💾 Archived View for spam.works › mirrors › textfiles › messages › phoenix2.msg captured on 2023-06-16 at 19:12:15.
View Raw
More Information
-=-=-=-=-=-=-
ASCII download 1-Aug-1997 12:41p
???????????????????????????????????????????????????????????????????????????????
*** {Phoenix Project BBS Message Base File 2 of 3} ***
______________________________________________________________________________
Copyright (C) 1993 LOD Communications. No part of this Work may be
distributed or reproduced, electronically or otherwise, in part or in
whole, without express written permission from LOD Communications
______________________________________________________________________________
*** {General Sub-Board} ***
< Q-scan General Discussion 1 - 132 msgs >
1/132: This Sub
> Permanent Message
Name: The Mentor #1
Date: Sun Jan 07 05:09:24 1990
This subboard is for general b.s. - you can talk about anything from who just
got busted to sports to the headlines. This is also the proper place to plug
other BBSes. Anything even mildly technical probably has its own subboard. You
can get a list of subs by typing "*" and you can change subs at the main
prompt by simply typing the number of the subboard you wish to go to.
Mentor
2/132: Welcome Back
Name: The Mentor #1
Date: Tue Jan 09 13:05:05 1990
Welcome back to Phoenix! Not everything is back together -- the transfer
section, in particular, still needs some work. But I've started contacting our
former users, and hope to have things back up to the normal speed by
mid-February.
Please advertise! Let everyone know that we're back!
The Mentor
Legion of Doom!
3/132: ...
Name: Erik Bloodaxe #2
Date: Tue Jan 09 13:47:47 1990
MAN...Ok, first off, everyone try REAL hard to get their messages
right the first time...the edit commands are terrible...
NOW: I heard that Continental airlines has some kind of Super-super saver
fare in which you can fly one way anywhere for 9 bucks...Amazing? Yeah
I thought so...so if that's the real story, there is no excuse for you
people who have said time and time again that you'd like to go to TX
to not actually come...(Ahem...DAN!).
So, in any event, welcome to the bbs...I'm damn glad it's local!
->ME
.s
4/132: One way to Houston...
Name: Daneel Olivaw #9
Date: Tue Jan 09 18:18:20 1990
what a trip!
$9 to Houston, $19 to Dallas I think.. not bad
Daneel
(Get it right the first time Erik)
5/132: airplanes
Name: Silencer #31
Date: Sat Jan 13 02:16:40 1990
Really? where'd you here that? A comercial or what...if its true it looks
like I'm headed towards LA next week....heheh......Also..one big greet to
everyone new and old.....
- Silencer/ DFKN
6/132: Well...
Name: Erik Bloodaxe #2
Date: Sat Jan 13 10:02:07 1990
I was kind of wrong...
I read the ocntinental ad in the paper yesterday...
It seems that this is some kind of Texas thing,
you can fly all over texas, and to OK City, and to New Orleans
for no more then $38 one way...I might go to New Orleans...
Hell for $38...I spend more than that on beer every night it seems...
->ME
7/132: Morris update
Name: Phiber Cut #34
Date: Sat Jan 13 12:54:00 1990
AM-HackersTrial 01-11 0370
^AM-Hackers Trial,0381<
Hackers Charged with Selling Computer Codes to Soviets on Trial<
CELLE, West Germany (AP) _ Three West Germans ``hackers'' went
on trial Thursday charged with selling Western military computer
passwords and codes to the Soviets.
Dirk Brzesinski, Peter Carl and Markus Hess were arrested last
March after an investigation by U.S. and West German officials
revealed they had obtained information giving them access to key
military and research computers in the United States, Western
Europe and Japan.
A fourth man, 30-year-old Karl Koch, who was also arrested in
the case, committed suicide in May.
Brzesinski, 30, a computer specialist, told the court that Koch
had come up with the idea of selling the information.
``We decided in 1986 to sell the information to the Soviets for
1 million marks ($605,000) to help them even out the technical
know-how advantage of the West,'' Brzesinski said.
Carl, 35, said he was responsible for contacting the Soviet
trade mission in East Berlin, where he dealt with a contact
identified only as ``Serge.''
Carl said he did not want to reveal anything more about the
Soviets in court for fear of reprisals.
Court records show Carl made at least 25 contacts with the
Soviets and received a total of 90,000 marks ($54,500) for the
information.
According to Brzesinski, Koch before his death claimed he had
managed to gain access to the U.S. Defense Department general
databank known as Optimus.
After the arrests last year, U.S. and West German news media
reported that other computers the hackers entered included a NASA
and a ``Star Wars'' research computer, as well as computers linked
to nuclear weapons and energy research in Los Alamos, N.M., and the
Fermi Laboratory in Illinois.
However, U.S. officials said last year that although the
hackers
obtained sensitive codes and passwords to enter the computers, they
were stopped short of obtaining any highly classified information.
Investigators have said that codes and passwords from computers
in Japan, Britain, France, Italy, Switzerland and West Germany were
also obtained and sold to the Soviets.
A verdict in the trial, scheduled to be completed in 12
sessions, is expected Feb. 8. The men face up to 15 years in prison
each if convicted.
AP-NR-01-11-90 2317EST<
8/132: Morris update
Name: Phiber Cut #34
Date: Sat Jan 13 12:56:35 1990
AM-ComputerWorm 01-11 0504
AM-Computer Worm,0518<
Berkeley Programmer Says Worm Hid Itself From Victims<
By WILLIAM KATES=
Associated Press Writer=
SYRACUSE, N.Y. (AP) _ The ``worm'' program that paralyzed a
nationwide computer network in November 1988 was designed so its
victims wouldn't know how they were being attacked, a computer
expert testified Thursday.
Robert T. Morris' rogue program used several methods to worm its
way into the Internet network, said Keith Bostic, a program analyst
at the University of California at Berkeley.
``It was designed to break into as many computer systems as
quickly as possible and escape detection as it was doing so,''
Bostic said on the second day of testimony in Morris' computer
tampering trial in U.S. District Court.
Morris, 25, of Arnold, Md., is charged under the 1986 Computer
Fraud and Abuse Act with ``hacking'' into a federal computer
network. If convicted, he faces as many as five years in prison and
a $250,000 fine.
Prosecutors allege he devised and unleashed a program that
replicated wildly, immobilizing an estimated 6,000 computers linked
to Internet, including those at NASA and several Air Force
installations and universities.
Defense attorney Thomas Guidoboni has said that Morris created
the worm as a computer security experiment, but that he made a
programming mistake that let the worm go berserk.
Guidoboni said during opening statements that once Morris
learned of the problems his program was causing, he tried to stop
it, and when that failed, he tried to alert network users.
But Bostic testified that no one in Berkeley's computer science
research group received any warning about the worm from Morris.
Four top computer programmers worked 16 hours to crack the
worm's defenses, he said.
According to Bostic, the worm entered the school's computer
system by using two defects in the software used by the system and
by solving passwords, either through a list built into the worm or
by checking possible guesses against the computer's own internal
dictionary.
The worm also took advantage of the computers' ``trust'' for one
another on the same system, a process by which a second computer
will allow access to the system after seeing that an account
already has been authorized by another computer on that system,
Bostic said.
The rogue program hid itself in four ways, he told jurors.
It traveled via binary code, rather than a more easily read
source code, and those parts of the program that could be read by a
literate user were encrypted to further mask what the worm was
doing, Bostic said.
Morris' program also was set up so that it provided phony
identification names when Berkeley's scientists were trying to
trace it. The worm created more deception by periodically changing
the program identification number attached to it by the Berkeley
computer system, he testified.
Bostic said the ``quick and powerful attack'' by the worm left
no computer on the university system untouched.
``It would break into as many machines as it could, even
machines it could not run on. It was completely indiscriminate,''
Bostic said.
AP-NR-01-11-90 2112EST<
9/132: Morris
Name: The Mentor #1
Date: Sat Jan 13 15:19:46 1990
So, how many of you think Morris will go to jail over this? How many think
he'll get anything but community service?
Mentor
10/132: Another update.... the case continues....
Name: Phiber Cut #34
Date: Sun Jan 14 08:06:59 1990
SYRACUSE, N.Y. (UPI) -- A graduate student said Friday it was
``pretty amazing'' to watch classmate Robert Morris break into a
computer at the Massachusetts Institute of Technology with a program
that could land the computer whiz in jail.
Dawson Dean III testified that five days before Morris allegedly
unleashed a destructive program called a ``worm,'' he showed Dean he
could enter an MIT computer without the machine acknowledging the
intrusion.
``The machine didn't know that he was logged in,'' said Dean, an
MIT graduate and doctoral candidate at Cornell Univesity. ``It was
pretty amazing.''
Morris, 25, of Arnold, Md., is the first person to be prosecuted
under a portion of the 1986 Computer Fraud and Abuse Act.
He was indicted in July on a charge of causing financial loss by
intentionally introducing a program into a military and research
computer network without authorization. If convicted, he faces up to
five years in prison and a $250,000 fine.
Dean said the incident on Oct. 28, 1988, was preceeded by Morris
allowing him to look over his shoulder at a computer terminal on
Cornell's Ithaca, N.Y., campus and scan a list of more than 400
passwords Morris had discovered. The passwords had been translated from
an ``encrypted,'' or coded, form into English.
``There are 4,096 ways to encrypt a given password,'' Dean said.
``He said he had done it basically to see if it was possible to do.''
Dean said Morris gave him the ``impression'' a computer at Cornell
spent four days running a program the defendant had designed to find the
true spelling of the encrypted passwords.
``I asked him, `Is mine in the list?''' Dean said. ``I also asked
him if the password of this other really obnoxious graduate student was
(listed).''
Dean confirmed for Justice Department trial lawyer Ellen Meltzer
the list he read that night was similar to one investigators found in
computer files Morris maintained at Cornell.
Dean testified Morris told him he would pursue a doctorate and
career in computer languages and, although he already had extensive
experience in computer security, did not plan to write his thesis on
security issues.
``He told me he had hacked around with computers before,'' Dean
said.
Under cross examination from defense attorney David O'Brien, Dean
said he thought the suspect's efforts to break computer security systems
was the result of an inquisitive mind.
``He was a graduate student of computer science. You're learning to
do research. It's a real natural instinct to want to learn how the thing
works,'' Dean said.
Earlier, William Johnston, a computer systems manager at the
Lawrence Berkely Laboratory in California, said the worm did not at any
time endanger cancer patients at the research center, but cost the lab
in excess of $10,000 to purge the system.
Morris was a 1988 Harvard University graduate attending his first
semester of graduate school when, prosecuters argue, his program
replicated out of control Nov. 2, 1988, and froze about 6,000 computers
linked to the major military and research computer networks Internet and
Arpanet.
A Cornell investigation found Morris, who has been suspended from
the university until September, worked alone on the program, which it
termed a ``juvenile act that ignored the clear potential consequences.''
11/132: The question is...
Name: Daneel Olivaw #9
Date: Sun Jan 14 19:19:12 1990
how many think he should go to jail... and for how long?
Daneel
12/132: long enough
Name: Grey Owl #10
Date: Sun Jan 14 21:38:38 1990
I think people who write viruses shouldn't be allowed to go free. This is a
personal opinion, but mistakes do happen as you saw with that internet virus.
I know that I would be highly pissed if the net went down under me.
grey owl
13/132: well...
Name: The Mentor #1
Date: Mon Jan 15 01:31:30 1990
I dunno, I think he'll get hit with about 750 hours of community service and
maybe a hefty fine ($100,000 or so...) I doubt he'll do any time.
Mentor
14/132: well
Name: Phoenix #17
Date: Mon Jan 15 02:15:43 1990
Umm.. i dont disagree with the theory o viruses... what i do disagree wit is
viruses which destroy systems. I a virus has a speciic task.. <eg - get root
on unix> then by all means... go or it...but viruses which are deigned to
destroy.. well.. only in the most dire o circumstances.. and even then..
Phoenix
<The Flatline>
Jacking Out..
15/132: Well...
Name: Konica #47
Date: Mon Jan 15 15:57:50 1990
I know a guy that writes viruses all day on anyhing he possibly can to destroy
a system. So when I get into anything I never trust him with anything.
.s
/e
16/132: Yeah...
Name: Erik Bloodaxe #2
Date: Mon Jan 15 17:23:21 1990
Poor Mr. Morris...rough having to live under Dad's shadow...
hell, if the damn thing would have just worm-ed around like he had
wanted...it would have been beautiful. Unfortunately, it had a minor
flaw and caused the problems it did. What exactly did it overwrite?
Portions of sendmail or something? I don't remember.
Yo: Loyd, maybe you or I should type up that Communications & the ACM
article on the whole episode. I thought it was really
cool, and a lot of people on here probably haven't ever
read it.
->ME
17/132: hmm..
Name: Phoenix #17
Date: Mon Jan 15 17:48:44 1990
did morris ind the bug in sendmail himsel, or did he read it somewhere...
and has anyone ever tried using that bug <i would assume it would be dead...
but there is always the ancient system whichhasnt been upgraded since time
began..>
18/132: right
Name: Grey Owl #10
Date: Mon Jan 15 18:01:53 1990
I don't like viruses at all...just because of those unlikely mishaps that
happened with the internet worm. It's just too risky. Either that or Morris
wasn't careful enough.
grey owl
19/132: worm
Name: The Mentor #1
Date: Mon Jan 15 21:32:44 1990
Well, it wasn't the overwriting that caused a problem. He put a mechanism in
it that "queried" a target system - if the worm was already installed, it
would ignore the system. But he decided that this would be an easy way to
defeat it, so set the thing to go ahead and re-install on about 1 in 1000
systems. He figured this would hit a couple a day - it turned out that it
could be several hundred per hour. This clogged up the internet lines and
slowed things down massively. (Yes, there were other symptoms - but this is
the most obvious.)
