💾 Archived View for gemini.spam.works › mirrors › textfiles › phreak › VOICEMAIL › vmb_smc.txt captured on 2022-06-12 at 17:52:39.

View Raw

More Information

-=-=-=-=-=-=-

              On the Essentials of Voice Mail Hacking
                       by the Kryptic Night
                              -S M C-

     This file will describe several simple ways for hacking out
your own voice mail box. It is by no means a comprehensive
document on the subject, but rather, is meant to help those
beginning in the field. I myself have several voice mail boxes,
and have hacked on various systems. I will describe several of
the methods I have used, and try to explain the format for them.

An overview of several common commands:
 # (Pound) - Used either to access the password prompt or a
             dialing list.
 * (Star)  - This is either used to abort the current menu, or
             to amplify the volume.
 0 (Duh)   - Used either to access the password prompt, or to chat
             with our friend, the operator.
 9         - This is occasionally used to hang up.


                          The First Step
                    Type of systems to look for

     First of all you need a system to hack at. Unless you are a
pre-teenage new kid fan, answering machines usually aren't that
exciting.
     Try to look for an 800 voice mail system. I know I don't like
having to pull out codes every time I want to call a VMB, only to
find that their is nothing there worth my while, and I'm sure
other people feel the same. This will not only provide yourself
with a free method for calling your box, but will also allow you
to call it from a payphone, and you can call it anytime, rather
than when you just have a code handy.
     Another great advantage is using a system that is up for all
24 hours. This isn't a necessity, but is a great convenience. For
instance, imagine that you just gave out your number to someone
who  be beneficial to your VMB as a good source of codes or
general info, but he has better things to do at night than call
VMB systems, with an afterhours VMB, you cut him off, is that what
you want?  I'd hope not.



                          The Second Step
             Finding out how many digits the boxes are

     Ok, so you now have a system to play with. Let's see if the
system is worth your time, and find out the basics of it.
Now you have to try to ascertain how many digits the box numbers
are, this may take a while if it requires you to press a '#'
(pound) sign after the box number, as these systems usually do not
tell you whether you entered the correct amount of digits or not.
For now, I'd recommend you just ignore these, as they would
require extra work. Try entering any 3 digits, you will in most
cases get an 'incorrect box number' message if the system is only
a 3 digit system. However, if it just hangs, does nothing, then
the odds are it's a four digit system. Try typing 4 digits now,
and if you still get no message, then it's either one of two
things. One, you may need to press a '#' (pound) sign after the
number, or in some cases, before it. Or two, the system is longer
than 4 digits, in which case you should ignore it for now.  Some
systems contain a built-in time delay that will tell you a message
if you haven't entered the correct box in a given time, these
should also be avoided for now, as they will say something even if
you only type one digit, or if you type 100 digits.


                          The Third Step
                Finding where the boxes are located

     Now comes a rather tedious chore, finding out where on the
system the boxes are located. Unless it is a professional voice
mail company, they will probably have under 100-200 mail boxes in
use at any one time. These boxes may be found on the system in any
of two forms, clumped or scattered. Clumped boxes are when their
are several boxes all in one area of the system. Usually this is
the only area on the system that boxes are located, but
occasionally some systems have scattered clumps all around the
system. Scattered boxes occur when the boxes seem to have no
apparent order for their location, these are more difficult to
find empty boxes on, but not impossible.
     Now you need to start looking for the clumps (We will start
with these, as they are generally easier to locate). Start
searching from 100, for a three digit system, or 1000, for a 4
digit system. Increment your searching by 25-50 for a three digit
system, and 100-500 on a four digit system. This will undoubtedly
be inaccurate, but it will allow you a better chance of finding
the clumps than random guessing. You may get several messages
while looking for these, anything from 'Boxes cannot start with
an x' to 'Incorrect box number' Generally these should be self-
explanatory, and you should be able to figure out how to respond
on your own. You are looking for any box with a message in it, any
message. When you find a used box, mark down the number, and scan
around that box in increments of 5 or so. If you find any more,
mark down that location as a clump. Remember however, that if you
get an incorrect box number message, that doesn't mean that that
area isn't a clump, just that that box is empty. This will provide
added inaccuracy to the job, but it's a fact that can't be
overcome by anything other than monotonous scanning by 1.
Try to make this fun, invite your friends over, have a phone
party....they can be fun and profitable if you know what you are
looking for.
     As for scattered boxes, I don't have much to say, they aren't
the easiest systems to play with, as you can't tell with any
certainty where on the system a box will be, and if it's a four
digit system, that's 10,000 possible boxes...Not an encouraging
number. If you are on a system with scattered boxes, just ignore
this section and read how to find empty boxes next.



