text
stringlengths
0
1.99k
but they didn't want the harassment. If they did get harassed, they would
immediately log in under seclev 7 and kill the system. The threatened that
various accounts would be killed (all with seclev 4 and up). The Source
person wrote, "Was this ever answered?". They then went on to say that they
wouldn't do any more terrorizing provided that it was responded to their
acct. within 20 minutes.
For deleting an account, he sent back a message saying, "Fuck you". He
explained how they were powerless against The Pirate and Micronet Phantom,
and how The Source shouldn't even try to catch them. They were to continue
to attack "The Empire" (The Source) until it was fair for the users.
Numerous other letters that played to the same tune.
Some People to Mention
----------------------
TCA Vic of The Source - Customer Service Manager/Gestapo Police
(Who he dearly hated and always has thought of
sticking a broomstick up his ass)
Paul of Dialcom (Introduced him to phreaking and put his paranoia to rest)
Susan Thunder (For teaching him RSTS and other things)
Bruce Patton (On his rag list due to a disagreement. He received a
electricity shut-down and a phone system shut-down of his law
office as well as forwarding all calls to the 8BBS)
Roscoe DuPran (For having him go to court with him and meeting Susan in
person and for many other things [unmentionable here])
The Pirate of Las Vegas (For his helpful continual harassment of The Source)
Kevin Metnick (For his infrequent but helpful service)
Larry of Modem Over Manhattan (For being there and his BBS being there)
Bernard of 8BBS (For being there and his BBS being there)
-------------------------------------------------------------------------------
I hope you enjoyed this file, look forward to more Phrack Pro-Philes coming in
the near future. ...And now for the regularly taken poll from all interviewees.
Of the general population of phreaks you have met, would you consider most
phreaks, if any, to be computer geeks? Only The Pirate, a 13 year old, fit
this description. Thank you for your time, Dave.
Taran King
Sysop of Metal Shop Private
==Phrack Inc.==
Volume Two, Issue Ten, Phile #3 of 9
**********************************
* The TMC Primer *
*--------------------------------*
* Written by: Cap'n Crax *
*--------------------------------*
* December 17, 1986 *
**********************************
This file was originally intended to be a "data file" of info on TMC ports,
formulas, etc, but I decided that it would serve a better use as a "tutorial"
of sorts. But first a bit of background info...
Who is TMC?
TMC (TeleMarketing Communications) is a long distance service serving all 50
states. While not as well known as MCI or Sprint, they are a fairly large
company. They are capable of setting up business communications systems,
PBX's, and residential service. Unlike most LDC's, however, they operate on a
"franchise" basis, which means that each franchise of the company has little
information about any other franchise, although they do use the same lines and
the same type of equipment.
So, what can they do for me?
Well, for most of us, TMC offers many new potentials for abuse. One of the
primary weak points of the company is the code formats that they decided to
use. Codes on all TMC ports are seven digits. If they were generated
randomly, this would be a reasonably secure system from sequential code
hacking. But TMC doesn't use random codes. Instead, they use a checksum based
formula system, with different formulas on each port. I assume that this is
because they wanted a wide displacement of the codes over the seven-digit
series, so that a sequential code hacker wouldn't be able to get 2 or 3 good
codes in a row. Or perhaps they are just very stupid. In any case, it's
interesting that they seem to have never thought of what could happen if
anyone ever managed to figure out any of these formulas. Anyway, that's what
this file is about.
Great! What else can you tell me?
Well, TMC seems to use some form of the Dimension PBX system for their billing
system (Their ads say that the switching equipment is digital). This makes
TMC ports easily identifiable by the "Hi-Lo" bad code siren. For those who
worry about such things, TMC is one of the "safer" companies to use. This is
largely because, unlike "unified" companies like MCI, TMC franchises don't
really care if another franchise is losing money. Since each franchise is
independent of all others, there are many 800 ports, one for each franchise.
If you use an out-of-state 800 port, you are free from such worries as ANI,
which I have never perceived as a major threat to the code-user anyway. Also,
TMC offers lots of opportunities for the aspiring security consultant
(hehehe).
Ok, so where's some real info?
Right here. I am going to explain as much about TMC hacking as I can manage,