There are a couple of people on here who are testifying at that trial. We'll
have to ask them for a summary once they're done. (Yes, I know they can't
talk about it until it's over.)
Mentor
20/132: transfer section!
Name: The Mentor #1
Date: Mon Jan 15 22:27:44 1990
Ok, I've gotten a bunch of stuff uploaded to the transfer section. If anyone
has issues #1-21 of Phrack already broken up into separate files (anyone who
was on the original Phoenix may have d/l'ed them from here, even), please
upload them. I don't want to go through the hassle of splitting them up again.
When you are uploading files, unless you are in a specific computer section
(i.e. Apple, IBM, etc.), please use a standard ARC program (not ZIP or PAK or
LZH!). This way, most people can download them.
I'll try to have the gfiles up within a week - but they're a significant pain
in the butt.
Mentor
21/132: ...
Name: Tak/Scan #44
Date: Mon Jan 15 22:40:45 1990
Yeah great.
L{ts keep the UPLOADS{Coming in.i]
Darn Line Noise. hehehe
Tak/Scan
Sysopf Of the Fourth Dimension
The 4th Dimension! 619-745-1xxx. Login PW-SPECTRUM. Newuser PW-Gunship.
22/132: Worm, et al.
Name: Phiber Cut #34
Date: Tue Jan 16 06:54:56 1990
For those of you who are on the internet, read comp.docs and get rfc1135. This
is yet another article on the worm. It summarizes/reviews all previously
written worm articles (i.e., Eugene Spaffords, etc.), explains in lay
terms what actually happened (how the sendmail and fingerd holes worked
and were exploited). It also has a very complete and very lengthy
bibliography for anyon e interested in reading up on the worm.
23/132: Bug
Name: Phase Jitter #3
Date: Tue Jan 16 09:42:12 1990
The sendmail bug, I'm quite sure, was just the sendmail -bs WIZ bug..
That's been around forever!
24/132: phracks...
Name: Dark Sun #11
Date: Tue Jan 16 13:29:27 1990
Sure.... I'll upload 'em tonite.
DS
25/132: sendmail bug
Name: Phiber Cut #34
Date: Wed Jan 17 19:58:46 1990
Phase... if you're talking about the sendmail bug "that
been around forwever", I assume you're talking about the
hole in the bsd versions 2 and 4 sendmail. Actually, it's
not really a hole. Basically, it reads in 256 (?) bytes for
and address. However, if you send 256 bytes of garbage, any
other information flows over into the receiveing system (like
worm source instructions, etc).
26/132: well
Name: Phoenix #17
Date: Thu Jan 18 01:54:17 1990
and does it still work ?
27/132: phracks
Name: Silencer #31
Date: Thu Jan 18 05:26:55 1990
Well...if you want em....and no one gets em....I think most of that stuff
(including the LOD tech journals and all that kinda stuff) can be found on
Atlantis. am having trouble d/ling from there or I;d get em for ya.
28/132: Sorry for delaying...
Name: Dark Sun #11
Date: Thu Jan 18 12:29:23 1990
I'll post 'em (Mentor gave 'em to me about 1 year ago)... I was just waiting
to know how he wants 'em uploaded.
BTW, Mentor, Someone fixed phrack 9 so, that wont be corrupted, but 2 issues
ARE still missing.
DS
29/132: .....
Name: Tak/Scan #44
Date: Fri Jan 19 20:51:12 1990
ATTN-
NAME- The Fourth Dimension Underground
Number- 619-745-1xxx
Login: SPECTRUM
NEW USER PW: GUNSHIP
90 Megz!
100% Amiga FILES!
Brand NEW BBS! growing fast alot of Expert conversations \\on the hour!
Call now..
Tak/Scan
TFD/PPP!
30/132: Arc
Name: Johnny Hicap #45
Date: Fri Jan 19 21:56:04 1990
Does anyone have a Commodore 64 arc program? If so, can you upload it for
me....
31/132: phrack...
Name: The Mentor #1
Date: Sat Jan 20 02:58:54 1990
Welp, Phrack magazine is dead. Those of you who pay attention to BITNET know
that the phrack accounts at U of M have been shut down. The story is as
follows...
Government agents (not sure of the dept., probably SS) have apparently been
monitoring the e-mail of the Phrack kids (Knight Lightning & Taran King) for
some time now. Apparently, a portion of a file sent to them (and subsequently
published) contained copyrighted information. This is all they needed. They
have now seized the entire Phrack net mailing list (over 500 accounts), plust
every piece of information that Randy & Craig have (and they have a *LOT*) on
real names, addresses and phone numbers.
This is evolving directly out of the busts of three LOD members (Urvile,
Leftist & Prophet). The Prophet (who is on probation) is apparently being
threatened with a prison term if he doesn't cooperate. We don't know for sure
if he cooperated or not, but what would you do in the same position?
The same officials are apparently *VERY* interested in our co-sys, Mr.
Bloodaxe. His net account is being watched, etc. I'll let him tell the story.
Anyone wishing to communicate with Erik or myself should do so through the
board only. I will be adding a secure (and I mean fucking secure) encryption
routine into the e-mail in the next 2 weeks - I haven't decided exactly how to
implement it, but it'll let two people exchange mail encrypted by a password
only known to the two of them. Hmmmm... carry this conversation to the
programming board.
Anyway, I do not think I am due to be busted, but then again, I don't do
anything but run a board. Still, there is that possibility. I assume that my
lines are all tapped until proven otherwise.
There is some question to the wisdom of leaving the board up at all, but I hae
(have) personally phoned several government investigators and invited them to
join us here on the board. If I begin to feel that the board is putting me in
any kind of danger, I'll pull it down with no notice - I hope everyone
understands.
It looks like it's sweeps-time again for the feds. Let's hope all of us are
still around in 6 months to talk about it.
The Mentor
Legion of Doom!
32/132: hmm
Name: Phoenix #17
Date: Sat Jan 20 07:50:12 1990
this is getting truly annoying..
Phoenix
33/132: Phrack, etc...
Name: Phiber Cut #34
Date: Sat Jan 20 09:30:10 1990
RE: phrack...
I sounds to me as though the "SS" was really reaching. I mean, to get
them on "copyright" violations is sort of like that had such a hard on
for the phracboys it was as though they went after gangsters with
income tax evasion!
What is the legality of them spreading all of this information that they
have obtained throughout the world? I mean, if they got names, etc..,
isn't that private information? Do they or wl they publish all of it
to the maniacsout there?
34/132: More news....
Name: Phiber Cut #34
Date: Sat Jan 20 09:41:23 1990
AM-MilitaryHackers 01-18 0693
M-Military Hackers,0716<
Break-In Shows Military Computer Vulnerable _ Prosecutor<
SAN JOSE, Calif. (AP) _ Three Silicon Valley computer workers
have been charged with breaking into government and telephone
company computers in a case that prosecutors said Thursday
demonstrates the vulnerability of those systems.
The three are accused of committing what may be the first
electronic invasion of a military computer network, according to
one expert. A federal indictment charges them with obtaining flight
orders for a military training exercise, of eavesdropping on
private telephone conversations and getting FBI information on
associates of the late Philippine president Ferdinand Marcos.
The case ``does signal a vulnerability'' in the Pentagon's
computers, U.S. Attorney Joseph Russoniello said Thursday at a news
conference in San Francisco.
The indictment, unsealed Wednesday in U.S. District Court in San
Jose, is one of the first in the nation to use federal criminal
statutes directed at computer crime, said assistant U.S. Attorney
Robert K. Crowe in a news release.
The charges, Crowe said, reveal ``the extreme vulnerability of
the phone network.''
Charged were Kevin L. Poulsen, 24, a former employee of SRI
International, a Menlo Park computer consulting company; Mark K.
Lottor, 25, a current SRI employee; and Robert E. Gilligan, 31, who
worked for computer-maker Sun Microsystems.
``Poulsen could do whatever he wanted to do with the telephone
system as well as with government computers,'' Crowe said Wednesday.
The three are charged with 19 counts of conspiracy; computer
fraud; fraud involving computer access devices; using fictitious
names or addresses; possession of electronic wiretapping devices;
falsely repesenting a social security number; interception of
electronic communications; embezzlement and theft of public
property.
Poulsen is named in 17 counts involving all of the offenses;
Lottor is named in five counts and Gilligan named in seven counts.
If convicted, Lottor and Gilligan face 20 years in prison and
fines of $30,000. Poulsen could be sentenced to 37 years in prison
and a $50,000 fine.
According to the indictment, Poulsen used common burglary tools
including surgical gloves, powdered graphite and lock picks, and
forged a Pacific Bell employee card to steal the telecommunications
equipment and access codes from the regional phone company's
offices.
Gilligan and Poulsen are accused of trafficking in codes that
allow access to government computers through electronic mail.
The pair got access to the Army's Masnet Computer Network, the
indictment said without detailing uses of the computer.
In late 1987 and early 1988, Poulsen got air tasking orders for
a military exercise at Fort Bragg, N.C., called CPX Caber Dragon,
the indictment said. The information, secret at the time, has been
declassified because the event has already taken place, Russoniello
said.
The Marcos information was a computer list of phone numbers and
cable assignments of Marcos and others that related to an FBI
investigation, the indictment said.
Peter G. Neumann, a computer security expert at SRI, said this
was the first case he knew in which classified information was
allegedly obtained by computer break-ins.
The indictment accuses Poulsen of using his computer knowledge
to obstruct the investigation into his alleged activities.
Gilligan and Lottor were expected to surrender voluntarily.
Poulsen, who called federal authorities but manipulated the
computer so the call couldn't be traced, remained at large.
Poulsen quit SRI in 1988 and took a job at Sun but later moved
back to Los Angeles to live with his parents, said Donn Parker,
security expert and senior management consultant with SRI.
Poulsen was hired by SRI despite company officials' belief he
once broke into a computer at the University of California, Los
Angeles, Parker said.
``The people who hired him did know he had some hacker
experience in his background, but he was a very bright guy,''
Parker said. They considered the earlier incident youthful excess,
he said.
The indictment doesn't indicate what authorities believe the men
intended to do with the military secrets, but Parker said Poulsen
told him several years ago that his youthful exploits were
motivated by curiosity.
``I knew him as a typical young hacker. At least in past
conversations he told me he was motivated by curiosity and the
challenge to get into systems,'' Parker said.
AP-NR-01-18-90 1936EST<
35/132: Phrack and Pac*Hell
Name: Ripper #51
Date: Sat Jan 20 21:05:55 1990
Well-
A copyright infringment isn't all that major that the SS would bust them for
just that. I'm willing to bet they intercepted something bigger than a simple
copyright piracy case. Although they would be interested since the
information is being transported accross state (and quite likly) national
boundries.
About the San Jose case, sounds like they just got access to the TAN
(Technical Access Network), and went from there. Along with their other
antics, they'll prob get a prison term, because they are really strict on the
wiretap bit. I don't get the part about the false names and addresses. The
courts have said in the past, you can just pick a name out of the blue and use
it, and you can give any kind of information (like a false address or phone
number for instance) as long as the documentation is not for an official
purpose and is not intended to defraud someone.
I noticed Peter Neumann in there, he's a guy to listen to, and many of you
might reconize him from the Risks forum on the net. He is one of the few
public figures involved in computers that knows which way is up.
Recap-
Phrack will most likly get a slap on the wrist, but will have a sober look at
the world, and won't be inclinded to be as high profile as they were.
The San Jose case, I'm betting it'll turn high profile, and there will be alot
of pressure for a nice long lock up.
Most of this is based on my dealings with local, state, and federal law, as
well as experience I gain while working for the County of San Diego.
.
36/132: phrack
Name: Dark Sun #11
Date: Sat Jan 20 21:36:56 1990
I would think they knew of dealings between phrack & hackers/phreakers, but
they had to have some real evidence in order to get in, once they did, they
found much info that would make for a good prosecution... As any hacker knows,
its the little things that matter
DS
37/132: The Bottom line.
Name: The Parmaster #21
Date: Sun Jan 21 10:05:38 1990
The bottom line is..a crackdown.
We can now expect a crackdown because of the shit wiht the virus,the boys in
cali,and the phrack kids....
The phrack boys were just the start, i'm sure of it..
I just hope that i can pull through this one..and that my friends can also.
This is the time to watch yourself...
No matter what you are into.. whether it's just codes,cards,etc...
Apparently the government has seen the last straw in their point of view.
Unfortunately with all of this in the news now, they will be able to get more
government money to combat hackers.
And thats BAD fucking news for us.
I think they are going after all the "teachers" etc/.. people who educate
others into this sort of thing..
(which i didn't need to say because it's obvious after what happened to randy
& craig)
i wonder if they think that maybe these remote cases are linked in any way..
The only way they can probably see is that we are hackers..
And so that is where their energies will be put..
To stop ALL hackers..and stop people BEFORE they can becomea threat..
After they wipe out the educators taht is.
Just a theory.
Par,
Jason
38/132: Phrack
Name: Phiber Cut #34
Date: Sun Jan 21 13:09:20 1990
It's a scarry thought... - How did the intercept the information?? -
An informatn, ok, that's legal.... but how private is electronic mail?
Per haps we need a sub board to discuss some of these LEGAL issues...
39/132: ripper
Name: The Mentor #1
Date: Sun Jan 21 17:12:22 1990
Well, I know TK & KL pretty well, and they've been paranoid about doing
- anything* illegal. I think the SS just had a hard-on to hassle them and this
was the only excuse that they could come up with...
