruse porn until his dick grew red and chafed. | |
| On June 12, 1996 it was was determined that the CDA indeed violated one's | |
| constitutional rights and was striken down as a law. More on this at | |
| <http://www.eff.org/pub/Legal/Cases/EFF_ACLU_v_DoJ/>. | |
| But it didn't seem to phase the Authentication services. | |
| The Authentication Services currently verify age by obtaining a credit | |
| card, verifying it, and actually charging a fee for the service. About | |
| $9.95 for two years which entitles you to an abundance of graphic, ad, | |
| and airbrush-laden web pages and images. This most likely sufficiently | |
| scared off the less determined of minors because now they'd be engaging in | |
| credit card fraud. | |
| It's truly odd that after it has been deemed legal to distribute said | |
| porn, that all of these services still insist that it's illegal to do | |
| so. Let us realize that Usenet barely flinched when the CDA was in | |
| effect, and still offered gigs upon (glorious) gigs of nude bodies to | |
| oggle at. | |
| After taking a good look at this whole bizarre operation, I have made a | |
| few conclusions of my own. | |
| Charging $9.95 for two years of access to 'porno'graphy seems a little too | |
| good to be true. One must realize that there is a charge to the billing | |
| company for each credit card transaction made. I'd be surprised if it | |
| wasn't half of this ten bucks. These authentication companies also pay | |
| "handsomely" the purveyors of porn. In order for such a service to | |
| function, obviously there needs to be an agreement with the distributor and the | |
| authenticator. | |
| Now, one that distributes 'porno'graphy on the Net will certainly not feel | |
| the need to do these Verification Services any favors. The majority of | |
| people that do run these explicit sites are certainly not interested in | |
| supporting censorship of their material (probably 90% money-making). The | |
| AVS's knew this and offered a stipend to those using their services. | |
| The AVS's currently work by paying the site that contains 'indecent | |
| material' a certain amount each time that site gets another person to | |
| sign up with their service. This works by the AVS sending html that is | |
| put on a verification page. If one finds this page important enough, | |
| they may be convinced to sign up with the service that allows you to | |
| access it. | |
| The stipend is generally around $4.00, and as high as $7.50. There are | |
| many AVS's, and the majority of the said 'sites' use more than one, | |
| sometimes all of them for verification. If a particular site uses one | |
| AVS exclusively, the AVS will pay on the highest end of their scale for new | |
| recruits. | |
| If we get into some simple math, we may find some contradictions | |
| regarding this. The initial fee to those interested in accessing porn is | |
| $9.95. Out of these we can safely say that more than $3.00 goes to | |
| simply checking the validity of the card and billing it. This leaves the | |
| AVS with $6.95. | |
| Now, on the receiving end we have a very minimum of $4.00 going towards | |
| each new person that signs up. It's probably safe to say that over 90% | |
| of new customers to these AVS's sign-up through 'porno'graphic pages and | |
| not directly from the site itself. | |
| So $9.95 ends up being $6.95 after expenses, and then the service sends | |
| another $4.00 to the person that gave them the account. This leaves the | |
| AVS with a maximum of $2.95 total. | |
| The costs running an AVS are surely not exorbant, but are certainly not | |
| cheap. I have yet to find an AVS running off of anything less than at T1 | |
| (1.544mbit) speeds. This translates to an extreme minimum of 1k/month. | |
| If you include employees, office space, and incidentals, running any such | |
| service couldn't cost less than 5k a month at the very least. This would | |
| mean to break even one would have to bring in: | |
| 5000/2.95 | |
| 1694 new customers a month, simply to break even! That's a lot | |
| considering the membership lasts for two years. And this is in the | |
| *best-case* scenario. I would be hard-pressed to believe that one such | |
| service could steadily rely on such a base of new clients every month | |
| indefinitely! | |
| I have theorized that these services are in fact not self-run moneymaking | |
| ventures, but are actually being funded by a higher authority. It's | |
| quite feasible to believe that the government, having been challenged and | |
| beat, have actually allocated funds to protecting the minors of the Net | |
| from obscenity. It's *certainly* not far-fetched, especially with Al | |
| Gore (think, Tipper) in an improperly high position. | |
| The government could allocate a comparitively paltry sum of one million a | |
| year towards funding (even creating) companies that act merely to pay | |
| people to be complacent. What if the government merely let relatively | |
| computer proficient professionals bid on forming these AVS's? What if? | |
| Well, unless i'm overlooking something, I can't see too much illogic to | |
| my theory. | |
| Another consideration of these services is that even at their current | |
| state, they are extremely easy to overcome. So easy, in fact, that their | |
| existence will hardly offer much resistance to a horny teenager. Remember, | |
| people will do anything to get 'porno'graphy. | |
| Such holes in these systems are that the verified member of such an AVS | |
| connects to a sexually explicit site, is bounced backed to the AVS for | |
| authentication, and is then bounced back again to the page (url) that | |
| contains the "naughty stuff". This page can be simply bookmarked and | |
| distributed to anyone and their Mom. | |
| Why? All the services I've come across (the largest ones) do not | |
| authenticate the target url, they target the initial "warning" page and | |
| contain information to pass the user on to the naughty stuff. Thus if | |
| one single person can obtain the target url, he can bypass all future | |
| authentication and can as well pass the url on through various channels, | |
| quite easily ending up in the hands of a minor. | |
| As well, if stupidity was a metaphor for AVS's, most of the target url's | |
| have filenames such as "warning.html" or "granted.html". Any | |
| half-respectable search engine (such as AltaVista) is capable of snarfing | |
| out such information. Doubly-so because these services will obviously | |
| want to advertise their existence. | |
| The only method that seems to partially protect minors from 'porno'graphy | |
| is the method of installing client-based software such as SurfWatch that | |
| try to censor 'porno'graphy. This, as well, relies on a willing company or | |
| individual to operate. This works quite archaically by imbedding META | |
| tags in html source. For example: | |
| <META name="description" content="Validate Age Verification | |
| Service"><meta name="keywords" content="sex erotica nude porn penthouse | |
| pornography erotic porno adult playboy dating marriage love date age | |
| validate validation protect children kids money commercial wealth nudes | |
| pics jpg gif"> | |
| This particular tag would be placed in the receiving html of a | |