                          The Fourth Step
                        The Miraculous Void

     Once you've found the system, your real job has just begun.
You now need to find an empty box. Although it is possible to hack
out used boxes, this is usually undesirable, since used boxes tend
to have people who use them (makes sense doesn't it...I thought so
too) When some complaining customer calls and gets a message such
as "To call cosmos and fuck up the entire region, dial...blah blah
blah...remember to slaughter a cat for Halloween...", they will
most likely be a bit suspicious and will call the business
bitching about how they are so unprofessional, and that their
employees really should clean up their mouths...blah blah, you
know, the usual line of bullshit. If that doesn't happen, then the
person who owns the box will check it out, and if that happens,
you can be assured that the box won't last.
     Now is the time to pull out that list of clumps you made.
Start searching around these boxes in increments of 1, yes one,
this may take a while...but if you've come this far...you
obviously have too much free time.
     What you are looking for is any box that asks you to leave a
message at the tone, and doesn't play a prerecorded message to you
before that. These are relatively easy to recognize, and you
shouldn't have any problems with it. Just look for the anomaly.



                          The Fifth Step
                       On the Art of Hacking

     This is where the excitement begins, or the agony ends. By
now you should have found an empty box or two. If you haven't,
start over again with a different system. There are several ways
to access the password prompt. Usually most systems tell you right
up front at the main menu how to do it, but since some do not,
I'll explain the most common ways that I know of.
     The magical pound sign is the most common way of accessing
the password prompt. From the main menu you should press the #
sign, and then the box number. It will then ask for your security
password, or some other such inane jargon. The other common way of
accessing the prompt is to dial the box number, and press 0 while
the message is playing, or sometime after you dial the box number.
You will then be asked to enter your security password, or
whatever they choose to call it.
     A security password is usually, but not always, the same
length as the box number. The most common default password for
voice mail systems is a string of zero's, 000 for three digit
systems and 0000 for four digit systems. Other common passwords
are: The box number, IE - box 2045 would have a password of 2045,
box of 0981 (four digit system) would have a password of 0981, and
a three digit system might have something like 521 for a box
number of 521, a string of some common digits, such as 1111,
2222, 3333, ainsi du suite, the year, or 1234. By no means are
these the only default passwords, but these are the ones I've
seen, and have heard about. You should be able to catch a
significant number of empty boxes with these.



                          The Sixth Step
                        You're in, now what

     So you think you're cool, right? You've found a box or two
that you can get into. Well, congrats, from here on out everything
is cake. This section and following sections won't tell you too
much that you shouldn't be able to figure out with
experimentation, but I'm trying to be thorough...
     You've gotten past the password, and are at a prompt that
asks you to 'send a message to another box' 'read new mail', or
what not. If their are messages in the box, you should read them
and pay attention to the date stamp if it's there. If the message
is only a day or so old, then you might want to make sure you have
other boxes to fall back on. Besides that, just enjoy the thrill
of listening to other people's private mail...I once got a message
from some guy's mistress...Funnier than hell. All the commands for
these options should be readily apparent, and told to you when you
get in.
     To configure your system with your message, name, and
password you will need to enter the 'Setup menu' or whatever it is
called. Sometimes this function won't be told to you, but that's
not really a problem, their are only 12 digits to try.  Most
systems default to an 8 or a 3. I'll assume you can find it on
your own...
     You've gotten into the config menu by now, and you are
confronted with a multitude of options. First you should ALWAYS
change your password to something that you feel is unhackable,
your phone number is not a good choice. Next you should enter your
own personal message. Try to figure out if the message is time
limited to 30 seconds or a minute, a lot of systems do that. These
systems are usually only good for personal message boxes, and not
code lines. Next, change your name if the system allows you to do
that...I don't think you want to be called Edwina Lipshitz when
someone tries to leave you a message.
     Their may be other functions, such as message forwarding,
call placements, group messages, message waiting status, etc.
Generally these should be ignored, unless you're adventurous and
willing to risk your box with something like having the system
call you when you get a message.
     So, you've done everything, and set up a cool box, eh? Great,
now just for fun, go back to the main system menu, and try to
enter your box as a user would. Type to box number and listen to
your message, if it's satasfactory...You've done it, you now have
a brand new box you can tell your friends.