Mentor
40/132: Well,
Name: Warf #81
Date: Sun Jan 21 21:47:05 1990
I have somewone that is saying that he's gona' turn me into the pigs. IF
something happends to me then don't worry. I'm gona' lay low for a while
about a week or so.. so just dont' worry, BUT if something does start to
involve you's then don't worry,, it won't.. heheh!
<=[Warf]=>
41/132: Phrack
Name: The Dictator #43
Date: Mon Jan 22 01:19:32 1990
Im not sure what to make out of the Phrack. I think the SS, FBI, and whoever
has been waiting to bust them so long on ANYTHING that they waiting untill TK
KL crossed the line in any way. I mean, hell..TK and KL were paraniod, and
they suspected everything..so they stopped..and the SS, FBI and whoever had
nothing to go on...
Parmaster was right, TK and KL were "eductors"..a lot of hacks/phreaks looked
up to them..maybe the SS and FBI thought that maybe if they couldnt get the
little guys, then to go for "the big guys"..(same philosophy of the drug war,
eh? Get the dealers, not the users?) Oh well..
I dunno..thats just my opinion... Shit, the public doesnt understand us enough
for the government to declare war on us... Maybe if you collect everyones
opinion on this, we can come to ONE conclusion..
The Dictator
42/132: Phrack
Name: Erik Bloodaxe #2
Date: Mon Jan 22 02:40:13 1990
Craig was very upset when I talked to him a few days ago.
The Secret Service had been to their school and had taken all information off
of their public accounts through the university...this included the ENTIRE
phrack internet mailing list, future files, old issues, various lists of info
on people they knew, etc...
Craig assured me that they didn't go through his room, or even mess with his
pc, but that didn't matter, as they got enough from the system at school.
The problems stem from various articles published through Phrack, most
specifically an article dealing with E911 that was written by The Prophet.
They have said that this was stolen from a computer system, and was accepted
and distributed knowing that it was illegally obtained propriatary
information.
(The Prophet was one of the 3 LOD members busted this summer in Atlanta) This
led to various questions dealing with LOD in general and a great deal of
hazing towards Craig.
For the most part, they pulled the same crap: "We know what you did, so if
you're smart you'll talk, or we'll make your life shit." And the other
approach, "Look, we know you're a smart kid with a bright future and we really
wouldn't want to see you fuck things up." Basic cop bullshit.
Craig was visited first by 3 agents, and Randy was supposedly to be visited
the following day. (They are at different schools now)
They were interested in the Telenet Directory, The EFT Files, which by now,
everyone knows that I wrote, since they had been grabbing the boys e-mail.
That pisses me off greatly, as Electronic Mail is supposed to be covered under
the same protection as regular mail now, or so I understood. I thought it was
a felony to interfere with peoples mail. Can you commit a felony, to stop a
suspected one from occurring? I hope not...hell, maybe Noriega is in charge
now...
In anycase, I think I'm in for a world of shit...
43/132: MY feelings about this fucked up situation
Name: Erik Bloodaxe #2
Date: Mon Jan 22 03:31:01 1990
I do not live in a fascist country...or so I thought.
INformation is withheld, people are threatened daily by an elite group of
Government thugs who operate above the law, hell, what do you call that kind
of bullshit?
I'm growing more and more pissed by the minute...if I do get nabbed, which I
semi-expect to, so you SS boys take a good look at this, I am dangerous.
Maybe not in a physical manner, although I'm kinda suicidal, and don't know
how I'll be on any given day, and I've only tried to kill my roomate once with
a big knife, and I've only broken wine bottles over two people...
But, I am dangerous in that I'm quite eloquent and VERY outspoken on topics
about which I feel strongly. Guess what? I kinda have a personal leaning
towards computer crime. Think carefully about reprocussions world-wide when
reporters find out just how insecure your precious Internet is, or think about
the stock fluctuations on Fortune 500 companies when their shareholders find
out just how easily the company cuuld be shut down for a few days with a few
keystrokes, or consider the implications following just a few choice comments
about the lack of security at large banking institutions...hell, How fucking
skilled does someone have to be to sit on a nua and capture every fucking
Saudi Visa? (No offense Par) but that shit is totally rediculous. Security
is pathetic, and the ones who can fix it, or at least point it out are
supressed, and placed in jail.
Fuck that. If that's what you expect to do to me, then you had better be
prepared to blow my fucking head off when you kick in the door, because I will
be heard.
->ME
44/132: Another thing...
Name: Erik Bloodaxe #2
Date: Mon Jan 22 03:57:05 1990
Warf: who the hell are you that your bust could worry anyone but yourself?
Hell, I know I'll be up all night now.
Hell, maybe your problems all stem from posting bad things on bbses where they
don't belong.
I'm still pissed...everyone else ignore me, things get clearer on a few
subboards after this...WARF fucked up...don't you be next.
->ME
45/132: Attention Feds
Name: Black Magic #54
Date: Mon Jan 22 04:26:40 1990
Being Mr. Bloodaxe's roommate I do have one small request. We sleep late
around here, so please delay any breaking down of doors or other noisy
activity until after 12:00 pm.
His room is the one on the RIGHT at the top of the stairs just to avoid
confusion (our descriptions are very similar and I realize that you fucks
aren't all that bright.)
Also, be sure not to let the cat out. Just prop the door back up on it's
hinges or put him in a bathroom while exercising the warrant.
Thanks,
Chris (what a coincidence huh)
46/132: Hum...
Name: Warf #81
Date: Mon Jan 22 07:41:16 1990
I think the way this is set up is wierd. I loged on new the other day and
I could read all of the messages and all of the message beses. Hum... so that
means that some cop get's the number right? And then he sees all of these
phreakers and stuff and then boom. We're all gona' be with each other in the
same cell for about 5 yrs min... Hum.. SysOp, could you make it a LITTLE more
secure? Just helpin' out...
<=[Warf]=>
47/132: well
Name: Phoenix #17
Date: Mon Jan 22 09:21:39 1990
as long as nothing illegal is not posted.. the board is ine..
<damn f key..>
well...
All i have to say is that i ss/eds/or in my case CIA start playing dirty..
we have been very nice in general about everything..
In act I cannot think o anytime when i have bought a system down..
But i it comes to it... we can ight ire with ire..
<add f's where chars are missing.. i gotta get a new keyboard..>
coz i seriously agree wiuth erik..
and when you guys start breaking the law to get at us...
well.. what the hell is the law or... i never liked the damn thing anyway..
jesus..
as a inal note... i will set up some sort o insurance...
not just or mysel... but or anyone who needs it... and cant provide it or
themselves..
we can play below board just as much as any authorities can...
so there
Phoenix
48/132: security
Name: Phase Jitter #3
Date: Mon Jan 22 10:51:04 1990
The reason you could read everything is because this board is for education
purposes. It is not used for ANY illegal information trading. There is no
point to have it secured, because there is nothing illegal on here..
Phase Jitter
Legion o' Doom!
(The few, the proud)
49/132: dumb feds
Name: Grey Owl #10
Date: Mon Jan 22 14:11:13 1990
Kill 'em all..as I like to say. Seriously, what can they prove if you are a
safe hacker? (hacking via outdials, phreaking with divertors only..no codes
etc. nothing traceable) They can't prove a damn thing. So what do they do,
but nail you on something trivial like copyright violation. All that shows is
that they have such a weak case that there is nothing solid to bust on.
Enough rambling for this paragraph...
What we need to do is set up a hackers network where everyone has their hands
in a few systems. That way, we have this sort of insurance that Phoenix
talked about: if one hacker gets busted 2 systems _die_. 2 hackers get
busted 4 systems bite the dust. 3 hackers...9 systems. They need to quit
messing with people who wouldn't otherwise be harmful to the computer world.
I know there are freeloaders around that get their kicks from trashing Apple][
boards and unixes, but this doesn't represent the majority of the hacker
population. It sure doesn't represent me!
grey owl
50/132: busts
Name: Dark Sun #11
Date: Mon Jan 22 15:33:56 1990
I dont think that would be a very wise idea... It would just cause the
"authorities" and the general public to look toward us as destroyers, not
explorers... The ONLY times I have killed a system is when I really get pissed
off that the sysop keeps changing all the operator passwords (well... so maybe
i am a little malicious at times, but not like some people on this board)
DS
51/132: Arg...
Name: Erik Bloodaxe #2
Date: Mon Jan 22 18:22:55 1990
Wiping out systems as a means of retribution, or vengance for a fellow hacer's
bust is NOT a good idea. You cannot take a bully approach when dealing with
the world biggest bully (The US Government) you will lose.
You have only one manner of defense, and that is to outsmart your opponent, or
to publicly humiliate him when faced with immediate danger.
By the way: Phoenix, how come you can never type an "f" when it's in a word,
but when you are complaining about your broken "F" key, it shows up fine?
COnfused as to the wonders of technology...
->ME
52/132: Back Phracks...
Name: Pain Hertz #84
Date: Mon Jan 22 21:59:17 1990
Whoever ul the back phracks, I have 29 and 30 if they are needed and a local
doesn't have them. -PHz
53/132: hello
Name: Phelix The Hack #89
Date: Mon Jan 22 23:28:09 1990
hello all, to those that know why..leave me mail...and you SHOULD know who you
are as I have not talked to you for 7 mos or so...SO GET ON THE STICK.
to everyone else..well you can leave me mail if you choose..but ...
pth
54/132: Resistance
Name: Jedi #67
Date: Tue Jan 23 01:42:42 1990
We came across a fun article on p/h and pirating as a form of "post-modern"
resistance by a coupla academic types. If anybody wants, I can dig up a copy
and upload it
55/132: well
Name: Phoenix #17
Date: Tue Jan 23 06:48:33 1990
maybve we should think about what type o insurance we need..
ok.. agreed... bringing down systems will only piss them off more.. and make
us look even worse..
public humiliation... that would do it... but not all individuals who get
bustedhave the resources to deend themselves with...
also... once your information is bought out in public.. your cards are played..
and then they will tear you apart..
i think the saest thing here is a little bit o blackmail <ahem....>
if you have something that they really dont want aqnyone to know about..
still... im open to suggestions...
phoenix
56/132: well....
Name: Ravage #19
Date: Tue Jan 23 13:23:30 1990
seems to me that the best way to embarass them would be to obtain and publish
the internal files. many of these contain memoranca and notes on activities
that were not used in court, because of various legal questions, and were
only used for background. i understand that there is a group of police
enforcement officials who have a unofficial and under the table groupl
who share information on a lot of folks. houston and la were kicked out
a couple of years ago because officers would release the info into the
public domain.
as to the copyright info. try to get it through the library or the
field service engineer. if it can be gotten that way it cant be called
proprietary and my experience w/ field engineers is that they will get
just about everything you could ask for if you can give them specifics
about what you want.
57/132: Savage
Name: Signal Type #69
Date: Tue Jan 23 14:44:33 1990
Well I agree with the above posts regarding the proper way with to deal with
authorities. You should not use any violent means to take down or destroy
systems. That will only make them more than not to come down on you harder.
By the way did anyone hear the news on that guy who got busted
for breaking into a government mainframe? I didn't get all the details but
it seemed he is facing up to $200,000 in f fines and a possible five year
prison term. A pretty stiff price.
$$$Signal Type$$$
.s
58/132: morris
Name: The Mentor #1
Date: Tue Jan 23 21:57:27 1990
Robert Morris was found guilty. If he's sentenced to do time, it'll be a
<sigh>
Mentor
59/132: BLackmail?
Name: Erik Bloodaxe #2
Date: Tue Jan 23 22:51:58 1990
Geez...I'd like to think myself above things like that...
In anycase, not everyone has GOOD sensitive information...(not all of us who
ARE in this country have the balls to dig where that type of crap is...god I
want to move to Australia!)
Maybe they'll kick me out of the country! Right...I'm not that important,
although I would like to think that I am...hehe
hell, maybe it IS time to start doing all the terrible things I always had the
capabilities to do on the internet...need to get some "Insurance"
maybe...who knows...
->ME
60/132: well
Name: Phoenix #17
Date: Wed Jan 24 01:29:23 1990
like i said... im open to better ideas.. coz i we do have sensitive ino...
then no matter what we do with it... it will be termed blackmail..
Phoenix4
<and once you have publicised it.. youve played your cards.. andthen theyll
mess you up real bad..>
61/132: Morris Convicted
Name: Phiber Cut #34
Date: Wed Jan 24 04:43:24 1990
If RTM get's jail time we should all be suprised. What he did was morrally
and ethically wrong, and he fucked upt and will now have to pay the piper.
However, hej is a very bright person and should not be put in a jail cell
with a bunch of hardended ass f**king criminals!
Hopefully he'll get some sort of community service and a fine, and this will
be enough to kkeep him from fucking up the network in the future.
62/132: i understand...
Name: Ravage #19
Date: Wed Jan 24 14:34:03 1990
that the prosecution had a hard time showing malitous (sp!) intent. does
anyone know if that is true? if it is true then i doubt he will get any
time. probably a fine, community service, a probated time. what is the
latest on the ccc guys? have they taken them out and shot them yet?
in my previous post i was refering to the publication, through tv,
radio,and paper, of sensitive information held by organizations. it
would not have to be identified as to sender. therer are plenty of
underground, small town, press services (hey how about the gossip
rags?) that would be ideal to send that kind of stuff to. not only
that but what about the up wire? you could put it in que and it
would go all over.
63/132: gossip rags
Name: Grey Owl #10
Date: Wed Jan 24 19:08:07 1990
If it went to the Enquirer they would just claim that Enquirer made it all up.
If the information got to NBC's evening news <from an anonymous source, of
course> they might just take it and run. It would make a good news story if
what Phoenix says is true.