| co-operative service or individual. The client-based software would | |
| search for such tags and censor the content accordingly. From my | |
| understanding, those using AVS's are not required to embed these tags in | |
| their "warning" page html. If they do not, which I would imagine many | |
| probably wouldn't, then suddenly these client-based censorship tools are | |
| rendered useless. | |
| So in conclusion, I would give a big thumbs-down for this whole pathetic | |
| means of controlling freedom. The Internet was meant to be a place to | |
| free exchange of information. Today a minor is just as able to find | |
| explicit material on the Net as he/she is able to dig through Mom and | |
| Dad's dresser for copies of Hustler. A minor is just as capable of | |
| watching R or X-rated movies, stealing a magazine from a store, or even | |
| buying one. | |
| It's time to stop using half-assed and crippled ways of protecting kids | |
| from obscenity on the Net. If you're a parent and you don't want your | |
| child to view such 'porno'graphy, then why not do what you're supposed to | |
| do and discipline the kid. | |
| Lazy fuckers. | |
| t3 | |
| .end | |
| ----<>---- | |
| T.A.C.D Presents... | |
| Hacking ID Machines | |
| By PiLL | |
| Table Of Contents | |
| I. What is an ID Machine & who uses them? | |
| II. Hardware and software of the ID machines | |
| III. Common security of ID Machines | |
| IV. What to do once you get in | |
| V. Closing | |
| VI. Greets | |
| Part One: What is an ID machine and who uses them? | |
| First we will start with the basics. An IDM or ID Machine is exactly | |
| what the name entails. It is a computer that government and large | |
| companies use to make security badges and ID cards for employees and | |
| visitors. All of the IDM's are DOS based so security, to say the least, | |
| sucks. There are four models of IDM's. The one we will be covering the | |
| most is the latest and greatest: the ID 4000. Also in the family of | |
| IDM's are the 3000, 2000+, and 2000. I have heard of an ID 1000 but I | |
| have yet to see or play with one, so if you find one, tell me. The 2000 | |
| is DOS 3.3 so I can imagine that an ID 1000 is even a bigger waste of | |
| time. IDM's are manufactured by a branch of Polaroid entitled Polaroid | |
| Electronic Imaging. If you want more information on IDM's call (800)343-5000 | |
| and they will send you some general specs. I will let you know right | |
| off the start that these machines sell for as much as $75,000.00 but the | |
| average price is around $40,000.00. So getting caught crashing one is | |
| NOT a good idea. | |
| You are probably wondering what companies use ID machines. Here is a | |
| brief list. All of the Colorado and Alaska DMV's, The IRS, The FBI, The | |
| U.S. Mint, The Federal Reserve, almost any military branch, Hewlett | |
| Packard, Polaroid, Westinghouse (I wouldn't recommend fucking with them: | |
| for more information on Westinghouse check out the movie Unauthorized Access | |
| available from CDC's home page), and all of the major prisons in the | |
| United States. By now you should be getting ideas of the potential fun | |
| you can have. Not that I would ever use what I know for anything illegal | |
| ;) | |
| Part Two: Hardware and Software | |
| I will cover each machine in order but you will probably notice that the | |
| ID4000 will get by far more attention then any other. | |
| Hardware and Software for the 2000+ and 2000 is kind of like teaching | |
| someone about the Apple ][ and how to use Logo so I will try not to bore | |
| you to much with them. The 2000 series are unique to the others because | |
| they are one full unit. The hardware is basically a really cheesy | |
| oversized case with a 9 monochrome monitor, a 3 monitor for viewing the | |
| victim of the hideous picture it takes, a 286 Wyse computer with 1meg of | |
| RAM (really hauls ass), a data compression board, image processing board | |
| (*Paris* Board), a signature scanner, a color film recorder or CFR, a | |
| WORM Drive, a modem, and most of the time a network card so the data can | |
| be stored on a mainframe. The Software of the 2000 series is a really | |
| neat database program running under DOS 3.3. If you have never heard of | |
| or used EDLIN, I would not recommend playing with a 2000. The only major | |
| differences between an ID2000 and an ID2000+ is that the computer on the | |
| 2000+ is a HP Vectra 386 with 4megs and a SCSI Interface. That's all you | |
| really need to know you probably won't ever encounter one unless you go | |
| trashing a lot. | |
| The ID3000 is also an HP 386/20 but uses DOS 5.0 and a Matrox Digital | |
| Processing board instead of the old Paris board of the 2000 series. | |
| This came about when your state ID actually started to remotely resemble | |
| you in 1992. Also in the 3000 years their were more peripherals | |
| available such as the latest CFR at the time (I think it was the 5000), | |
| PVC printers, and bar code label printers. The software is basically | |
| DOS 5.0 but this time they use a database shell much like DOSSHELL as | |
| the interface with the machine. The 3000 uses SYTOS for data storage and | |
| transfer and it is best to dial in using a program called Carbon Copy. | |
| The 4000 is the best even though it's not that great. It was is the | |
| first IDM in the Polaroid line that let the customer customize the | |
| machine to their needs. This is the machine that you see when you go to | |
| the DMV, at least in Denver. It consists of a JVC camera, a Matrox | |
| processing board, a data compression board, an Adaptec 1505 SCSI card, a | |
| 14.4 modem, a network card, and can have any of the following added to | |
| it: a PVC printer (in case you didn't know that's what they use on | |
| credit cards), a magnetic stripe encoder, a bar code printer, a thermal | |
| printer, a CFR (usually the HR6000 like at the DMV), a Ci500 scanner, | |
| and signature pad, a finger print pad (interesting note if you have a | |
| black light and one of the new Colorado Driver licenses hold it under a | |
| black light and look what appears under your picture, you should see | |
| your finger print), and a laminator. Now some of you are thinking what | |
| about the holograms? Those are actually in the lamination, not on the | |
| badge itself. To obtain lamination walk into the DMV and look to the | |
| right or left of the machine if you see a little brown box that's what | |
| you need, but please remember to leave some for the rest of us that | |
| might be next in line. Or you can go to Eagle hardware and buy a bolt | |
| cutter for the dumpster but that's a different text file. | |
| The 4000 runs DOS 6.0 and Windows 3.1. The actual software for the 4000 | |
| is a terrible Visual Basic shell that reminds me of the first time I ran | |
| that program AoHell. The only difference is that AoHell did what it was | |
| suppose to, the 4000 software is a headache of GPF's , Environment | |
| Errors, and Vbrun errors. A nice feature that the 4000 has that the | |
| other IDM's don't, is the ability to create and design your own badge. | |
| You can even do it remotely ! ! =) . Unfortunately the program Polaroid | |
| developed for this makes paintbrush look good. But on a bright note you | |