                         The Seventh Step
                       What to do with a VMB


     Just for kicks, you might want to figure out what to do with
a VMB once you have it. I'll describe two of these options, their
are infinity more to the imaginative.

    Code lines: These are quite possibly the best thing you can
ever have if you are interested in the underground scene. If it is
well advertised, and you post all the info you get, you will have
a popular box. With a popular box, you'll get a vast amount of
information that you wouldn't find on most boards, such as cosmos
dialups, telenet accounts, codes, and other such info. These type
of boxes can get you into trouble quite quickly if the gestapo
finds out about it, as they are a bit more annoyed with someone
who posts all their private information, over someone who just
asks to leave a message at the prompt. But when you live the life
you need to, the risks are not a factor.
     Personal boxes are also great for several reasons. You can
post your VMB to people who need to get in touch with you, even
when they don't have a code. You can also use them in the fine
art of carding. When the salesperson asks for your phone number,
tell 'em something like "It's being fixed, but you can call my
voice mail system at XXX-XXX-XXXX." This will make them a lot less
suspicious then if you give them a bad phone number. Of course you
would want to change the box message to that of the person whose
card you used, but that's obvious.



                          The Eighth Step
                How to keep your VMB safe and sound

     Once you've gone through all the trouble of hacking out a
VMB, the last thing you want is for it to go bad the next week,
their is little in this more infuriating then spending a lot of
time getting a box, to find it go dead the next day.

Several ways to keep your box safe include...
     NEVER hack out more than 1 or 2 boxes at ANY time. If you
need another VMB be kind to yourself, do it on another system.
Their have been too many busts of people who get greedy.
     DON'T allow other people to hack on your system. Threats or
warnings will sometimes be effective, threaten them with things
such as ruining their credit ratings with TRW, sending a few
thousand dildo's to their mother, care of them, or whatever...be
imaginative. Or you can offer to hack out a box for them somewhere
else. This may seem like a bitch to do, but it's worth your time
if the person is an asshole.
     DON'T post your VMB on lame systems, or on systems where
their are a large amount of people who dislike you. These idiots
usually have less of a life than you, and are not against spending
days trying to hack out your password. Since you probably can't
kill them upfront, just make sure they don't get your number.



                          The Conclusion
                        The Usual Bullshit

     This file was researched are written by the Kryptic Night. It
was produced as the first in a series of quality SMC text files
released for the private public. In no way do I care whether you
get busted or not, and accept no responsibility for corrupting
your young minds. Thanx go out to the members of SMC, Scooter, and
everyone else who is interested in freedom of speech.

      Information is the most powerful weapon one can possess
                        against the masses.




                     |
                     |                          \
                     |       /\/\     /          ?\    ???
                     |     /      \ /            ?  \ A ? A
  |  /               |/| /        / \            ?  /   ?  /
  |/                   |        <     \          ?/     ?/  U L T
  |\ RYPTIC          / |          \     \       /       ?\
  |  \     /           |            \                   ?  \
      |\  |            |              \
      | \ |
      |  \|IGHT
     /    `

                - Servants of the Mushroom Cloud -

       Data Kult, Kryptic Night, Lord Logics, Nacht Habicht,
                    Shadow Walker, the Scorpion