Maybe blackmail or internet death threats are the answer. "I'll take down
Inet unless bloodaxe goes free!"
grey owl
64/132: 2 new subs, & vote!
Name: The Mentor #1
Date: Wed Jan 24 19:51:24 1990
We've got two new subs online - We The People (now #2) and Internet (#8).
Also, please take the time to vote...
Mentor
65/132: oh
Name: Dtmf #27
Date: Thu Jan 25 02:58:38 1990
RE: phrack...
Just how much of a problem will it be if an account is on the Phrack mailing
list for bitnet?? Uh oh....
66/132: and...
Name: Dark Sun #11
Date: Thu Jan 25 15:26:36 1990
would those accounts be gone already? I had 2 accounts that i had contacted &
conversed with TK, and they are both bad (coincedence?)
DS
67/132: things...
Name: Erik Bloodaxe #2
Date: Thu Jan 25 16:45:23 1990
Don't worry about your name being on the Phrack mailing list...a lot of
peoples were...
I am going to try to get the mailing list myself, so we can keep people
flooded with files and shit like that...not Phrack, but something...
Randy & Craig shouldn't bitch, as hell, the feds already have it...why
shouldn't a friend? If they still say no, I'll make my own list and start
from there...
->ME
68/132: Hey ...
Name: Sicilumm Thorne #28
Date: Thu Jan 25 20:28:57 1990
re: phrack
Erik, what's wrong with the continual releasal of Phrack. Why not go
ahead and release Phrack 31 (32?). I mean seriously, what more could piss of
the feds (or whoever).
I mean it. Seriously, if we just start some new newsletter, its not going
to be any different, but by their viewpoint, they'd have destroyed a
publication that is dated as far back as 1986 or 1985. If we continue to
release Phrack's, and I mean put some HARRY shit in there, we would show them
that they cannot just pull us down. We're unified, we're strong, and we're
willing to stand up to them.
[Of course, I don't mean personally. grin.]
"They tell me it will hurt me on down the line,
but I don't care. I'm young and stupid."
Sic.
69/132: phracks
Name: Dark Sun #11
Date: Thu Jan 25 22:02:20 1990
Why not come up an almost untraceable method of distributing phracks thru
internet? (IE many distributions originating from nowwhere via smtp to many
people at a time)
DS
(we could use the existing phrack mailing list if you can get it,Erik)
70/132: Thats damn easy
Name: Guc #97
Date: Fri Jan 26 06:04:31 1990
just an estimate, how many people were on the mailing list?
heh, we could even send them out using richard stallmans account!
.s
71/132: heh
Name: The Mentor #1
Date: Fri Jan 26 10:06:26 1990
I believe there were about 500 people on the list...
Mentor
72/132: yea...
Name: Dark Sun #11
Date: Fri Jan 26 16:23:40 1990
And, I was just wondering, because my account went bad just 2 days
(approximately) after I had just finished discussion with TK about setting up
an FTP site for the phracks... I know I was on it because I got some letter
(to 2 of my accounts, which both are dead now) talking about a pirate-oriented
newsletter organized like phrack... I just thought it is very much a
possibility that that is the reason it got deleted.
DS
73/132: ya know...
Name: Erik Bloodaxe #2
Date: Fri Jan 26 17:15:32 1990
Phrack is Randy & Craigs baby...I would have to respect their wishes about
using the name...I doubt they would want me to use it...they'd probably let
Forest Ranger run it into the ground before they'd let me, but
that's the way they probably think...
I'd rather start something a little better written, better formatted, with
better articles under a different name.
->ME
74/132: that
Name: Grey Owl #10
Date: Fri Jan 26 22:25:07 1990
sounds like something I would have done. Most of the articles were well
written, I think but there were a few things that I would have changed.
grey owl
75/132: Phrack etc....
Name: Pain Hertz #84
Date: Sat Jan 27 01:43:38 1990
Okay, I haven't been on for a few days and I just went through a slew of
messages. First off, I happen to know a guy who is security at TK and KL's
school (TK's ex-school). This guy, he says that he knows nothing about the
mess and seemed to think it was a big story. I don't know if he is just
blowing hot air up my ass or what...probably. He said he would keep his ears
open for me, probably back stab, we shall see.
I agree with all of those that say Phrack (or another newsletter/magazine)
should continue. Those close to KL and TK should talk to them about a name.
I had written an article for Phrack 31, which I am willing to submit for this
new venture if it gets off the ground.
About distribution, I know of a few anonymous FTP sites that will let you PUT
stuff. Usually folks use these to swap .GIF files, but they could be used for
whatever. Perhaps a 'girlie' magzine could be created. PUT the newsletter, a
text file, as a name like FATBABE.GIF. Those that GET it either know what it
is or think their .GIF viewer is fried. Anyone who GETs it not knowing what
it is and finds out, so what? It doesn't have to have anyones addresses in
it. Whats your opinion friend?
About gettting even/back, blackmail etc. Being destructive is not good for
previously posted reasons. How about us collectively writing a story and
sending it to the AP or something? We, as a team, can get the story better
than any reporter. I seriously thought about calling the damn SS saying i'm
Dan Rather or something and asking what the deal with Randy and Craig is.
What the FEDS did with this pseudo-bust is only gain information about who is
- who* and where etc. This is the easiest information for them to get
anyways. Often thats because of p/h -ers narcing on each other (read the
PHRACK circle trilogy if you haven't). If the SS knew that Joe Hacker did
something and they found out that Joe Hacker's internet address is such in
such. They know that some one calling themself (lves?) Joe Hacker used that
account. Whether it was the real owner or not remains to be proved. The
burden of proof is on them. Still, if handles didn't matter, no one would use
them anyways.
well shit. this is getting long....
Subscribe to VIRUS-L at LEHIIBM1, I have the director of CERT's net address:
its rdp@sei.cmu.(???).edu (Richard Pethia).
-PHz
76/132: screw it..
Name: Phoenix #17
Date: Sat Jan 27 07:26:42 1990
distribution is damn damn easy...
smtp every where for one..
and a shit load of other things will work most merrily..
Phoenix
77/132: Why?
Name: The Parmaster #21
Date: Sat Jan 27 09:38:59 1990
Why just "send it" to AP
Just take over the damn system and release it.
that way you KNOW it';s done..
and it's sent out almost immediately.
Later,
Par
Jason
78/132: Getting scarry....
Name: Johnny Hicap #45
Date: Sat Jan 27 21:17:01 1990
It is getting scarry as hell now a days. I know of three hackers that got
busted in the last couple of days, ther handles will not be released by me but
those who know them are probably shocked. I can't beleive?? it.
Situation:
Someone gets busted for prgming switches, hacking LMOS, COSMOS, and all the
??other phone company comp. He calls me from his line the next day to tell
me..(Direct)
Question:
Do you think they are now monortoring me? Afer all he did call me direct.
They probably are...
79/132: UT micom/network annex
Name: Dark Sun #11
Date: Sat Jan 27 22:03:45 1990
Well, it looks like everyones pushed the UT administrators to disabling all
links from off-campus... We can no longer telnet to off-campus sytems thru
network... For awhile you could use UTAUS, but know logins there are disabled
because they are turning off the cabality to telnet off-campus. I was on EMX
just a few minutes ago telnet'ing to frosted-flakes.ai.mit.edu when I was
kicked off, and I keep getting kicked off (same thing that happens at the
annex when you tryo telnet off-campus). All those people shouldnt have used
the systems to hack so much and (mainly this) play GAMES like TINYMUD! The UT
administrators were getting tired of all the annex ports always being full.
DS
plus, not to mention, all the security problems that they have had with the
Suns.)
Maybe it has to do with people changing passwords on "act" accounts...... You
know who you are !!!!
80/132: people who abuse
Name: Grey Owl #10
Date: Sat Jan 27 23:49:09 1990
Look: I have one thing to say to people who screw up/abuse/ruin systems for
other hackers...you suck.
There is no point in screwing something, otherwise a perfectly good system,
for everyone else. If you get your kicks from trashing systems for the hell
of it, your shouldn't call yourself a hacker. Maybe asshole would be a good
term for these people.
grey owl
81/132: re: ppl who abuse...
Name: Pain Hertz #84
Date: Sun Jan 28 02:20:45 1990
The true hacker works hard to make their presence unknown. Screwing up
accounts or a system is easy. nuff said -PHz
82/132: Things...
Name: Erik Bloodaxe #2
Date: Sun Jan 28 13:31:38 1990
First off...if the "BUST" you are referrong to is Mark & Joey and some other
Queens punk, I think that is bullshit. A friend of mine talked to Mark a few
days ago (after the reported bust) and Mark said nothing about it.
Programming switches, hacking LMOS...busted...well, we'll see. If it is true,
hell, chalk up another LOD bust and we'll scratch Phiber Optik off the active
list...
Mark? You been busted boy?
Another thing...Dark Sun: you little thug...I didn't change the pw on your
fucking act account, so stop your incessant whining about it...accounts on the
disney suns are terribly easy to run through a dictionary hacker, so do that
if you so desparately want back on them...there is NOTHING there...and if a
CHAT thing ends up on there and I find it, I'll be pissed off...run that off
of ugwa, or whatever.
Why do you want on there anyway? Why do you have to make such a big deal with
the fucking public access unixes? THERE IS NOTHING ON THOSE SYSTEMS!!! I
will not lose my account due to someone hacking off of the disney suns...ok?
jesus...is that asking too fucking much?
->ME
83/132: hmm
Name: Phoenix #17
Date: Sun Jan 28 14:08:56 1990
i changed the password on that act account..
got root off it too..
umm.. ut still lets you call off campus if you use the right systems...
by the way... what is that instructional vax cluster used for ?
phoenix
84/132: yeah...
Name: Guc #97
Date: Sun Jan 28 16:49:33 1990
RE: hmm
you can get off campus IF you use a password on a system and do it from there.
(ie: cs, if, emx, etc...) But without a password there is noway to get off
campus.
i asked a friend of mine at the computation center about this and he said it
was done mainly because people were hack/trashing systems on the internet, and
even more so a bunch of 12 year olds somehow found out about tinymud.
one afternoon i saw 7 annex ports logged into tinymud from portal1.
gah
.s
85/132: phoenix
Name: Dark Sun #11
Date: Sun Jan 28 17:24:04 1990
I was talking about phoenix... He said he was going to change it back but then
decided to keep it for himself... And I know how easy it is to run thru a
dictionary hacker (check act's home dir...) Erik didnt even know the passwd
(Idont think)
DS
86/132: !@#)(*
Name: Phiber Cut #34
Date: Sun Jan 28 22:54:40 1990
John M??? T%hat wouldn't be as in "Cable Pair" would it?
87/132: no..
Name: Phoenix #17
Date: Mon Jan 29 02:48:09 1990
i didnt decide to keep it or mysel...
88/132: john m
Name: Dark Sun #11
Date: Mon Jan 29 17:59:09 1990
Whos Cable Pair?
89/132: cable pair...
Name: Erik Bloodaxe #2
Date: Mon Jan 29 18:56:56 1990
John Maxfield aka Cable Pair...
Notorious detroit fuckhead hacker buster & child molester.
hehe
->ME
90/132: Cat-wares
Name: The Jabberwocky #100
Date: Tue Jan 30 00:15:01 1990
Does anyone out there have anything to utilize the enormous possibilities of
the AppleCat modem? I used to have a few nifties, but that was a while back
and over the past half-decade that I have been out of circulation(got bored) I
have lost all wares except the piece-o-shit Com-ware II. This kitten will
sing any song imaginable of pretty mf tones and even had a voice simulator
which makes for quite a bit of fun. Anything which someone could u/l would be
greatly appreciated.
-The Jabberwocky
91/132: hello
Name: Corrupt #114
Date: Tue Jan 30 08:11:40 1990
Damn!..finally got up on here as shit is tight....be looking forward 2
shooting the gift with ya'll
shit..lemme x-late...wassup>?
the 2600 meeting is this friday here in New york....I'm sure some interesting
things will be gleeaned therefrom..if I make it..
Be Careful Everyone...(Ithats a sentimental reitiration..shit..(sp)))
Corrupt[8lgm]
92/132: ammy hack warez...
Name: Ravage #19
Date: Tue Jan 30 10:53:04 1990
what are the names for some of the hack utilities for an ammy?
thx ahead of time.
ravage
rip
the
system
93/132: ...
Name: Tak/Scan #44
Date: Tue Jan 30 15:57:47 1990
I run a AmyHack Discussion Center. I think those files you are looking for are
on there.
The 4th Dimension! 619-745-1xxx. Login PW-SPECTRUM. Newuser PW-Gunship.
94/132: tak/scan
Name: Ravage #19
Date: Tue Jan 30 21:38:19 1990
thanks, expect to get a call from my direction in the next few days.
95/132: tak
Name: The Mentor #1
Date: Tue Jan 30 22:48:56 1990
Could you u/l the amy hacking stuff to the Commodore directory? Thanks!
me
96/132: Thanks a lot people
Name: The Inspectre #63
Date: Tue Jan 30 23:03:17 1990
Now I can't even get onto the network from UT Micom. I have programs due for
classes I have to work on on those computers. Now I've gotta go down to the
stupid terminal room and wait around about 6 hrs for some goob to get off the
sun terminals.
97/132: umm..
Name: Phoenix #17
Date: Wed Jan 31 04:01:56 1990
sorry.. but i wasnt the one playing ANY games..
98/132: ..
Name: Grey Owl #10
Date: Wed Jan 31 14:35:05 1990
Yeah. Who the fuck was playing all these port 42something games on chaos
besides Dark Sun? I was going to do some FTPing and hacking and I noticed
that 5 or 6 people were logged on to the same port on chaos...