| can import Images. | |
| Briefly here is a run down of what exactly happens when you get your | |
| picture taken on an ID4000 at the DMV. At the first desk or table the | |
| narrow eyed, overpaid, government employee will ask you for some general | |
| information like a birth certificate, picture ID, name, address, SSN#, what | |
| party you prefer to vote for, and whether or not you want to donate your | |
| organs in the event of your untimely demise. You reply by handing her | |
| your fake birth certificate and ID that you had printed no more then an | |
| hour ago, hoping the ink is dry. "My name is Lee Taxor I reside at | |
| 38.250.25.1 Root Ave in the Beautiful Port apartments #23 located in | |
| Telnet, Colorado, I prefer to vote for Mickey Mouse of the Disney party, | |
| and can't donate my organs because Satan already owns them." The | |
| disgruntled employee then enters all your information in the correct fields | |
| while never taking an eye off you in fear that you know more about the | |
| machine he or she is using then they do (perhaps you shouldn't of worn | |
| your Coed Naked Hacking T-shirt that you bought at DefCon 4). As soon as | |
| the bureaucrat hits <ENTER> all of the information is sent to a database | |
| located in the directory named after the computer (i.e. | |
| c:\ID4000\ColoDMV\96DMV.MDB). Then you are directed to the blue screen | |
| where you stare at the JVC monitor trying to look cool even though the | |
| camera always seems to catch you when you have to blink or yawn or even | |
| sneeze. *SNAP* the picture is taken and displayed on the monitor where | |
| the employee can laugh at your dumb expression before printing it. If | |
| the employee decides to print the picture it is saved as a 9 digit | |
| number associated with your database record. The 4000 then compresses | |
| the picture and saves it. So the next time you go in and the pull up | |
| your record it will automatically find the associated picture and | |
| display it on the screen. But in the mean time you grab your fake ID the | |
| DMV just made for you and leave happy. | |
| In a nut shell that's all there is to these machines. | |
| Part Three: Security | |
| I think a better topic is lack of security. I have yet to see any of | |
| these machines that are remotely secure. Before we go any further the | |
| 4000 is best accessed using CloseUp the others using Carbon Copy, But | |
| any mainstream communications program will more then likely work. You | |
| Dial and it asks you right away for a username and password. whoa, stop, | |
| road block right their. Unless of course you know the backdoor that | |
| Polaroid put in their machines so they can service them. =) | |
| ID4000 | |
| Login: CSD (case Sensitive) | |
| Password: POLAROID (who would of guessed?) | |
| ID3000 | |
| Login: CPS | |
| Password: POLAROID (god these guys are so efficient) | |
| ID2000+ And ID2000 | |
| Login: POLAROID (ahh the good old days) | |
| Password: POLAROID | |
| Now if these do not work because they have been edited out, there are | |
| still a few VERY simple ways of getting in to your victims system. The | |
| first is to go with every hackers default method of social engineering. | |
| The best way to do this is to call them up and say "Hi this is (insert | |
| tech name here) with Polaroid Electronic Imaging! How is it going down | |
| there at (name of company)." The say "pretty good!" in a funny voice | |
| thinking what great customer support. You say "How is the weather been | |
| in (location of company)" they reply with the current weather status | |
| feeling that they can trust you cause you are so friendly. You say "well | |
| (name of person), we were going through our contacts one by one doing | |
| routine upgrades and system cleaning to ensure that your database is not | |
| going to get corrupted anytime soon and that everything is doing what it | |
| is supposed too, if you know what I mean (name of person)." Now they | |
| reply "oh yeah" and laugh with you not having a clue of what you are | |
| talking about. And they then say "well everything seems to be in order." | |
| You say "great sounds good but old *Bob* would have my head if I didn't | |
| check that out for myself." Then you ask if the modem is plugged in and | |
| wait for the reply. The either say yes or no then you ask them go plug | |
| it & give you the number or just give you the number. Then they comply | |
| cause they are just sheep in your plan. You say "Hey thanks (name) one | |
| more thing would happen to know if user CSD:Polaroid exists or did you | |
| guys delete it." If they deleted it ask them to put it back in, giving | |
| you administrative access. They probably know how to and will comply. If | |
| they need help have them do the following: Click on the combination lock | |
| icon at the top of the screen. This will bring them to the | |
| administrative screen and they will have the choices of Purge, Reports, | |
| and Passwords. Have them click on passwords. Then have them enter you as | |
| a new user with CSD as your Name and Polaroid as your Password. After | |
| they have done that make sure they give you all the Keys. The keys are | |
| basically access levels like on a BBS. Lets some users do certain things | |
| while others can not. The only key you need is administrative but have | |
| them give you the rest as well. The other keys are Management and Luser | |
| I think. The keys are located to the left of the user information that they | |
| just entered. Then have them click OK and close the call politely. Ta | |
| da!! Here is a list of Polaroid phone techs but I would not advise using | |
| Bob or Aryia cause their big wigs and nobody ever talks to them. | |
| Senior Techs of Polaroid | |
| Regular Techs | |
| Bob Pentze (manager) | |
| Don Bacher | |
| Aryia Bagapour (assistant) | |
| Richard | |
| Felix Sue | |
| Rick Ward | |
| Jordan Freeman | |
| Dave Webster | |
| Call 1-800-343-5000 for more Names =) | |
| Part Four: What to Do once you get in | |
| Now that your in you have access to all of their database records and | |
| photos. Upload your own and have fun with it! Everything you do is | |
| logged so here's what you'll want to do when you're done making yourself | |
| an official FBI agent or an employee of the federal reserve. Go to all | |
| of the available drives which could be a lot since they are on a network | |
| and do a search from root for all of the LOG files i.e. C:\DIR /S *.LOG | |
| Then delete the fuckers!!!! You can also do this by FDISK or formatting. | |
| Just kidding! But if you want to do it the right way then go to the | |
| admin screen and purge the error and system logs. | |
| Basically if you want the form for government badges or the FBI agents | |
| database this is the safest way to go. These computer do not have the | |
| ability to trace but it does not mean the phone company doesn't! ANI | |
| sucks a fat dick so remember to divert if you decide to do this. If you | |
| don't know how to divert I recommend you read CoTNo or Phrack and learn | |
| a little bit about phone systems and how they work. | |
| Moving around in the software once your past the security is very simple | |
| so I'm not going to get into it. If you can get around a BBS then you | |
