💾 Archived View for spam.works › mirrors › textfiles › hacking › cbvhack.pnk captured on 2023-06-14 at 16:46:29.
-=-=-=-=-=-=-
----------------------------------------------------------------------------- CBV Hackin By PiNK ToRPeDo Original File Date: June 7, 1994 ----------------------------------------------------------------------------- You might be saying to yourself... now PiNK - How do I get through those CHeeZY CBV's that everyone uses. There are at least six (6) wayz: 1: Deception 2: Brute Force (easiest & quickest) 3: Tones 4: Loops 5: VMB's 6: Dialouts =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= DECEPTION: The first is tricky because it envolves Social Engineering methods. There are numerous wayz to do this, but I will only go through a small portion of techniques. If you can't figure out the rest - YOU SHOULDN'T BE READING THIS!!!!! The first, is blatent use of a friends line, to verify the CBV. This poses problems because if you intend on hacking a board, they might call him up and ask him why he has been hacking their board. If he has any brain, he might realize it is you. You can also use your work number (if you work on a computer). This method can also pose problems because you could fuk up your work by getting A.G.T. up their asshole or maybe some mad sysop. If you have a laptop.. use a fortress fon. Some of them still allow you to make calls to the fon, but these are scarce. You can also try to deceive the sysop and try to get him to voice verify (fortress fon) ect. All of these methods take time, patience and some good ol Social Engineering, so lets move on to more plausible methods... BRUTE FORCE: This one is phun... and most every good hacker knows it but I will go through it again for those that haven't learned it. What is a CBV? A CBV, is called a "Call Back Verifier" and is used by sysops on boards, so that users can't get multiple accounts. Now if they have two individual lines in their homes, then YES it is possible to get two individual accounts. It calls you back at a specified number to verify your location. Now, to get through them using BRUTE FORCE, it requires only little knowledge and a fon plugged into your modem. Maestro preffered Call the board and leave FAKE information. IE: Name, number, Age ect... If your terminal program has memos, write the fake info down, as some bbs's ask for your birthdate and the last four digits of your fon number. Then when you are done, register by going into the CBV. Then, the computer will ask you if you have entered all the correct info and it will try to hang up, locate Dial tone and then call you. Just before it hangs up, pick up your fon line, so that your computer disconnects and your fon doesn't. So now, your computer is disconnected and you are sitting there with a Data transmission of CBV on your line. Hit "ATA" Thats it!!!!!!!!!! Some CBV's, are that shitty and won't look for Dial Tone, so it will think that it has called you back when you have never left. This method works about 80% of the time, on Shiddy PD boards! Tones: This is similar in content but adds a new twist. You can achieve this two wayz... 1: Use your fon to generate garbage tones. 2: Use a RED BOX (Tone Generator) Let me explain Follow the same guidelines as mentioned above. When the CBV is about to hang...... pick up the fon line. Some CBV's try to hang, so when you here a "click" hold the button "1" down until you here it dial. If it doesn't work try the number "2" ect ect.... then if you here it dial you back, hit "ATA" This sometimes (on some CBV's) will generate the needed Dial Tone and the CBV will call you back. Or at least it thinks it does! If this doesn't work.... Try a RED BOX. This can generate a multitude of frequencies, including Dial Tone (2600 MHz). When you are generating a Dial Tone, you will hear a "click" "click" "click", usually three then it will dial the number you left. Very fukin easy. Loops: Now, if you havn't a clue what Loops are get a good file from your local H/P BBS and learn. For those who know... you should be getting ideas. Call the bbs, get the CBV going and put in the Loop's, low end line number. Then quickly call the high end and wait... when it calls just hit "ATA" VMB's: Again, if you don't know how to use them... go get a file and learn. After hacking a codeline, you will gain certain access to the VMB. If you have a diverter number (used by that certain VMB) enter that number for the CBV to call. Call up the Diverter and use Call Forwarding on the VMB (*72) You might be saying "Well, PiNK-how can I use CF on some other line? Doesn't the VMB have to suscribe to it? Well yes, but in some business areas certain codes are free! If you happen to have a VMB within certain areas... it might has CF phree! If not, then look for one. When you enter the VMB line for the CBV and use CF, then it should call you back. Just type "ATA" If you are also wondering "Well PiNK.... how do I get from Data to voice and voice to data? Command: ATX1DT This is so that when the CBV calls you can quickly get into and out of the Data mode. (Voice to Data) Dialouts: This is pretty self explanatory. Call the divertor and try *72. If, like above, it has call forwarding, then forward it to your own number. Call the bbs, enter the dialouts number. At this point....... you should be able to get into any computer using one of these methods! For sysops wanting to correct this flaw: 1: Find a CBV, that waits for DT no matter what 2: Find a CBV, that can distinguish between DT and a fuking fon tone 3: Find a CBV, that will wait an undisclosed time before going through the process. Random calling is best 4: Use Call display at every opportunity 5: Voice verify every fuckin puke there is! =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Thanks to everyone who helped me... No one! Except for the original makers of the file "CBV hackin". Vince Neil of course. To all those who came before... your knowledge wasn't wasted. To all those who come after.... live, learn and hack. Cheers! PiNK