Come on people! This is retarted.
grey owl
99/132: 2600 and the Internet Source Code
Name: Dark Overlord #94
Date: Thu Feb 01 04:01:21 1990
I will like to state that 2600's selling of the internet Worm source code
was done without my knowage and I am not getting (or want) a cent. I think
this is very slimy of them.
-Dark
100/132: well..
Name: Phoenix #17
Date: Thu Feb 01 10:06:58 1990
i did lots of hacking at ut... so i played a major part in its downfall in
that area..
but never ever once did i play a single game off there.. <didnt even know
there were any..!>
still.. i take FULL responsibility for stufing up the IV# vax cluster..
grr... did a login patch.. and set off an audit alarm..
that wasnt problem..
problem was that then i rushed.. and when i left, forgot to reset privs on
loginout, so everyone could log back in, but no-one could log out <unless
super user> moral: never ever rush a patch!!
phoenix
<disgruntled>
101/132: port 42
Name: Dark Sun #11
Date: Thu Feb 01 14:19:42 1990
Whats that??? If you mean 4201, I havent even looked at it for several
weeks...
DS
102/132: ...
Name: Tak/Scan #44
Date: Thu Feb 01 16:06:43 1990
Yeah Mentor and others I will upload some a my hacking shit. not to much
they suck anyways./ but I will still dot it....
The 4th Dimension! 619-745-1xxx. Login PW-SPECTRUM. Newuser PW-Gunship.
Tak/Scan
103/132: FSA
Name: Corrupt #114
Date: Fri Feb 02 05:51:25 1990
yo..you know how i get..lemme just say this ya'll
**** ****
* **** *
* *
* *
* *
* *
** *** *
* ** *
* *
* *
* *
Africa * *
* *
* *
* *
***
Free South Africa
- - -
$
Nelson Mandella ..let the guy goalready!
:-) 2600 meeting today..I'm gonna have some fun..we're gonna shoot homeMovies!!
(thats sorrta a joke,...dunno if u get it.)
104/132: 4201
Name: Grey Owl #10
Date: Fri Feb 02 21:54:10 1990
Unless you're calling through and outdial, it's not a good idea to do anything
other than hack. This is only my opinion.
grey owl
105/132: what?!
Name: Dark Sun #11
Date: Fri Feb 02 23:09:50 1990
Its a helluva lot safer to play a game than hack!
DS
106/132: uh...
Name: Guc #97
Date: Sat Feb 03 06:29:48 1990
could someone please give a quick tutorial on how to make use of the info in
xfer section 12?
.s
107/132: What is Phrack?
Name: Warf #81
Date: Sat Feb 03 18:20:25 1990
Is it like some BBS Mag.?
<=[Warf]=>
108/132: things
Name: Grey Owl #10
Date: Sat Feb 03 18:32:10 1990
I'm not talking about safety. When you're on the system and things are
getting logged, it's not worthwhile to be playing games. You can do that
legally. If you have to spend time under the log, it's best to make it
productive.
Phrack is a magazine that has been the longest standing electronically
distributed magazine available. The articles are always informative and
usually good!
grey owl
109/132: UT Micom
Name: Daneel Olivaw #9
Date: Sat Feb 03 19:12:17 1990
I am pissed... people are abusing the hell out of it just to play games. Dark
Sun is one of the worst... For some reason he finds it necessary to play
whatever he plays and do it online at UT. This is getting everyone in
trouble, and I know Erik ain't exactly ecstatic (sp?) about some FTP getting
shut down.
Daneel Olivaw
110/132: hey
Name: Corrupt #114
Date: Sat Feb 03 20:57:24 1990
You I went to the 2600 meeting..sanme ole stuff..running thru a AT&T building
with flare guns..ranking and dissing..drinking and picking up women(men?) had
sum fun..got rowdy.and ofcourse..a little talkabout this and that broing
stuff..computers..
the Resteraunt with the nude girls was cool..the best part was On the Subway
buggin out...singing..nmaybeI7ll sing here one day..dunno :-))
I also Managed To write MORE vms software..and got a BBS site together
on the network..anyone Interested in
checking it out (it's in new Zealand) Mail me here or On Altos [tchh] as vaxer
or on QSD as box ...the info for the board is on Altos[tchh]Bullet as well
but ideas/comments/complaints/a nd bugs can be mailed 2 me here as well.
It's Semi-private? naw..I think thats the Last work I'll do..when i Complete
the chatV4.0 and see it online I'll retire my keyboard for a bit .
have A Good one/Be Safe
network Ninjitsu GaiDan[8lgm]Corrupted
111/132: ...
Name: Phiber Cut #34
Date: Sat Feb 03 22:02:43 1990
AM-ComputerCrimes 02-02 0151
AM-Computer Crimes,140<
Criminals Have Discovered Computers<
WASHINGTON (AP) _ Criminals have discovered the value of
computers and are using them ``in crimes of unprecedented economic
cost,'' the National Instiute of Justice said Friday.
The institute cited a recent accounting firm study that
estimated $3 billion to $5 billion in thefts each year by high-tech
criminals.
``Increasingly, computers are being found in the illegal
activities of drug networks,'' said Attorney General Dick
Thornburgh. ``Drug traffickers use them to communicate with each
other, record their transactions and transfer and launder money.''
The crimes include electronic funds transfer fraud and theft of
commercial inventories.
The report mentioned a former insurance firm employee in Fort
Worth, Texas, who used a program to delete more than 160,000
records from the company's computer and also a prostitution ring
that had a data base of more than 80,000 clients, their credit card
numbers and sexual preferences.
AP-NR-02-02-90 1516EST<
112/132: Hey,
Name: Black Death #95
Date: Sun Feb 04 00:16:37 1990
Call the Unholy temple
408-249-5xxx
New user password is "the Temple"
have phun
113/132: ...
Name: Tak/Scan #44
Date: Sun Feb 04 03:26:28 1990
Killer. I am going to set up something via - then nwetworks really soon i will
keep you posted..
in the meantime-
The 4th Dimension! 619-745-1xxx. Login PW-SPECTRUM. Newuser PW-Gunship.
114/132: Network BBSs
Name: Pain Hertz #84
Date: Sun Feb 04 11:43:35 1990
Well, I have been interested in running a BBS on VM for sometime. I have the
code for such and am quite capable of writing it anyway. Anyone else a REXX
phreak? Anyways, it has been quite difficult to find a safe VM account on
Bitnet (or any net running RSCS/JNET/JES2 and its compatibles). The
requirements are that it is TELNET-able, has at least 2 cylinders of disk
space, is able to run in DSC indefinately, and that the admins don't care
about RSCS traffic. If you have such an account and are interested in running
a BBS/Chat/Fileserver plz get im touch with me.
On another note, CERT.SEI.CMU.EDU does have a receive directory (FTP) so feel
free to leave you interesting notes for others there.
-PHz
115/132: games
Name: Dark Sun #11
Date: Sun Feb 04 17:47:49 1990
Tell me some evidence to support your theory that I am one of the worst game
players at UT! very interesting that you think that...
DS
116/132: AIDS VIrus
Name: Phiber Cut #34
Date: Sun Feb 04 20:11:46 1990
PM-Computer-Extortion 02-02 0333
PM-Computer-Extortion,0344<
Man Arrested in Alleged Computer Extortion<
CLEVELAND (AP) _ A zoologist accused of unleasing a computer
virus that crippled computers in England and other countries two
months ago was arrested on a fugitive warrant in Ohio.
Joseph W. Popp was arrested Thursday and is being held on a
federal fugitive warrant. He is charged in warrants issued by
Scotland Yard in London with blackmail and extortion.
During an initial court appearance here today, Popp, 39, told
U.S. Magistrate Joseph W. Bartunek that he is under a
psychiatrist's care and must take drugs for a mental condition.
Bartunek said he would schedule another hearing after two
psychiatrists evaluate Popp to see whether he is competent to face
further proceedings. A date was not set.
Popp, a zoologist who worked for the World Health Organization,
is from Willowick, about 10 miles east of Cleveland, said defense
attorney John P. Kilroy. It was not immediately clear whether Popp
is still affiliated with the organization.
The warrant alleges Popp distributed about 20,000
computer-crippling disks from London around Dec. 11. The disks were
labeled ``AIDS Information Introductory Diskette.''
The U.S. attorney's office in Cleveland said the disks had
information on acquired immune deficiency syndrome for use by
hospitals, researchers and others.
But authorities said the disks, when inserted into personal
computers by unsuspecting recipients, halted accessibility to any
other information in the computer.
At the end of the program, the disk asked the computer user for
a leasing fee of up to $378, then printed an invoice with a Panama
address where money was to be sent, federal prosecutors said.
Computer owners were told that the rogue program they had inserted
in their computer would stop the machine from functioning unless
the money was paid.
At the time the diskette began causing problems in early
December, authorities in London said it had been received by users
in Norway, Sweden and Denmark as well as Britain. Scotland yard
said at least 10 British computers were affected.
AP-NR-02-02-90 1328EST<
117/132: Dark Sun's gaming evidence
Name: Grey Owl #10
Date: Sun Feb 04 21:14:41 1990
Whenever I did a 'who' from the annex it would show that you were playing
games. I know it was you because I would log on to a unix and you would
imediately notice that I was there. Also, whenever I went to 4201 (that one
time) to see what was up, you were showing me around.
grey owl
118/132: arg...
Name: Erik Bloodaxe #2
Date: Mon Feb 05 00:30:58 1990
Arg...ok, so Dark Sun is the TinyMUD gaming thug...or at least one of them...
what a drag. I've half a mind to wipe out the damn program altogether.
Download the source and stick it elsewhere so you and your buds can play it
and not bother actual college activities, so people like inspectre can do
their fucking homework. Hell, if it's that important for you mindless
pre-pubescent twits to play fucking games call the ACT system and play their
silly mud-like game, or call fucking MUD in england on the x-25 networks!!!
if you need the nua for mud, or the number to ACT here in austin, just ask!
But from now on fucking think about what the hell you are doing! Network only
has so many queues!
->ME
119/132: NUA's
Name: Captain Crook #36
Date: Mon Feb 05 22:10:25 1990
What are the NUA's for MUD and ACT??
120/132: what the hell?
Name: Dark Sun #11
Date: Tue Feb 06 00:11:22 1990
are you talking about (is this some kinda 'revenge'?? When did I show you
aroumd and what account was I using? I only have 1 account on there. And since
I had my emx accounts (2 months) I havent even USED annex... I can get my 37
telnet sessions and my 3 outdial sessions going on at the same time, why use
annex?
DS
121/132: Watts happening to the hacking community
Name: Cassius Cray #135
Date: Tue Feb 06 06:11:39 1990
Shit guys... a year and a half ago we were on top of the fucking world... now
it is general mayhem and feds on every corner... I got into hacking the
beginning of last year then I read in the paper about some guys at Ga Tech got
fucked so I decided to take a vacation and read.... I heard about good guys up
in New York, Detriot, and Chicago getting there shit seized by the feds...
I don't know what ever happen to the guys at Ga Tech but the other guys are
definately FUCKED.... what a turn around.... I am beginning to believe the
Feds are starting to take this shit seriously!! Oh well... guess we could all
go backing to pirating software... Nah!
Cassius Cray
122/132: What happens is...
Name: Daneel Olivaw #9
Date: Tue Feb 06 17:33:07 1990
people like Dark Sun who have "37 telnet and 3 oudial" sessions going at once.
This seems to attract attention... I dunno why... gee, doesn't every CS major
do that.. Shit, are you so stupid that you don't realize what attracts
attention. They notice if there are 15 people (of 16) logged in under the
same name at the same time.
Daneel Olivaw
123/132: another round of busts....
Name: Gordon Meyer #65
Date: Tue Feb 06 20:27:33 1990
Today the feds announced, in a Chicago Press conference, that indictments have
been brought against The Prophet and Knight Lightning for theft and other
related "computer" crimes. (I didn't catch the rest of the charges). See my
message in the Phrack section for more info.
I've got the VCR set to record the news tonight so maybe I can cull some more
info, but no doubt it will be all over the papers tomorrow.
Holy shit batman!
CIAO!
-=->G<-=-
124/132: DNR's
Name: Vet-San #29
Date: Tue Feb 06 21:21:59 1990
I'm in a bit of a fix here... I have reason to believe that there may be a
DNR on my line. Can someone tell me how I can find out for sure? Do I just
walk up to the local courthouse and demand to know, fiegning jingoistic
paranoia? Any assistance will be appriciated... thanx
125/132: heh
Name: The Mentor #1
Date: Tue Feb 06 22:41:06 1990
Yeah, that might work. Or try the local switch. Generally, though, I think
you're just screwed...
Mentor
126/132: A World of Your Own
Name: The Prophet #104
Date: Tue Feb 06 23:55:15 1990
Imagine that you're deaf, dumb, blind, and paralyzed from the neck down and
totally unable to experience or communicate with the outside world. How long
could you retain your sanity? How many of you would choose to die instead?
How many of you think you could muster the willpower to create your own little
mental world to live in for the rest of your life, and how long do you think
the hospital would wait before putting you out of your misery?
-The Prophet
127/132: DNRs
Name: Nemesis #122
Date: Wed Feb 07 00:55:49 1990
Well, you can check for DNRs (and all the info they have recorded) on
your local neighbprhood LMOS system...Other than that.. I would suggest a
little SEing with your local fone co.. Just keep trying untill you find
someone who doesnt know whats going on, and have them check it for you.. The
basic idea is to dial repair and work your way in farther from there...how far
you will have to go depends on how gulible the person you talk to is...But
asside from that, since a DNR now a days (at least on my fone--I duno what
typs of SS you are on), is all digital, and totaly undetectable by any simple
means.