| don't need any further help. Just remember to delete or purge the logs. | |
| Part Five: Closing | |
| If your looking for some mild fun like uploading the DMV a new license | |
| or revoking your friends this is the way to do it. However if you're | |
| looking to make fake ID's I recommend you download the badge format and | |
| purchase or obtain a copy of IDWare by Polaroid. IDware is a lot like | |
| the 4000 software except you only need a scanner not the whole system. | |
| As a warning to some of the kids I know of one guy who bought a | |
| $50,000.00 ID4000 and paid it off in a year by selling fake ID's. When | |
| Polaroid busted him they prosecuted to the fullest and now the guy is | |
| rotting in a cell for 25 to 50 years. Just a thought to ponder. | |
| Peace | |
| PiLL | |
| Greetz | |
| Shouts go out to the following groups and individuals: TACD, TNO, MOD, | |
| L0pht, CDC, UPS, Shadow, Wraith, KaoTik, Wednesday, Zydirion, Voyager, | |
| Jazmine, swolf, Mustard, Terminal, Major, Legion, Disorder, Genesis, | |
| Paradox, Jesta, anybody else in 303, STAR, BoxingNuN, MrHades, OuTHouse, | |
| Romen, Tewph, Bravo, Kingpin, and everyone I forgot cause I'm sure there | |
| are a bunch of you, sorry =P. | |
| ----<>---- | |
| The Top Ten things overheard at PumpCon '96 | |
| 10. "You gotta problem? Ya'll gotta rowl!" | |
| - Keith the security guard | |
| 9. "My brain has a slow ping response" | |
| - Kingpin | |
| 8. "Space Rogue, I've been coveting your pickle." | |
| - espidre | |
| 7. "If there's space -n shit, then it's Star Trek. Unless there's that | |
| little Yoda guy - then it's Star Wars" | |
| - Kingpin | |
| 6. "I'm the editor of Phrack. Wanna lay down with me?" | |
| - A very drunk unnamed editor of Phrack | |
| 5. "Let's go find that spic, b_, no offense" | |
| - A drunk IP to b_. | |
| 4. "I'm lookin for that fat fucker Wozz. He's big, and got a green shirt, | |
| and glasses, and curly hair, just like you. As a matta a fact, you | |
| gots similar characteristics!" | |
| - A drunk IP to wozz. | |
| 3. "He was passed out on the floor... so I pissed on him" | |
| - An unknown assailant referring to IP | |
| 2. "It was the beginning and the end of my pimping career" | |
| - Kingpin referring to his escapade of getting paid | |
| two dollars for sex. | |
| 1. "French Toast Pleeeeze!" | |
| - Everyone | |
| ----<>---- | |
| TOP 0x10 REASONS TO KICK && WAYS TO GET | |
| KICKED OUT OF #HACK (Revision 0.1.1) | |
| By SirLance | |
| 0x0f asking for any information about any Microsoft products | |
| 0x0e talking about cars, girls, or anything unrelated to hacking | |
| 0x0d flooding with a passwd file contents | |
| 0x0c asking how to unshadow passwd | |
| 0x0b being on #hack, #warez and #hotsex at the same time | |
| 0x0a asking for ops | |
| 0x09 using a nick including words like 'zero' 'cool' 'acid' or 'burn' | |
| 0x08 asking if someone wants to trade accounts, CCs or WaR3Z | |
| 0x07 asking what r00t means | |
| 0x06 asking when the latest Phrack will be released | |
| 0x05 asking where to get or how to create a BOT | |
| 0x04 having the word BOT anywhere in your nick | |
| 0x03 having a nick like Br0KnCaPs and SpEak LiK3 Th4t all the time | |
| 0x02 asking for flash.c or nuke.c, spoof.c, ipsniff.c or CrackerJack | |
| 0x01 thinking #hack is a helpdesk and ask a question | |
| 0x00 being on from AOL, Prodigy, CompuServe, or MSN | |
| -EOL- | |
| ----<>---- | |
| International business | |
| by HCF | |
| Friday, 3:00am 4.12: | |
| I get the call: | |
| Julie: "You break into computers right...?" | |
| Dover: "Yea, what kind..." | |
| Julie: "Mac, I think." | |
| Dover: "Hmm... Call ``HCF'' at 213.262-XXXX" | |
| Julie: "Uh, will he be awake...?" | |
| Dover: "Don't worry (snicker) he'll be awake." | |
| Friday, 4:00am 4.12 | |
| HCF called me at 4am after he got the call from Julie: | |
| HCF: "you got me into this mess, I need to barrow your car." | |
| Dover: "Umm shure. Ok..." | |
| HCF: "I'll be right over..." | |
| Friday, 12:30pm 4.12: upon returning the car: | |
| HCF: "Umm, got a parking ticket, I'll write you a check later..." | |
| (I never got the check.) | |
| Kathleen's comment to Julie which was passed to me (days later): | |
| Kath: "Why didn't you tell me he was cute, I want him for myself!" | |
| When I passed this on to HCF: | |
| HCF: "She is *gorgeous* but not without a wet suit..." | |
| Here is the story that happened early one Friday morning... The names | |
| have been changed to protect the innocent, the guilty, and the innocent-looking | |
| guilty.... | |
| I was reading up on a new firewall technology, the kind that locks | |
| addresses out of select ports based on specific criterion, when the phone | |
| rang. | |
| "Hello?" | |
| The voice of a women, between 18 and 30, somewhat deep like Kathleen | |
| Turner's, said, "Uh, hello..." | |
| There was an obvious pause. It seemed she was surprised that I was so | |
| awake and answered sharply on the second ring. It was in the middle of my | |
| working hours; 3:30 AM. There was no delay in the phone's response, no | |
| subtle click after I picked up, and the audio quality was clear. | |
| "Do you hack?" she asked. | |
| Recorder on. Mental note: *stop* getting lazy with the recorder. | |
| "No. Are you on a Cell phone?" I responded | |
| "No." | |
| "Are you using a portable battery operated telephone?" | |
| "No. I was told by my friend ..." | |
| "Are you in any way associated with local, federal or state law enforcement | |
| agencies?" | |
| "Oh, I get it. No I'm not. Julie said that you could help me." | |
| I knew Julie through a mutual friend. | |
| "Could you call me back in 5 minutes." | |
| "Well, um, ok." | |
| Throughout the whole conversation, the phones on her end were ringing off | |
| the hook. As soon as I hung up, Ben, the mutual friend, called. Julie had | |
| called him first, and he gave her my number. I got his reassurance that | |
| this was legit. Ben was snickering but wouldn't divulge what it was about. | |
| By now my curiosity was piqued. | |
| The phone rang again, "I need someone who can break into a computer." | |
| "Whose computer?" | |
| "Mine." | |
| It turns out that the woman had hostility bought out the previous owner of | |
| this business. The computer in question had both a mission-critical | |
| database of some sort and a multi-level security software installed. She | |
| had been working under a medium permission user for some time. The | |
| computer crashed in such a way as to require the master password (root) in | |
| order to boot. The pervious owner moved out of town, could not be | |
| contacted, and was most likely enjoying the situation thoroughly. The | |
| woman was unaware of any of the technical specifications or configuration | |
| of the machine. I was able to find out that it was a Apple Macintosh Color | |
| Classic; a machine primarily distributed in Japan. It would be around | |
| 10:00 AM in Tokyo. | |
| "Why are the phones ringing so often at this time of the morning?" I asked. | |
| "I do a lot of international business." | |
| I was intrigued, the answer was smoothly executed without a delay or pitch | |
| change. I took the job. | |
| Upon arriving, I was greeted by a young, stunningly beautiful, woman with | |
