text stringlengths 0 1.99k |
|---|
but they didn't want the harassment. If they did get harassed, they would |
immediately log in under seclev 7 and kill the system. The threatened that |
various accounts would be killed (all with seclev 4 and up). The Source |
person wrote, "Was this ever answered?". They then went on to say that they |
wouldn't do any more terrorizing provided that it was responded to their |
acct. within 20 minutes. |
For deleting an account, he sent back a message saying, "Fuck you". He |
explained how they were powerless against The Pirate and Micronet Phantom, |
and how The Source shouldn't even try to catch them. They were to continue |
to attack "The Empire" (The Source) until it was fair for the users. |
Numerous other letters that played to the same tune. |
Some People to Mention |
---------------------- |
TCA Vic of The Source - Customer Service Manager/Gestapo Police |
(Who he dearly hated and always has thought of |
sticking a broomstick up his ass) |
Paul of Dialcom (Introduced him to phreaking and put his paranoia to rest) |
Susan Thunder (For teaching him RSTS and other things) |
Bruce Patton (On his rag list due to a disagreement. He received a |
electricity shut-down and a phone system shut-down of his law |
office as well as forwarding all calls to the 8BBS) |
Roscoe DuPran (For having him go to court with him and meeting Susan in |
person and for many other things [unmentionable here]) |
The Pirate of Las Vegas (For his helpful continual harassment of The Source) |
Kevin Metnick (For his infrequent but helpful service) |
Larry of Modem Over Manhattan (For being there and his BBS being there) |
Bernard of 8BBS (For being there and his BBS being there) |
------------------------------------------------------------------------------- |
I hope you enjoyed this file, look forward to more Phrack Pro-Philes coming in |
the near future. ...And now for the regularly taken poll from all interviewees. |
Of the general population of phreaks you have met, would you consider most |
phreaks, if any, to be computer geeks? Only The Pirate, a 13 year old, fit |
this description. Thank you for your time, Dave. |
Taran King |
Sysop of Metal Shop Private |
==Phrack Inc.== |
Volume Two, Issue Ten, Phile #3 of 9 |
********************************** |
* The TMC Primer * |
*--------------------------------* |
* Written by: Cap'n Crax * |
*--------------------------------* |
* December 17, 1986 * |
********************************** |
This file was originally intended to be a "data file" of info on TMC ports, |
formulas, etc, but I decided that it would serve a better use as a "tutorial" |
of sorts. But first a bit of background info... |
Who is TMC? |
TMC (TeleMarketing Communications) is a long distance service serving all 50 |
states. While not as well known as MCI or Sprint, they are a fairly large |
company. They are capable of setting up business communications systems, |
PBX's, and residential service. Unlike most LDC's, however, they operate on a |
"franchise" basis, which means that each franchise of the company has little |
information about any other franchise, although they do use the same lines and |
the same type of equipment. |
So, what can they do for me? |
Well, for most of us, TMC offers many new potentials for abuse. One of the |
primary weak points of the company is the code formats that they decided to |
use. Codes on all TMC ports are seven digits. If they were generated |
randomly, this would be a reasonably secure system from sequential code |
hacking. But TMC doesn't use random codes. Instead, they use a checksum based |
formula system, with different formulas on each port. I assume that this is |
because they wanted a wide displacement of the codes over the seven-digit |
series, so that a sequential code hacker wouldn't be able to get 2 or 3 good |
codes in a row. Or perhaps they are just very stupid. In any case, it's |
interesting that they seem to have never thought of what could happen if |
anyone ever managed to figure out any of these formulas. Anyway, that's what |
this file is about. |
Great! What else can you tell me? |
Well, TMC seems to use some form of the Dimension PBX system for their billing |
system (Their ads say that the switching equipment is digital). This makes |
TMC ports easily identifiable by the "Hi-Lo" bad code siren. For those who |
worry about such things, TMC is one of the "safer" companies to use. This is |
largely because, unlike "unified" companies like MCI, TMC franchises don't |
really care if another franchise is losing money. Since each franchise is |
independent of all others, there are many 800 ports, one for each franchise. |
If you use an out-of-state 800 port, you are free from such worries as ANI, |
which I have never perceived as a major threat to the code-user anyway. Also, |
TMC offers lots of opportunities for the aspiring security consultant |
(hehehe). |
Ok, so where's some real info? |
Right here. I am going to explain as much about TMC hacking as I can manage, |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.