128/132: Body
Name: Sventek #137
Date: Wed Feb 07 02:13:46 1990
Once i loose my senses and Motion i am out of the picture. Other words no
mental visons of anything. That would bring me in line of INsanity and
Psychotic state of being.
sl8r
Sventek
129/132: what next
Name: Sector #123
Date: Wed Feb 07 13:40:43 1990
PM-911Hackers 02-07 0449
PM-911 Hackers,0462<
^Two Charged with Breaking into Nine-State 911 Emergency Phone
Network<
^By PAUL A. DRISCOLL=
^Associated Press Writer=
CHICAGO (AP) _ A computer hacker broke into the 911 emergency
telephone network covering nine states in the South and another
intruder passed on the access data to other hackers, authorities
said.
Robert J. ``The Prophet'' Riggs, 20, of Decatur, Ga., and Craig
M. ``Knight Lightning'' Neidorf, 19, of Chesterfield, Mo., were
indicted Tuesday by a federal grand jury and accused of computer
crimes, said acting U.S. Attorney Ira H. Raphaelson.
He said Riggs was a member of the so-called Legion of Doom
hackers group, whose members are involved in numerous illegal
activities.
Riggs and two other alleged members also were indicted Tuesday
in Atlanta and charged in other computer break-ins.
The government would not say if any emergency calls were
disrupted or whether other damage was done during the tampering.
``These were not teen-agers playing games,'' Raphaelson said.
``They are thieves, they're reckless and they're dangerous.''
In the Chicago case, Riggs is accused of entering Atlanta-based
Bell South's 911 system with a computer, stealing a copy of the
program that controls the system and publishing this data on a
hackers' computer bulletin board in Lockport.
Neidorf is accused of transferring the data to his computer at
the University of Missouri in Columbia, where he allegedly edited
it for a computer hacker publication known as PHRACK.
There was no immediate comment from either defendant. Directory
information had no listing for Riggs, and there was a recorded
message at the Neidorf residence. Neidorf's attorney, Art Margulis,
said he had not seen the indictment so he could not comment.
Raphaelson said industry specialists estimate that $3 billion to
$5 billion is lost yearly to computer fraud. He said this is the
fourth hacker case brought by the federal government in the past
year.
Bell South's 911 controls emergency calls to municipal police,
fire, ambulance and emergency services in Alabama, Mississippi,
Georgia, Tennessee, Kentucky, Louisiana, North Carolina, South
Carolina and Florida.
``People who invade our telecommunications and related computer
systems for profit or personal amusement create immediate and
serious consequences for the public at large,'' said Raphaelson.
He said the 911 data was valued at nearly $80,000, but would not
say how a hacker could profit by stealing this data, other than by
selling the information to others.
Riggs, if convicted on all charges, could be sentenced to 32
years in prison and fined $222,000. Neidorf could be sentenced to
31 years and fined $122,000 on conviction.
Riggs and Neidorf are charged with interstate transportation of
stolen property, wire fraud and violations of the Computer Fraud
and Abuse Act of 1986.
AP-NR-02-07-90 0549EST<
130/132: Utter Bullshit
Name: The Prophet #104
Date: Wed Feb 07 17:26:26 1990
Can you believe the above bullshit?
Dearly Beloved, Gone but Not Forgotten:
Phiber Optik
Thomas Covenant
Supernigger (gone, unloved, and forgotten)
At the arraignment today, one of the Secret Service agents told me, "Everybody
is narcing on everybody." Something D.J. said once: keep your friends close,
and your enemies closer.
-TP
131/132: fuck
Name: The Mentor #1
Date: Wed Feb 07 18:44:45 1990
Rob, I cannot believe that bullshit. Good luck...
Sigh. People, I don't know how much longer I'm going to keep this up. I mean,
they seem to be going after people indiscriminately. Nailing Craig for
publishing something in Phrack? That's bullshit. Utter and complete. Even
assuming that the info was copyrighted or stolen (which I don't believe), how
the *FUCK* was he supposed to know it?
I don't even know what issue of Phrack it's in. Am I liable for it because
it's up in my file section? If so, what about the thousands of people around
the world that have copies of it.
lame lame lame
mentor, the paranoid.
132/132: 1000 calls!
Name: The Mentor #1
Date: Wed Feb 07 18:55:04 1990
Welp, we managed to get over 1000 calls in less than 1 month! Good job, guys!
(Caller #1000 was The Inspectre...)
The board went up Jan. 13!
me
_____________________________________________________________________________
*** {"We The People" Sub-Board} ***
< Q-scan We The People... 2 - 26 msgs >
1/26: This sub!
> Permanent Message
Name: The Mentor #1
Date: Wed Jan 24 19:50:03 1990
This sub is for the discussion of today's society, politics, economics, etc.
All views are welcome...
Mentor
2/26: Libertarianism
Name: The Mentor #1
Date: Wed Jan 24 20:10:11 1990
Y'know, the more I deal with the government, the more seriously I'm inclined
to take Libertarianism. Has anyone else here read _Atlas Shrugged_? Ok, how
about _Alongside Night_? J. Neil Schulman is now making _Alongside Night_
available on floppy. I'm going to get a copy, and see if he'll license (or
whatever) it to me to put up in the Transfer section.
Mentor
3/26: io
Name: Dtmf #27
Date: Thu Jan 25 03:18:56 1990
I'm sure most of you have probably heard or given this speech(?) at some time
or another.
It seems to me that many of the hackers problems today stem form
disunity. Most hackers tend to be loners, and very intelligent compared to
the rest of the "A car a house 2.2 kids and a dog" society. Because of this,
we tend to do things alone, or in very small groups. If you think about it,
and I mean REALLY think, not just in passing thought, if the hackers had a
bit more unity we could accomplish quite a lot more. At the current rate, all
(well, most) of todays hackers will have quit or been busted within 10 years.
The newer generations are faced with more and more problems in learning how to
hack, so the population is rapidly decreasing. What if we were able to put
away all the petty bullshit and bickering and really go at this? The more
experienced ones of us could teach the new people that show potential, and
therefore continiue the society. A unification of the computer underground
would more than triple the effectiveness, and allow us to explore more and
learn more than if we continiue to go our own way.
Just a thought, and not to coherent after 40 hrs no sleep, but I think you
will get the idea here...
Oh, and one more thing...Its obvious that every day more and more things
become computerized...The more control we have over computers, the more
comtrol we will have over our lives...After all, Big Brudder isn't my favorite
guy....
DTMF
4/26: well...
Name: Phelix The Hack #89
Date: Thu Jan 25 12:21:00 1990
Ayn Rand does have a well structured viewpoint that is well worth
reading/listening to...I also suggest "The Fountainhead".
One addition reason for the individualtiy of most hackers...and in my mind he
the most important one is as follows:
The fewer number of people that are involved in a certain
orginization/society/group..etc...greatly edcreases the likelihood of an
information breech. I am not just talking about "group secrets" (although it
certainly applies), but rather am appling this TRUTH to the entire H/P
community. I usually stand by a few general rules...one of which is "If I do
not know you I do not trust you"...with the strong option for "I know you
THERFORE I do not trust you".
Yeah it would be just peachy if the entire "underground community" could bind
together into one big close knit LOYAL happily Cleaver-esque family.
Realistically though..this will not happen...nor do I think that I want it to.
I for one HAPPEN TO LIKE a certain amount of indivduality in my life.
pth
5/26: sex!
Name: Erik Bloodaxe #2
Date: Thu Jan 25 16:57:35 1990
hm...got some attention.
I, being a MAJOR Libertarian in my beliefs, although not quite as radical
publicly as I'd like to have the nerve to be, relate strongly to the needs
people have when dealing with a totally overbearing and somewhat outdated
method of government.
Unfortunately, being in america, we no longer have minds in power capable of
reaching decisions that would mold this country into something worth dieing
for. People like that are now held back by the good-ol'-boy system of
government. It's not what you know, but who you know, and how much money you
have.
I am kind of radical in my ideas about what I'd do with an ounce of power, but
a lot of the things I feel strongly about are shared by a great number of
mainly conservative types. Like cutting defense of Japan, nationalizing the
health industry, legalizing drugs, starting a whole wide-range of social
programs for everyone from the elderly to the homeless...etc...
But, again, this IS America, where the attitude is to kick back and let things
happen. We are no longer the new kid with the zest for life...we are the
tired old redneck who likes to sit at the gas station drinking a beer and
watching kids play while we talk to others like us about the good old days.
Bullshit.
But, until people like myself who are disgusted with this situation come into
a position (or age) to do something about it, or at least let our voices be
heard, the disgusting current state of affiars will continue.
I just hope that by the time that happens, we all won't have fallen prey to
the unbelievable degree of sloth that our leaders have fallen victim to.
->ME
6/26: well, if i said...
Name: The Urvile #90
Date: Thu Jan 25 18:11:56 1990
if i really said what i felt, i'd probably go to jail anyway,
so hey: kill the stupid people & start over. ayn rand with her little essay
on how science and a totalitarian government is pretty fucked up. the only
problem with that is that science teaches one to question, while any 'hard'
government will attempt to suppres questioning. now all we have to do is wait
for a government to come along that really does have faith in its populace,
and really encourage the scientific mind.
or maybe i'm raving again.
it's good to be back, at least for a while. greetings, mentor, bloodaxe,
jitter. shame i don't hear from y'all more often.
7/26: stuff
Name: The Mentor #1
Date: Fri Jan 26 10:09:34 1990
Tennesee (AP) - (paraphrased) A judge today imposed a $1 (one dollar) fine on
anyone convicted of beating a flag-burner. "Well, if they want to beat the
heck out of a flag-burner, go to it." This assault charge carries a maximum
penalty of 5 years in prison and a $20,000 fine.
Jesus. While I personally don't like the idea of burning the flag, I like even
less the idea of open-season being declared on flag burners. I wonder what the
fine would be for shooting one? $10?
Mentor
8/26: no...
Name: Dark Sun #11
Date: Fri Jan 26 16:25:25 1990
for shooting a flag-burner it would be 12.50 (50 cents tax, and $2
compinsation for the burners family)
DS
9/26: hmm..
Name: Phoenix #17
Date: Sat Jan 27 07:28:09 1990
the main difference between russia and america is that the russians admit they
are monitoring the fuck through peoples lives...
10/26: phoenix
Name: The Mentor #1
Date: Sat Jan 27 12:11:32 1990
What's the government like in Australia? I have no idea how your system
works...
Mentor
11/26: Hmm...
Name: The Apple Bandit #33
Date: Sun Jan 28 06:11:32 1990
Well always remember these: Dont Steal; The government does not like
Competition. How about this: I was once walking down a dense path in an
unknown forest, and I came to a fork in the path; I took the path less
traveled by; and that has made all the difference! Or: The Last Freedom: The
Freedom to Flee..
12/26: re australian government..
Name: Phoenix #17
Date: Sun Jan 28 14:11:17 1990
theyre pretty cool as long as they stay out of my way!
they lack the technology to monitor everyone.. which is pretty good..
and they arent the smartest people in the world..
which is also good...
and basically if they start to fuck around with various diferenet laws.. ill
move to another country..
still for now australia = good.. no problems with government here!
13/26: COOL
Name: Silencer #31
Date: Mon Jan 29 20:13:57 1990
I thought about moving to Ausi land a couplke times....looks nice... what
sorta networks you got down there...besides the basics...alot of countries
have specialty networks that just operate in that particular country...
- Silencer
.s
14/26: hmm
Name: Phoenix #17
Date: Tue Jan 30 07:13:07 1990
our FEW networks seem to be much more advanced than your networks.. but i
spose we <australian hackers> had something to do with that..!
15/26: Anarchism
Name: Psychedelic Ranger #80
Date: Fri Feb 02 04:02:43 1990
I support the anarchist view. Read "Live Wild or Die" or something
from the Earth First! camp (some of their stuff is dogmatic though)
or Overthrow (a YIP!ster times publication) or SLINGSHOT or various
other underground radical magazines.
16/26: huh?????
Name: Phiber Cut #34
Date: Fri Feb 02 08:06:47 1990
When the going gets weird, the weird turn pro.....
(From a famous writters attorney with a Mongolian birthmark...)
17/26: my favorite political non-joke
Name: Mr. Slippery #72
Date: Fri Feb 02 23:31:51 1990
I did not create it but I love it --->
How do you know an honest politician,
he stay's bought!
Given that one California legislature was a little more obvious in selling
himself than the others and got convicted will let the others act pius when
they (1) must have known what was going on and (2) are more discrete but
still sell themselves to special issue groups and vote against what is
really needed.
18/26: good book
Name: Gordon Meyer #65
Date: Sat Feb 03 09:47:35 1990
Another inspiring book is THE MONKEYWRENCH GANG by Edward Abbey. (a sequel
was just published, "Hayduke Lives!" but I haven't read it yet.) Check out
this book....
Abbey inspired the founding of the only (in my opinion) environmentalist group
worth supporting and working for, Earth First!
As Abbey liked to say, "resist much, obey little"
19/26: Earth First!
Name: Psychedelic Ranger #80
Date: Mon Feb 05 03:22:34 1990
Some of EF!'s opinions (at least the ones held by the people such as
Dave Foreman - the so-called "founder" of Earth First!) are dogmatic
and one-away-from-the-real-issue. For instance, their main idea is that
the earths problems are due to the fact that the earth is overpopulated,
and that excess population is bad. Dave Foreman, or someone similar,
said once "If AIDS did not exist, it would be responsible for the
radical environmentalists to create one" which I think is bullshit.