| long, jet-black hair and stressed but clear green eyes. I checked the room | |
| for obvious bugs and any other surveillance. There were calendars on the | |
| wall, filled out with trixy and ultra-masculine sounding names like Candy | |
| and Chuck. The phones had died down some. The machine in question was | |
| obviously well integrated into the environment; dust patterns, scratch | |
| marks, worn-out mouse pad; it had been there for some time. There was a | |
| PBX, around 6 to 8 voice lines, three phones, and no network, modem or | |
| outside connectivity. | |
| The security, which we'll call VileGuard, defeated all the "simple" methods | |
| of by-passing. None of the standard or available passwords, in any case or | |
| combination, worked. A brute-force script would be slow as second failure | |
| shut the machine down. | |
| I made a SCSI sector copy onto a spare drive and replaced it with the | |
| original. This involved tearing open the machine, pulling various parts | |
| out, hooking up loose wires, merging several computers, and turning things | |
| on in this state. Trivial and routine, I did it rapidly and with both | |
| hands operating independently. For those who have never opened the case of | |
| an all-in-one Mac, it involves a rather violent looking smack on both sides | |
| of the pressure fitted case backing, appropriately called "cracking the | |
| case." This did not serve well to calm the nerves of the client. After a | |
| few moments of pallor and little chirps of horror, she excused herself from | |
| the room. | |
| While the SCSI copy preceded, I overheard her taking a few calls in the | |
| other room. What I heard was a one-sided conversation, but I could pretty | |
| much fill in the blanks, | |
| "Hello, Exclusive Escorts, may I help you?" | |
| "Would you like to be visited at your home or at a hotel?" | |
| "Well, we have Suzy, she's a 5'4" Asian lady with a very athletic body. | |
| Very shy but willing, and very sensual, she measures 34, 24, 34." | |
| "Big what? Sir, you'll have to speak a little clearer." | |
| "Oh, I see, well we have a very well endowed girl named Valerie, she's a | |
| double D and measures 38, 24, 34. Would that be more to your liking?" | |
| It was not easy to keep from busting up laughing. | |
| "He wants you to do what? Well, charge him double." | |
| With the new drive installed, and to predictable results, I fired up a hex | |
| editor. My experience has been that full-disk encryption typically slows | |
| the machine down to the point where the user disables it. At around | |
| $5C9E8, I found, "...507269 6E74204D 616E6167 65722045 72726F72... | |
| ...Print Manager Error..." in plain text. I searched for some of the | |
| known, lower permission, passwords. I found a few scattered around sector | |
| $9b4. The hex editor I was using could not access the boot or driver | |
| partitions, so I switched to one that could. It's not as pretty of an | |
| interface as the last editor, and is rather old. Its saving grace though | |
| is that it doesn't recognize the modern warnings of what it can and cannot | |
| see. There it was, VileGuard; driver level security. | |
| "Eric is endowed with eight and has a very masculine physique." | |
| Every male was "endowed with eight," every female had relatively identical | |
| measurements. | |
| I hunted fruitlessly around the low sectors for what might be the master | |
| password. All awhile wishing the find function of the editor would accept | |
| regexp. All the other passwords were intercapped on the odd character, but | |
| that was a convention of the current owner, and not necessarily used by the | |
| past owner. | |
| "Oh, you want a girl that is fluent in Greek?" | |
| It's not professional for me, and not good salesmanship for her, to have me | |
| overheard laughing myself into anoxia. After trying to straighten up and | |
| gather my wits together again, I began to consider an alternate | |
| possibility. If I don't know the password, what happens if I make it so | |
| that the driver doesn't either. Return to the first-installed condition | |
| perhaps? It was a thought. It turned out to be a bad thought, resulting in | |
| my haphazardly writing "xxxx" over, pretty much, random sectors of the | |
| driver partition. | |
| "Oh yes sir, Roxanne prefers older men. She appreciates how very | |
| experienced they are. I understand sir, and I'm sure she can help you with | |
| that." | |
| Before I made a second copy and whipped out the RE tools, TMON and MacNosy, | |
| I tried booting. The results were, as you'd expect, that the disk didn't | |
| mount. Instead, it asked me if I wanted to reinitialize the disk. Pause. | |
| Think... ya, why not. This was most definitely farther than I had gotten | |
| with the secure driver installed and functional. I canceled and fired up | |
| one of many disk formatters I had on hand. Though the formatter wasn't the | |
| slickest, it had proven itself repeatedly in the past. Its main quality | |
| was that of writing a driver onto a disk that is in just about *any* | |
| condition. It's made by a French drive manufacturer. As dangerous as this | |
| behavior is, I'm sure it's a planned feature. It could see the drive and | |
| allowed me to "update" the driver. A few seconds later, a normal | |
| "finished" dialog. | |
| "Yes, Stan carries a set of various toys with him. No, I don't believe he | |
| normally carries that, but I'm sure if you ask him nicely, he'll drop by | |
| the hardware store on his way and pick one up." | |
| I rebooted. It worked. I copied over the disk's data and reformatted. | |
| Time to try it on the original drive (I had, of course, been working on my | |
| copy.) Upon startup, before anything could be accessed, "Please input the | |
| master password..." | |
| Puts an unusual twist on the phrase, "adverse working conditions" | |
| - HCF | |
| Note 1: Payment was in currency. | |
| Note 2: If you ever think you understand the opposite sex's view on sex, | |
| you're underestimating. | |
| ----<>---- | |
| The Beginners Guide to RF hacking | |
| by Ph0n-E of BLA & DOC | |
| Airphones suck. I'm on yet another long plane ride to some | |
| wacky event. I've tried dialing into my favorite isp using this lame GTE | |
| airphone, $15 per call no matter how long you "talk". In big letters it | |
| says 14.4k data rate, only after several attempts I see the very fine | |
| print, 2400 baud throughput. What kind of crap is that? A 14.4 modem that | |
| can only do 2400? It might be the fact they use antiquated 900MHz AM | |
| transmissions. The ATT skyphones that are now appearing use imarsat | |
| technology, but those are $10/minute. Anyway they suck, and I have an | |
| hour or so before they start showing Mission Impossible so I guess I'll | |
| write this Phrack article Route has been bugging me about. | |
| There are a bunch of people who I've helped get into radio stuff, five | |
| people bought handheld radios @ DefCon... So I'm going to run down some | |
| basics to help everyone get started. As a disclaimer, I knew nothing about | |
| RF and radios two years ago. My background is filmmaking, RF stuff is just | |
| for phun. | |
| So why the hell would you want to screw around with radio gear? Isn't it | |
| only for old geezers and wanna be rentacops? Didn't CB go out with Smokey | |
