💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › cbvhack.pnk captured on 2021-12-04 at 18:04:22.

View Raw

More Information

-=-=-=-=-=-=-


-----------------------------------------------------------------------------

                               CBV Hackin
                               
                            By PiNK ToRPeDo
                    
                    Original File Date: June 7, 1994



-----------------------------------------------------------------------------


You might be saying to yourself... now PiNK - How do I get through those
CHeeZY CBV's that everyone uses.  There are at least six (6) wayz:


        1:  Deception
        
        2:  Brute Force (easiest & quickest)
                
        3:  Tones
        
        4:  Loops

        5:  VMB's
        
        6:  Dialouts
                
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

DECEPTION:


The first is tricky because it envolves  Social  Engineering methods.   There
are numerous wayz  to do this,  but I will only go through a small portion of
techniques. If you can't figure out the rest - 

                YOU SHOULDN'T BE READING THIS!!!!!
                

The first, is blatent use of a friends line, to verify the CBV.   This  poses 
problems because if you intend on hacking a board, they might call him up and 
ask him why he has been hacking their board.   If he has any brain,  he might 
realize it is you.   You can also  use  your  work  number  (if you work on a 
computer).   This method can also pose problems because you could fuk up your 
work by getting A.G.T. up their asshole or maybe some mad sysop.  If you have 
a laptop.. use a fortress fon.  Some of them still allow you to make calls to 
the fon, but these are scarce.  You can also try to deceive the sysop and try 
to get him to voice verify (fortress fon) ect.

All of these methods take time, patience and some good ol Social Engineering,
so lets move on to more plausible methods...



BRUTE FORCE:

This one is phun... and most every good hacker knows it but I will go through
it again for those that haven't learned it.

What is a CBV?

A CBV,  is called a  "Call Back Verifier" and is used by sysops on boards, so
that users  can't  get  multiple  accounts.   Now if they have two individual
lines in their homes, then YES it is possible to get two individual accounts.
It calls you back at a specified number to verify your location.

Now, to get through them using BRUTE FORCE, it requires only little knowledge 
and a fon plugged into your modem.  Maestro preffered


Call the board and leave FAKE information.  IE: Name, number, Age ect...

If your terminal program has memos,  write the fake info down,  as some bbs's 
ask for your birthdate and the last four digits of your fon number.

Then when you are done, register by going into the CBV.

Then,  the computer will ask you if you have entered all the correct info and 
it will try to hang up,  locate Dial tone and then call you.   Just before it 
hangs up,  pick up your fon line,  so that your computer disconnects and your 
fon doesn't.

So now,  your computer is disconnected and you are sitting there with a  Data
transmission of CBV on your line.

Hit "ATA"
Thats it!!!!!!!!!!

Some CBV's,  are that shitty and won't look for  Dial Tone,  so it will think 
that it has called you back when you have never left. This method works about 
80% of the time, on Shiddy PD boards!



Tones:


This is  similar in content but adds a new twist.   You  can achieve this two 
wayz...

        1:  Use your fon to generate garbage tones.
        
        2:  Use a RED BOX (Tone Generator)
        

Let me explain

Follow the same guidelines as mentioned above.

When the CBV is about to hang...... pick up the fon line.   Some CBV's try to
hang, so when you here a  "click"  hold the button "1" down until you here it
dial.  If it doesn't work try the number "2" ect ect....  then if you here it 
dial you back, hit "ATA"

This sometimes (on some CBV's) will generate the needed Dial Tone and the CBV 
will call you back.  Or at least it thinks it does!

If this doesn't work....

Try a  RED BOX.  This can generate a multitude of frequencies, including Dial
Tone (2600 MHz).

When you are generating a Dial Tone, you will hear a "click" "click" "click", 
usually three then it will dial the number you left.

Very fukin easy.


Loops:

Now,  if you havn't a clue what Loops are get a good file from your local H/P 
BBS and learn.

For those who know... you should be getting ideas.

Call the bbs,  get the CBV going and put in the Loop's,  low end line number.
Then quickly call the high end and wait... when it calls just hit "ATA"


VMB's:

Again, if you don't know how to use them... go get a file and learn.

After hacking a codeline,  you will gain  certain access to the VMB.   If you
have a diverter number  (used by that certain VMB)  enter that number for the
CBV to call.   Call up the Diverter and use  Call Forwarding on the VMB (*72)
You might be saying  "Well, PiNK-how can I use CF on some other line? Doesn't 
the VMB have to suscribe to it?  Well yes, but in some business areas certain 
codes are free!  If you happen to have a VMB within certain areas... it might
has CF phree!  

If not, then look for one.

When you enter the VMB line for the  CBV and use CF,  then it should call you
back.  Just type "ATA"

If you are also wondering  "Well PiNK.... how do I get from Data to voice and
voice to data?

Command:  ATX1DT

This is so that when the  CBV  calls you can  quickly get into and out of the
Data mode.  (Voice to Data)


Dialouts:

This is pretty self explanatory.

Call the divertor and try *72.   If, like above, it has call forwarding, then 
forward it to your own number. Call the bbs, enter the dialouts number. 


At this point....... you should be able to get into any computer using one of
these methods!

For sysops wanting to correct this flaw: 

1:  Find a CBV, that waits for DT no matter what
2:  Find a CBV, that can distinguish between DT and a fuking fon tone
3:  Find a CBV, that will wait an undisclosed time before going through the 
    process.  Random calling is best
4:  Use Call display at every opportunity
5:  Voice verify every fuckin puke there is!


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Thanks to everyone who helped me... No one!   Except for the original makers
of the file "CBV hackin".  Vince Neil of course.

To all those who came before... your knowledge wasn't wasted.  To all those 
who come after.... live, learn and hack.

Cheers!
PiNK