They need to look back at the cause of the overpopulation, which, in
my opinion is the fact that our whole economic system and social
system seems to be based around sex. Of course there are al ot of other
factors involved as well. But I would still call myself a member of
EF! even though I don't belive in some of their ideas. I agree with them
that the earth needs to be protected and that people must learn or
pay. But, as far as some of the stuff, "throw a brick through a plate
glass window of some corrupt corporation" well, what happens then
to the shattered peices of glass? They get picked up, and thrown
away, or worse yet, just lay there. Either way, this is contributing
to the garbage and waste level. The company will just buy another
window, which pumps out more money into the economy, and puts more
money in uncle sam's pocket (taxes for instance) which propogates the
shit even further. So I think some of the "radical" actions are
(at least time-scope wise) just another part of the problem. But
there are a lot of variables here too....
I read an article in Live Wild or Die about a "puke-in" held by
protesters at a local mall during christmas season. As a protest
to consumerism, and shopping in general, several people ate a lot
of strange, colored food with various textures. Things like
yogurt, yellow jelly donuts, etc. were consumed. Then the group
each drank some syrup of icepac (dont know if that is the right
spelling) and took their positions in the mall by the Santa
setup. Before they puked, someone yelled "Shopping makes me puke"
and then puked all over the mall ground in front of everyone.
Other members in this group of people held signs sayiing things like
"The earth is dying and your shopping" and "shopping makes me puke"
while they puked and raised a fuss. However, mall security ended up
nabbing one of them, who puked in their office. THey all ended up
getting off with nothing though. Kind of an interesting story.
PR
20/26: Beautiful!
Name: Erik Bloodaxe #2
Date: Mon Feb 05 17:26:03 1990
Christmas makes ME puke.
I wish I could have been involved in that!!
Hm...how many more shopping days left?
->ME
21/26: ATI #9
Name: Jedi #67
Date: Mon Feb 05 23:43:00 1990
Does anybody have ATI #9 around? Nobody seems to have it, including
GZ, and it's all that's needed to make the collection here complete.
22/26: EF!
Name: Gordon Meyer #65
Date: Tue Feb 06 20:13:38 1990
RE: Earth First!
Our problem isn't sex per se, it's capitalism and the rape of the earth for
profit. The fucking Forest Service sells our national parks behind our backs,
Uncle Sam protects the big corporation that our poisoning our water....
oh man..i'm gettting deppressed.
It's Equal Rights for all species, and the protection of Mother at all
costs..even over and above our own economic, political, social, religious
systems.
24/26: They won't listen
Name: Cassius Cray #135
Date: Wed Feb 07 06:57:19 1990
The Fed's are happy as long as the Trump's and Forbe's of the world are happy,
they don't give a rat's piss about the middle class that's footing the bill.
They'll let 10,000 acres of beautiful forest go under axe before letting some
rich ass lose a cuple thousand ... Editorial opinion EOL.
Cassius Cray
25/26: well....
Name: Ravage #19
Date: Wed Feb 07 09:56:11 1990
then it seems to me that some of this should go in matrix. what do ya
think mentor and et al? does it sound like something the rest of the
community would enjoy?
26/26: It seems that way...
Name: Daneel Olivaw #9
Date: Wed Feb 07 15:59:49 1990
and it is... The government is run by the upper class for the upper class...
as a memeber of the middle class, I speak from experience. Trying to even get
a lowly city council member to accept an appointment is a pain in the ass, if
not imposible. Doesn't the constitution guarantee some kind of freedom?
Daneel Olivaw
_____________________________________________________________________________
*** {Basic Telecom Sub-Board} ***
< Q-scan Basic Telecom 3 - 77 msgs >
1/77: This Sub
> Permanent Message
Name: The Mentor #1
Date: Sun Jan 07 05:11:59 1990
This subboard is for questions and discussion on the basic working of the
phone system - how it works, what's safe, what isn't, etc. If you want to
discuss specific phone computers (TIRKS, LMOS, COSMOS, etc.), please take it
to subboard #4. Also, beginners shouldn't hesitate to ask questions. There
will be someone on here who can answer almost anything you can ask...
Mentor
2/77: Basic...
Name: Erik Bloodaxe #2
Date: Tue Jan 09 13:52:17 1990
The other day I had the good fortune to type to a fellow hacker on QSD
who asked me if I phreaked. I said, not recently, but yeah, I loved boxing.
He asked me what "VMBZZZZ" had to do with anything, and proceeded to pester
me for codes.
This board is for YOU.
->ME
3/77: Welp
Name: Acid Phreak #8
Date: Tue Jan 09 17:51:55 1990
If codes are what he wants, then this board SHOULDN'T be for him...
--ap
4/77: Blue Boxing...Is it truly gone forever?
Name: Erik Bloodaxe #2
Date: Fri Jan 12 02:57:03 1990
Someone want to find out?
I think one of these days we Austinites should get a few tapes made of
random calls, and take a case or three on a drive out to the country,
and look for places on step, or places with xbar toll offices and
goddamn well find us a route to box again. I miss the hell out of
boxing. I used to find ALL kinds of great stuff hidden away
on the 0XX & 1XX prefixes.
I remember one time me and a guy named MOB*RULES were scanning away
in 512, roaming the tandems, finding all kinds of strange things
that would wink and await further MF...he had some kind of MF DNR on
his line though (because of some previous entanglements) and ended
up getting a nasty call, saying to stop scanning, because
one of the things we were playing with was some kind of GSA owned
link from FTS to Bell or vice versa...kinda neat. (At least that's what
he said was told to him...he lied a lot)
I did find both the Houston and Dallas alliance bridges...when everyone
thought there were only White Plains & Los Angeles...YES that was ME.
Houston disappeared after 4 months...and Dallas was the chosen site.
So what we need is the translate the 0700's and find a route that will allow
us to box again, so I don't have to worry about getting my Long Distance
bill ever again.
->ME
5/77: boxing under 5ess
Name: Grey Owl #10
Date: Fri Jan 12 22:55:48 1990
Could someone enlighten me? I have heard everything under the sun about this.
Is is or isn't is possible?
grey owl
6/77: Boxing...
Name: Erik Bloodaxe #2
Date: Sat Jan 13 00:08:53 1990
Of course it is...
The problem isn't where you box from, it's where you box to, and the
route it travels to get to a final destination.
Our problem seems to be that our trunk routing to boxable areas,
like 806 go through areas with toll centers having CCISS
so it cuts the connection when you lose answer supervision via 2600.
That's why I want to find some area that doesn't have this problem...
->ME
7/77: After doing mass research...
Name: Phoenix #17
Date: Sat Jan 13 03:32:40 1990
Australian phone system sux.
OK - does the following... pick up a line and it completes a loop, places you
on common equipment. The only way you can send information to the exchage is
through thi common equipment shit, and that will only acccept dtmf tones. It
then translates your tone, sends them to exchange <CCITT #5> and the rest you
all know. Problem with doing any form of knocking off a trunk is that the
second you break out of the CEPT <common equipment..> it breaks your loop, and
you lose the line. I know all the tones and shit... all i need is a method to
actually get the raw tones to the exchange, in orther words, bypass the common
equipment. If anyone has any ideas....
Phoenix
<The Flatline>
Jacking out..
8/77: Fuck it.
Name: Frame Error #5
Date: Sat Jan 13 11:54:25 1990
Everything is going digital at an incredible rate. We should find some
other method that will allow us to defeat the telco, besides c0dez or
boxing. It's going to be rough, I know.
FRAME ERROR
9/77: swb
Name: The Mentor #1
Date: Sat Jan 13 15:23:58 1990
Well, my friendly neighborhood SWB rep just finished playing with my lines for
about 2 hours. Someone needs to scan the 512-442-xxxx prefix. 0161 is the test
number for their 3M line testers. All of the Austin COSMOSes and LMOSes (that
he knows of) are located in San Antonio and Houston. SWB linemen are going to
be issued CRAFT terminals in the next 6 months.
Regarding the line, the wiring in the apartment may need to be redone. He
split my two lines off of the quad they were on, but they're still in the same
cable. He's going to find out when/if they can run a second cable. God, I love
INLINE service. Makes the $4/month worthwhile...
Mentor
10/77: 442-016x
Name: Dark Sun #11
Date: Sat Jan 13 16:42:45 1990
When you dial the 0161 you get a 1000hz like a loop, but when you dial
0162,3,or 4 you just get a click, like you were connecting to the silent side
of the loop. But, the tone on 0161 doesnt stop (perhaps muted?)
BS
11/77: Whats happened to the 513 loop?
Name: Wiz #25
Date: Sat Jan 13 19:00:04 1990
For quite a while now I have been able to call the USA (I live in South
Africa) collect on the high end of a loop. All of a sudden the other night the
operator told me that the high end of the 513 loop (513-921-1xxx) was barred
from accepting collect calls. This is strange because just one evenening
earlier I chatted to the Apple Bandit for about 20 minutes. Has the phone
company got wise to the use of loops? Is there a probem with the 513 loop
specifically?
Any help would be appreciated, as I would be lost without loops.
MPE Wiz.
12/77: loops..
Name: Ground Zero #30
Date: Sat Jan 13 22:05:46 1990
I wouldn('t use those 513 loops/.
I'm sure they're being monitored, due
to the fact that everyone seems to be
using them. Use some other loops,
guys. I have a bunch/...
-gz
13/77: Ground..
Name: Grey Owl #10
Date: Sat Jan 13 23:19:17 1990
Zero, could you put? up some loops for me?
grey owl
14/77: Loops
Name: Gary Seven #38
Date: Mon Jan 15 10:47:56 1990
Hello, does anybody have any Michgan loops? Id 313,61,517,906 area codes.
If so can ya PLEASE post them. Thanks. Boxing, is it true you can create
some sort of hardware called a BOUNCER that somehow tricks ESS into thinking
your someplace else. Later
15/77: how do you make a bouncer?
Name: Grey Owl #10
Date: Mon Jan 15 18:02:50 1990
I don't know much about boxing...especially under ESS5! What's the deal on it?
grey owl
16/77: Alliance
Name: Grey Owl #10
Date: Mon Jan 15 18:18:18 1990
I was on this conference a few months ago. The AT&T people said it was
something like November 25th. I don't remember which conference it was, but
it was appearantly illegal. (surprised?) The bitch on the other end told me
that someone broke in to a business and beige boxed the conference, but not in
those words. I was pretty pissed when she told me that they could press
charges for the $15 bucks that my part of the conference costed! All I have
to say about this is bullshit. There's no way that a 15-20 minute call from
me to a conference could cost $15. None of them have been good enough to
warrant more than 15-20 minutes. I think AT&T should be shot for
1) charging so damn much to call a friggin' conference and
2) thinking they can charge me for a reverse-billing meet-me.
If they do want me to pay, I'll just say I thought it was legal. ("the guy on
QSD SAID it was legal...how was I supposed to know?") They won't be able to
do anything, right?
grey owl
(thoroughly pissed off)
17/77: ummmm
Name: The Mentor #1
Date: Mon Jan 15 21:33:35 1990
If you didn't do anything but answer your phone, you don't have to worry about
it...
Mentor
18/77: ...
Name: Tak/Scan #44
Date: Mon Jan 15 22:41:51 1990
I never liked AT&T and probably NeverWILL!
Tak/Scan
19/77: You'll have to pay
Name: Erik Bloodaxe #2
Date: Mon Jan 15 23:46:15 1990
You called the Meet*Me
Noone forced you to call...
tough darts buddy.
->w3MEt(
w3
->ME
20/77: AT&T
Name: Phiber Cut #34
Date: Tue Jan 16 06:58:08 1990
Well I haven't read all the messages yet so someone might already have begun
to discuss this elsewhere, but here goes...
I understand that 3/4 of AT&T National network was down last night. The
controlling systems (N something or another) were ALL down around the
county. Rumors were that AT&T shipped itself some bad software, but
that's probably a line of shit. They haven't ruled out sabotage or
a viruse, etc....
21/77: minor note..
Name: Phoenix #17
Date: Tue Jan 16 07:34:47 1990
owl..
correct me i i am wrong...
but one thing i would NOT say is that the guy on QSD said..
coz i dunno icalling QSD is the most legal thing in the world..
but never can tell :-)
Phoenix
22/77: yeah. Thanx Phoenix
Name: Grey Owl #10
Date: Tue Jan 16 08:47:34 1990
I wasn't sure if trt:g (or anyone elses username:g is legal!)
I'm just pissed that they think I'm responsible if someone else breaks into a
business and beige boxes a call. Sheeeeit.
grey owl
23/77: AT&T Network
Name: The Dictator #43
Date: Tue Jan 16 11:12:01 1990
According to the news, the problem was with the "SS7" software, the network
that is responsible for routing calls to their destination. Dan Rather (who
even looked like he didnt know what he was talking about) said that when a
call would be placed, the network would dump the entire translation and route
the call to the recording "All circuits are busy".
Aprox 56% (?) of the calls would not go through.
The Dictator
24/77: Well
Name: Gary Seven #38
Date: Tue Jan 16 18:22:48 1990
I myself found that fucked also. I was wondering why the Itt dialup wasnt
working. Along with some otherThis is the Ctrl-D Macro routines wouldnt work
25/77: stuff
Name: Silencer #31
Date: Thu Jan 18 05:38:08 1990
Well....luckily for me I was out of town during that great AT&T
fuckup...Heheh....anyway:
Does anyone have like a list of all the different types of switching
systems..what they are capable of. improvements with each new ESS
etc etc.....or at least know how I could get hold of this information?
Gary Seven....herez some Michigan loops....dunno how many work.,..but some
must...