| & the Bandit? | |
| Some cool things you can do: | |
| Fast-food drive thrus can be very entertaining, usually the order taker | |
| is on one frequency and the drivethru speaker is on another. So you can | |
| park down the block and tell that fat pig that she exceeds the weight | |
| limit and McDonalds no longer serves to Fatchix. Or when granny pulls up | |
| to order those tasty mcnuggets, blast over her and tell the nice MCD slave | |
| you want 30 happy meals for your trip to the orphanage. If you're lucky | |
| enough to have two fast food palaces close to each other you can link them | |
| together and sit back and enjoy the confusion. | |
| You've always wanted a HERF gun, well your radio doubles as a small | |
| scale version. RF energy does strange and unpredictable things to | |
| electronic gear, especially computers. The guy in front of me on the plane | |
| was playing some lame game on his windowz laptop which was making some very | |
| annoying cutey noises. He refused to wear headphones, he said "they mushed | |
| his hair...". Somehow my radio accidentally keyed up directly under his | |
| seat, there was this agonizing cutey death noise and then all kinds of cool | |
| graphics appeared on his screen, major crash. He's still trying to get it | |
| to reboot. | |
| Of course there are the ever popular cordless phones. The new ones work | |
| on 900MHz, but 90% of the phones out there work in the 49MHz band. You can | |
| easily modify the right ham radio or just use a commercial low band radio | |
| to annoy everyone. Scanning phone calls is OK, but now you can talk back, | |
| add sound effects, etc... That hot babe down the street is talking to | |
| her big goony boyfriend, it seems only fair that you should let her know | |
| about his gay boyfriend. Endless hours of torture. | |
| You can also just rap with your other hacker pals (especially useful | |
| cons). Packet radio, which allows you up to 9600 baud wireless net | |
| connections, its really endless in its utility. | |
| How to get started: | |
| Well you're supposed to get this thing called a HAM license. You take | |
| this test given by some grampa, and then you get your very own call sign. | |
| If you're up to that, go for it. One thing though, use a P.O. box for your | |
| address as the feds think of HAMs as wackos, and are first on the list when | |
| searching for terrorists. Keep in mind that most fun radio things are | |
| blatantly illegal anyway, but you're use to that sort of thing, right? | |
| If you are familiar with scanners, newer ones can receive over a very | |
| large range of frequencies, some range from 0 to 2.6 GHz. You are not going | |
| to be able to buy a radio that will transmit over that entire spectrum. There | |
| are military radios that are designed to sweep large frequencies ranges for | |
| jamming, bomb detonation, etc. - but you won't find one at your local radio | |
| shack. | |
| A very primitive look at how the spectrum is broken down into sections: | |
| 0 - 30MHz (HF) Mostly HAM stuff, short-wave, CB. | |
| 30 - 80MHz (lowband) Police, business, cordless phones, HAM | |
| 80 - 108MHz (FM radio) You know, like tunes and stuff | |
| 110 - 122MHz (Aircraft band) You are clear for landing on runway 2600 | |
| 136 - 174MHz (VHF) HAM, business, police | |
| 200 - 230MHz Marine, HAM | |
| 410 - 470MHz (UHF), HAM, business | |
| 470 - 512MHz T-band, business, police | |
| 800MHz cell, trunking, business | |
| 900MHz trunking, spread spectrum devices, pagers | |
| 1GHZ+ (microwave) satellite, TV trucks, datalinks | |
| Something to remember, the lower the frequency the farther the radio waves | |
| travel, and the higher the frequency the more directional the waves are. | |
| A good place to start is with a dual band handheld. Acquire a Yaesu | |
| FT-50. This radio is pretty amazing, its very small, black and looks cool. | |
| More importantly it can easily be moded. You see this is a HAM radio, it's | |
| designed to transmit on HAM bands, but by removing a resistor and solder | |
| joint, and then doing a little keypad trick you have a radio that transmits | |
| all over the VHF/UHF bands. It can transmit approximately 120-232MHz and | |
| 315-509MHz (varies from radio to radio), and will receive from 76MHz to about | |
| 1GHz (thats 1000MHz lamer!), and yes that *includes* cell phones. You also | |
| want to get the FTT-12 keypad which adds PL capabilities and other cool stuff | |
| including audio sampling. So you get a killer radio, scanner, and red box all | |
| in one! Yaesu recently got some heat for this radio so they changed the eprom | |
| on newer radios, but they can modified as well, so no worries. | |
| Now for some radio basics. There are several different modulation schemes, | |
| SSB - Single Side Band, AM - Amplitude Modulation, FM - Frequency Modulation, | |
| etc. The most common type above HF communications is NFM, or Narrow band | |
| Frequency Modulation. | |
| There are three basic ways communication works: | |
| Simplex - The Transmit and Receive frequencies are the same, used for short | |
| distance communications. | |
| Repeater - The Transmit and Receive frequencies are offset, or even on | |
| different bands. | |
| Trunking - A bunch of different companies or groups within a company share | |
| multiple repeaters. If you're listening to a frequency with a scanner and | |
| one time its your local Police and the next it's your garbage man, the fire | |
| dept... - that's trunking. Similar to cell phones you get bits and pieces | |
| of conversations as calls are handed off among repeater sites. | |
| Their radios are programmed for specific "talk groups", so the police only | |
| hear police, and not bruno calling into base about some weasel kid he found | |
| rummaging through his dumpsters. There are three manufacturers - Motorola, | |
| Ericsson (GE), and EF Johnson. EFJ uses LTR which sends sub-audible codes | |
| along with each transmission, the other systems use a dedicated control | |
| channel system similar to cell phones. Hacking trunk systems is an entire | |
| article in itself, but as should be obvious, take out the control channel | |
| and the entire system crashes (in most cases). | |
| OK so you got your new radio you tune around and your find some security | |
| goons at the movie theater down the street. They are total losers so you | |
| start busting on them. You can hear them, but why they can't hear you? | |
| The answer-- SubAudible Tones. These are tones that are constantly | |
| transmitted with your voice transmission - supposedly subaudible, but if | |
| you listen closely you can hear them. With out the tone you don't break | |
| their squelch (they don't hear you.) These tones are used keep nearby | |
| users from interfering with each other and to keep bozos like you from | |
| messing with them. There are two types, CTCSS Continuos Tone-Codes Squelch | |
| system (otherwise known as PL or Privacy Line by Motorola) or DCS Digital | |
| Coded Squelch (DPL - Digital Privacy Line). If you listened to me and got | |
| that FT-50 you will be styling because its the only modable dual band that | |
| does both. So now you need to find their code, first try PL because its | |
| more common. There is a mode in which the radio will scan for tones for | |
| you, but its slow and a pain. The easiest thing to do is turn on Tone | |
| Squelch, you will see the busy light on your radio turn on when they are | |
| talking but you wont hear them. Go into the PL tone select mode and tune | |
| through the different tones while the busy light remains on, as soon as you | |
| hear them again you have the right tone, set it and bust away! If you | |
| don't find a PL that works move on to DPL. There is one other squelch | |
| setting which uses DTMF tone bursts to open the squelch, but its rarely | |
| used, and when it is used its mostly for paging and individuals. | |
| Now you find yourself at Defcon, you hear DT is being harassed by | |
| security for taking out some slot machines with a HERF gun, so you figure | |
| it's your hacker responsibility to fight back. You manage to find a | |
| security freq, you get their PL, but their signal is very weak, and only | |
| some of them can hear your vicious jokes about their moms. What's up? They | |
| are using a repeater. A handheld radio only puts out so much power, | |
| usually the max is about 5 watts. That's pretty much all you want radiating | |
| that close to your skull (think brain tumor). So a repeater is radio that | |
| receives the transmissions from the handhelds on freq A and then | |
| retransmits it with a ton more watts on freq B. So you need to program | |
| your radio to receive on one channel and transmit on another. Usually | |
| repeaters follow a standard rule of 5.0MHz on UHF and .6MHz on VHF, and | |
| they can either be positive or negative offsets. Most radios have a | |
| auto-repeater mode which will automatically do the offset for you or you | |
| need to place the TX and RX freqs in the two different VCOs. Government | |
| organizations and people who are likely targets for hacks (Shadow Traffic | |
| news copter live feeds) use nonstandard offsets so you will just need to | |
| tune around. | |
| Some ham radios have an interesting feature called crossband repeat. | |
| You're hanging out at Taco Bell munching your Nachos Supreme listening to the | |
| drive thru freq on your radio. You notice the Jack in the Box across the | |
| street, tuning around you discover that TacoHell is on VHF (say 156.40) and | |
| Jack in the Crack is on UHF (say 464.40). You program the two freqs into | |
| your radio and put it in xband repeat mode. Now when someone places their | |
| order at Taco they hear it at Jacks, and when they place their order at | |
| Jacks they hear it at Taco. When the radio receives something on 156.40 it | |
| retransmits it on 464.40, and when it receives something on 464.40 it | |
| retransmits it on 156.40. | |
| "...I want Nachos, gimme Nachos..." | |
| "...Sorry we don't have Nachos at Jack's..." | |
| "...Huh? Im at Taco Bell..." | |
| Get it? Unfortunately the FT-50 does not do xband repeat, that's the only | |
| feature it's lacking. | |
| Damn it, all this RF hacking is fun, but how do I make free phone calls? | |
| Well you can, sort of. Many commercial and amateur repeaters have a | |
| feature called an autopatch or phonepatch. This is a box that connects the | |
| radio system to a phone line so that you can place and receive calls. Keep | |
| in mind that calls are heard by everyone who has their radio on! The | |
| autopatch feature is usually protected by a DTMF code. Monitor the input | |
| freq of the repeater when someone places a call you will hear their dtmf | |
| digits - if you're super elite you can tell what they are by just hearing | |
| them, but us normal people who have lives put the FT-50 in DTMF decode mode | |
| and snag the codez... If your radio doesn't do DTMF decode, record the audio | |
| and decode it later with your soundblaster warez. Most of the time they | |
| will block long-distance calls, and 911 calls. Usually there is a way | |
| around that, but this is not a phreaking article. Often the repeaters are | |
| remote configurable, the operator can change various functions in the field | |
| by using a DTMF code. Again, scan for that code and you too can take | |
| control of the repeater. What you can do varies greatly from machine to | |
| machine, sometimes you can turn on long-distance calls, program speed-dials, | |
| even change the freq of the repeater. | |
| What about cordless phones, can't I just dial out on someone's line? | |
| Sort of. You use to be able to take a Sony cordless phone which did | |
| autoscanning (looked for an available channel) drive down the block with | |
| the phone on until it locked on to your neighbors cordless and you get a | |
| dialtone. Now cordless phones have a subaudible security tone just like PL | |
| tones on radios so it doesn't work anymore. There are a bunch of tones and | |
| they vary by phone manufacturer, so it's easier to make your free calls other | |
| ways. | |
| But as I mentioned before you can screw with people, not with your FT-50 | |
| though. Cordless phones fall very close to the 6 meter (50MHz) HAM band and | |
| the lowband commercial radio frequencies. There are 25 channels with the | |
| base transmitting 43-47MHz and the handset from 48-50MHz. What you want to | |
| do is program a radio to receive on the base freqs and transmit on the | |
| handset freqs. The phones put out a few milliwatts of power (very little). | |
| On this freq you need a fairly big antenna, handhelds just don't cut it - | |
| think magmount and mobile. There are HAM radios like the Kenwood TM-742A | |
| which can be modified for the cordless band, however I have not found a | |
| radio which works really well receiving the very low power signals the | |
| phones are putting out. So, I say go commercial! The Motorola | |
| Radius/Maxtrac line is a good choice. They have 32 channels and put out | |
| a cool 65watts so your audio comes blasting out of their phones. Now | |
| the sucko part, commercial radios are not designed to be field | |
| programmable. There are numerous reasons for this, mainly they just want | |
| Joe rentalcop to know he is on "Channel A" , not 464.500. Some radios are | |
| programmed vie eproms, but modern Motorola radios are programmed via a | |
| computer. You can become pals with some guy at your local radio shop and | |
| have him program it for you. If you want to do it yourself you will need | |
| a RIB (Radio Interface Box) with the appropriate cable for the radio, and | |
| some software. Cloned RIB boxes are sold all the time in rec.radio.swap | |
| and at HAM swap meets. The software is a little more difficult, Motorola | |
| is very active in going after people who sell or distribute thier software | |
| (eh, M0t?) They want you to lease it from them for a few zillion dollars. | |
| Be cautious, but you can sometimes find mot warez on web sites, or at HAM | |
| shows. The RIB is the same for most radios, just different software, you | |
| want Radius or MaxTrac LabTools. It has built in help, so you should be | |
| able to figure it out. Ok so you got your lowband radio, snag a 6 meter | |
| mag mount antenna, preferably with gain, and start driving around. Put | |
| the radio in scan mode and you will find and endless amount of phone calls | |
| to break into. Get a DTMF mic for extra fun, as your scanning around listen | |
| for people just picking up the phone to make a call. You'll hear dialtone, | |
| if you start dialing first since you have infinitely more power than the | |
| cordless handset you will overpower them and your call will go through. | |
| It's great listening to them explain to the 411 operator that their phone is | |
| possessed by demons who keep dialing 411. Another trick is to monitor the | |
| base frequency and listen for a weird digital ringing sound - these are tones | |
| that make the handset ring. Sample these with a laptop or a yakbak or | |
| whatever and play them back on the BASE frequency (note, not the normal | |
| handset freq) and you will make their phones ring. Usually the sample won't | |
| be perfect so it will ring all wacko. Keep in mind this tone varies from | |
| phone to phone, so what works on one phone wont work on another. | |
| Besides just scanning around how do you find freqs? OptoElectronics | |
| makes cool gizmos called near-field monitors. They sample the RF noise | |
| floor and when they see spikes above that they lock on to them. So you | |
| stick the Scout in your pocket, when someone transmits near you, the scout | |
| reads out their frequency. The Explorer is thier more advanced model which | |
| will also demodulates the audio and decode PL/DPL/DTMF tones. There are | |
| also several companies that offer CDs of the FCC database. You can search | |
| by freq, company name, location, etc. Pretty handy if your looking for a | |
| particular freq. Percon has cool CDs that will also do mapping. Before | |
| you buy anything check the scanware web site, they are now giving away | |
| their freq databases for major areas. | |
| OK radioboy, you're hacking repeaters, you're causing all the cordless | |
| phones in your neighborhood to ring at midnight, and no one can place | |
| orders at your local drivethrus. Until one day, when the FCC and FBI | |
| bust down your door. How do you avoid that?? OK, first of all don't | |
| hack from home. Inspired people can eventually track you down. How? | |
| Direction Finding and RF Fingerprinting. DF gear is basically a | |
| wideband antenna and a specialized receiver gizmo to measure signal | |
| strength and direction. More advanced units connect into GPS units for | |
| precise positioning and into laptops for plotting locations and advance | |
| analysis functions such as multipath negations (canceling out reflected | |
| signals.) RF finger printing is the idea that each individual radio has | |
| specific characteristics based on subtle defects in the manufacture of the | |
| VCO and AMP sections in the radio. You sample a waveform of the radio and | |
| now theoretically you can tell it apart from other radios. Doesn't really | |
| work though-- too many variables. Temperature, battery voltage, age, | |
| weather conditions and many other factors all effect the waveform. | |
| Theoretically you could have a computer scanning around looking for a | |
| particular radio, it might work on some days. Be aware that fingerprinting | |
| is out there, but I wouldn't worry about it *too* much. On the other hand | |
| DF gear in knowledgeable hands does work. Piss off the right bunch of HAMS | |
| and they will be more than happy to hop in their Winnebego and drive all | |
| over town looking for you. If you don't stay in the same spot or if you're | |
| in an area with a bunch of metal surfaces (reflections) it can be very very | |
| hard to find you. Hack wisely, although the FCC has had major cutbacks | |
| there are certain instances in which they will take immediate action. They | |
| are not going to come after you for encouraging Burger King patrons to become | |
| vegetarians, but if you decide to become an air-traffic controller for a day | |
| expect every federal agency you know of (and some you don't) to come looking | |
| for your ass. | |
| My plane is landing so thats all for now, next time - advanced RF hacking, | |
| mobile data terminals, van eck, encryption, etc. | |
| EOF | |
| ----<>---- | |
| 10.16.96 | |
| Log from RAgent | |
| GrimReper: I work For Phrack | |
| GrimReper: Yeah | |
| GrimReper: I gotta submit unix text things like every month | |
| GrimReper: I've been in Phrack for a long time | |
| GrimReper: Phrack is in MASS | |
| -> *grimreper* so how much does Phrack pay you? | |
| *GrimReper** How much? | |
| *GrimReper** Hmm...... | |
| *GrimReper** About $142 | |
| -> *grimreper* really | |
| -> *grimreper* who paid you? | |
| *GrimReper** w0rd | |
| *GrimReper** CardShoot | |
| *GrimReper** Cardsh00t | |
| -> *grimreper* hmm, I don't see any "cardsh00t" in the credits for phrack | |
| +48 | |
| *GrimReper** There is | |
| -> *grimreper* you might as well stop lying before I bring in daemon9, | |
| +he's another friend of mine | |
| -> *grimreper* he's one of the editors of phrack | |
| *GrimReper** Get the latest Phrack? | |
| *GrimReper** Its gonna have my NN | |
| *GrimReper** watch | |
| -> *grimreper* not anymore | |
| *GrimReper** Go Ahead | |
| -> *grimreper* actually | |
| *GrimReper** so? | |
| -> *grimreper* you will be mentioned | |
| -> *grimreper* you'll be known as the lying fuckhead you are, when this | |
| +log goes in the next issue | |
| ----<>---- | |
| 10.24.96 | |
| Log from Aleph1 | |
| *** ggom is ~user01@pm1-6.tab.com (ggom) | |
| *** on irc via server piglet.cc.utexas.edu ([128.83.42.61] We are now all | |
| piglet) | |
| *ggom* i am assembling a "tool shed". A "shed" for certain "expert" activity. | |
| Can you help? | |
| -> *ggom* maybe... go on | |
| *ggom* i represent certain parties that are looking for corporate information. | |
| this would fall under the "corporate espionage" umbrella | |
| *ggom* this information could probably be obtained via phone phreak but access to | |
| corporate servers would be a plus...can you help? | |
| -> *ggom* a) how do I know you are not a cop/fed? b) why did you come to #hack | |
| to ask for this? b) what type of data you after? c) what type of money are | |
| you talking about? | |
| *ggom* where else should i go to ask for this stuff???????? | |
| -> *ggom* you tell me. How do you know about #hack? | |
| *ggom* looked it up on the irc server...figured this was a good place to | |
| start........... i am talking about 4 to 5 figures here for the information | |
| -> *ggom* you are also talking 4 to 5 years | |
| -> *ggom* #hack is visited regularly by undercovers and the channel is logged | |
| -> *ggom* talking openly about such thing is not smart | |
| *ggom* whatever........... man, if you are GOOD, you are UNTRACEABLE. i | |
| guess i am looking in the wrong place...... | |
| -> *ggom* you been watching way to many times "Hackers" and yes #hack is the | |
| wrong place... | |
| *ggom* we are on a private channel.........suggest a more private setting.... | |
| -> *ggom* sorry you started off on a bad foot. If you got a million to spare | |
| for such information you would also have the resources to find the | |
| appropiate person to do the job. So you either are full off it, are a fed, | |
| or just plain dumb. This conversation ends here. | |
| *ggom* later | |
| *ggom* not talking a million.. talking 5 to 6 figures......... you are | |
| right | |
| *ggom* talk to me....... | |
| *ggom* talk to me....... | |
| ----<>---- | |