-------------------------------AREA CODE:
313----------------------------------
XXX-9996
XXX-9997
XXX= 977, 477, 751, 721, 591, 474, 671, 552, 898, 875, 369, 465, 321, 445, 722,
281, 626, 399, 868, 963, 683, 237, 256, 299, 886, 585, 665, 591, 561, 234,
569, 577, 822, 776, 465, 781, 478, 272, 787, 556, 575, 224, 225, 924, 526,
871, 995, 833, 471, 477, 252, 399, 397, 388, 277, 362, 483, 487, 497, 326,
649, 728, 292, 942, 934, 646, 356, 644, 851, 647
god damn...lots of fucking line noise...~.-a.. sorry|....?>~| those are
all in 313...t~ the suffixes are 9996 and 9997....the prefixes are whats
listed.....l8r
- SILENCER
~~/S
26/77: quick question
Name: Guc #97
Date: Sat Jan 27 10:38:10 1990
just how safe is scanning a prefix in seq. order? i recall hearing somewhere
that ma bell will investigate if they see you've been doing so. I have
non-sequential dailing programs for dos, but the ones i have for my c64 are
just sequential (0001,0002,0003) and i'd rather not tie up my XT war dialing...
27/77: seq. scanning
Name: Dark Sun #11
Date: Sat Jan 27 11:01:34 1990
I do not believe Bell has the capibility to detect this (well, I guess they
code if LMOS can store the last #s you called), but dont implement probably
for reasons of there thinking that it would take too much time and effort... I
dunno... All I can really say is, MANY MANY MANY people have been doing it for
years and no problems so far (besides getting caught by some old lady saying
your modem was harassing her)
Hmm.. If you dont want to tie your XT up war-dialing, then why do it anyway?
DS
28/77: Scanner
Name: The Genetic Terrorist #107
Date: Sat Jan 27 17:51:08 1990
Does anyone have a random prefix scanner? One that will scan randomly from
the lower bound to the upper bounded limits non-sequentially for the IBM?
If so, send it up here.
|07-|15TGT
29/77: wouldnt be to hard to make...
Name: Dark Sun #11
Date: Sat Jan 27 19:08:55 1990
Do you want to just take every #, scramble 'em and try each in a random order
, or just a completely random scanner?
DS
30/77: data taps...
Name: Dark Sun #11
Date: Sat Jan 27 19:10:58 1990
what is the best way to place a *STRICTLY DATA* tap on a line? (I guess it
could record voice, but I'd like to use it mainly for data)
DS
31/77: tape
Name: The Mentor #1
Date: Sat Jan 27 20:29:11 1990
What baud rate? A good tape recorder will snag 300 & 1200. 2400 I'm not sure
about...
32/77: Yea..
Name: Dark Sun #11
Date: Sat Jan 27 21:58:07 1990
What would be a good PORTABLE model (By portable i mean easy to conceal)
DS
33/77: try a VCR
Name: Grey Owl #10
Date: Sat Jan 27 23:52:14 1990
If you can spare your stereo VCR, you can monitor 3 lines at once! One line
on each of the stereo channels and one on video==3 lines. Of course, there is
a simple circuit you can build (I'll u/l it here sometime) that will turn on a
microcasette recorder when the line goes off-hook and shit it down when the
line goes back on-hook. Great for leaving in those CAD Pedestals...come back
every now and then to change the tape!
grey owl
34/77: nonononono
Name: Dark Sun #11
Date: Sun Jan 28 00:55:46 1990
You can easily conceal a stereo vcr behind someone's house or business? I'd
love to see that!
DS
35/77: vcr's
Name: Ravage #19
Date: Sun Jan 28 13:52:03 1990
they make those little sony watch man with a vcr that you can hold in your
hand. the size is no problem. as for recording check out the simpti (dont
remember the exact spelling sorry) digital converters for recording audio
on video tape. very good resolution. they should handle everything you
could want to do. they are about the size of a 3 ring notebook. and if you
use a wired remote type i/o to the recorder then you could use a vox.
36/77: but
Name: Phoenix #17
Date: Sun Jan 28 14:13:30 1990
whod want to buy a tiny sony vcr for x millions of dollars ?
and then leave it behind someones office, running the risk of never seeing it
again ?
well - id just jump at the chance todo something like that ;-)
phoenix
37/77: 2 thing
Name: Guc #97
Date: Sun Jan 28 17:02:01 1990
re: wardialing
first off, i seriously doubt anyone will complain about someone harassing them
when someone is wardialing. you only call each number one time, and how often
do you call ma bell when someone calls and doesnt say anything just once?
secondly, i just said fuck it and started from scratch on a non-sequential
wardialer for my 64, i just need to come up with a decent algorythem that will
eventually do all numbers in a prefix, while not doing the set sequentially.
re: datataps
i got mine working virtually error free upto 1200 baud. i've not tried 2400
baud yet, but will soon. 300 baud is damn easy and doesnt really require
quality equipment, but noone uses 300 anymore, at least noone who has a
password i'd give a fuck about.
the vcr idea is a good one, but as Dark Sun pointed out they're rather hard to
hide. i can cram my microcassete recorder INSIDE a phonebox.
oh, right before the system went down last year, there was a discussion on
slowing down tape roters to get more time per side, has anyone had any success
doing this? If so, let me know, I'd love to find out how.
.s
38/77: one more thing
Name: Guc #97
Date: Sun Jan 28 17:07:22 1990
has anyone *recently* scanned 794-XXXX? If so, please upload the data, it'd
save me a few days work.
39/77: no, but
Name: Dark Sun #11
Date: Sun Jan 28 17:25:40 1990
I'm gonna start on 5000 and go up tommorow, then I'll post the results
DS
40/77: Well...
Name: Grey Owl #10
Date: Sun Jan 28 18:36:18 1990
one guy did manage to leave his VCR in a Telenet place. It was nothing but a
room in a mall with lots of X25 machines and cooling equipment and phone
lines. The idea is that it's a stolen VCR, hopefully.
grey owl
41/77: First of all....
Name: Dark Sun #11
Date: Sun Jan 28 19:55:22 1990
That was a fuckin' text file, and I myself doubt he really did it.
DS
42/77: Random Dialing
Name: Daneel Olivaw #9
Date: Sun Jan 28 22:14:41 1990
All you need is a perfectly random alogorithm, it'll never repeat until it has
done all of them once.... alas, it doesn't exist.
I see no reason to even bother....
Daneel Olivaw
43/77: hmmm
Name: The Mentor #1
Date: Mon Jan 29 00:05:53 1990
Ok, I'd set the algorithm to make a 10,000 byte array and start filling the
slots with a random number generator. Once all the slots had been filled
(actually, I'd fill about 90% then assign the rest sequentially in leftover
blanks), write the thing to a data file and have the hacker use it.
Mentor
44/77: DataTaps
Name: The Dictator #43
Date: Mon Jan 29 01:23:08 1990
DataTaps are fun to mess with...Whoever said that no one uses 300 baud
anymore..Bahahahaha... Most of the small-time companies that connect to TRW,
COMPUSERVE, etc...use 300 baud ... At least out here. Ive encountered a lot
of 300 bauders.
The dictator
Not that I would do anything as evil as datatap anybody...nnonono..
45/77: sony watchmans...
Name: Ravage #19
Date: Mon Jan 29 11:17:19 1990
are only a couple of hundred bucks. it seems to me that if one doesnt have
the resources to do the job first rate they shouldnt be doing it. this
may account for the rash of busts, technological pre-emminance. the feds
have a technological edge and are using it.
46/77: random..
Name: Phelix The Hack #89
Date: Mon Jan 29 12:15:30 1990
The problem with simply gerating random numbers is that the seed is likely to
generate the same number more than once and some numbers not at all. Ex: a
random number generator is told to generate 10000 numbers between the numbers
1 and 10000...it is certainly "possible" that all of those numbers will be the
same.
Here is a basic algorithm which will allow a non repeating FULL random number
scan.
NOTE: most of this example will be written in PASCAL with occasional explain
nations in C. I will also assume that this is used to scan a certain prefix
so the boundaries will be 1 to 10000 (or actually 0 to 9999...to save word
space...we must be FRUGAL!)
ok..define the following structure:
TYPE
hackrec = record of
hackattmpt : integer
end;
VAR
^^^ whoops ...ignore that
hackarray = array[0..9999] of hackrec;
VAR
hack : hackarray;
ok..now initialize ALL elements "hackattmpt "to the array index..ex:
for count = 0 to 9999 do
hack[count].hackattmpt = count;
when a number is randomly generated it is substituted as the index for the
particualr array location..ex: the randomly generated number is in the var
rand...hack[rand].hackattmpt would be the reference to the actual number
displayed.FD?
Every time a number is used ..the field hackattmpt is changerd to hold the
number of 9999 (or whatever the last element is); and the filed at index 9999
is changed to the original index + 1.
A chck is made to see if a randomly gernated index holds a value of 9999..if
it does it will make its new index hack[9999].hackattmpt...and will continue
...
its that easy...any questions?
pth.
47/77: Okay heres a question
Name: Alter Ego #110
Date: Mon Jan 29 16:29:11 1990
y'all were talk about Electric Switching Systems and you refered to them with
numbers i.e. #1, #5... whats the difference between the two(besides the
number)???
Alter Ego
48/77: phelix
Name: The Mentor #1
Date: Mon Jan 29 17:35:41 1990
Hmmm... I thought that was what I suggested doing... nice algorithm, though.
<scratches head, goes back to reread post>
me
49/77: difs...
Name: Erik Bloodaxe #2
Date: Mon Jan 29 19:05:42 1990
the differences between types of esses are subtle...they have to do with new
features, amount of traffic they are capable of handling, etc...
One of the fortune 500 scanners runs off of an array 0-9999...it also stores
busys etc, so you can retry them...
The thing about the vcr tapping telenet/tymnet whatever...was that agent
steal's file/idea/whatever? I really think that was just bullshit. Although
I could be wrong...
And by the way...I'm at 300 baud...but I don't guess anyone would be
interested in any of the things I'm into...
->ME
50/77: Hmm...
Name: Daneel Olivaw #9
Date: Mon Jan 29 21:02:41 1990
ESS: Electronic Switching System... my understanding (from a tech at SWB) is
that the 7ESS can handle over 40 million simultaneous transmissions (i.e. data
or voice or video), and I beleive over 4 million independant phone circuits.
Theoretically, one 7ESS could handle central Texas...
After I beleive 3ESS, they made a drastic move towards more ISDN support, and
the 5ESS is the most popular here in Austin, I think there are 5 of them (not
including redundant units, usually 2 per setup)
Something that I remeber from working for a legal newspaer locally is showing
people how to use their TRW terminals to search our online legal database.
Those 300 baud pieces of termal paper fueled shit... but they worked... I
remembered (luckily) a few of the accounts, but all are now invalid... oh
well.. such are the breaks.
Daneel Olivaw
51/77: look into
Name: Ravage #19
Date: Mon Jan 29 23:13:46 1990
key hashing algorithms. you may be able to break the big array of numbers
down into smaller groups. you could then select the two groups based on
two seperate keys, group and member. this would mean that at any one time
you would only be hashing one small group of keys. since very few search
algorithms are linear but rather logarithmic a simple halving can have
quite a bit of effect. just a thought.
52/77: Dialing algorithms...
Name: Pain Hertz #84
Date: Tue Jan 30 02:12:53 1990
Pick a random number, 0 - 9999. Pick another random number 0 - 9. Say the
first number is 3849 and the second is 3. We are dialing the 512 exchange so
dial...
512-3849 add the 3 to first place of last 4 digits...
512-6849 add the 3 to 2nd place of...
512-6149 add the 3 to 3rd...
512-6179 add the 3 to 4th...
512-6172
follow? if the sum is greater than 9 just subtract 10. Count how many youve
dialed, store the last number, position 1-4, and the number 3. and you can
start and stop whenever...
Also, this is going from left to right. If im not mistaken, you can choose
the digits to add to in 24 different ways (4!) so pick another number 1 - 24.
This algorithm won't repeat until youve gone through all the numbers. How
many different orders are their to dial using this method? Well a bunch...
I hope everyone can follow this... if not perhaps Ill write something a bit
more formal. -PHz
53/77: Speaking of
Name: The Blade #64
Date: Tue Jan 30 13:29:07 1990
Where has Agent Steal been? Havent seen him around for 2 months or so.
Blade
54/77: that file
Name: Grey Owl #10
Date: Tue Jan 30 17:39:47 1990
Whether or not Agent Steals file was shit or not is not the point. The point
was that it COULD be done. His plan was (practially) flawless so it is
possible that he did do it. Are you confused yet?
grey owl
55/77: Slowing tapre recorders
Name: The Inspectre #63
Date: Tue Jan 30 23:15:24 1990
Somebody asked about slowing tape recorders a while back..
It's really easy to do on standard portable sized tape recorders, just open
the thing up, find the motor (it runs the tape motors via a rubber band over a
large wheel), yank off the small wheel on the motor and replace it with a
piece of heat-shrink tubing or other soft rubber tube. Then put the drive band
back and see what recordings sound like. I've can get about 250 minutes on a
C-120 with decent (but not great) sound quality with this method.
There's a way to get much longer play times with decent quality recordings,
but it requires taking out the drive band system and rebuilding the link with
a slower gear drive system, but most recorders are hard to convert easily and
usually a VOX is a better investment.
The Inspectre
/e
/d
(doesn't this system let you edit a message?)
56/77: motor speed...
Name: Ravage #19
Date: Wed Jan 31 12:15:06 1990
can be controlled directly by using a 555 timer to control a 2n2222 transistor
in series w/ the motor. by varying the duty cycle you can get a lot of speed
control w/o a loss of torque, a problem w/ varying the diameters of the
pulleys, except at the very lowest speed. total cost is about $10.
ravage
back
in
black
57/77: mentor
Name: Phelix The Hack #89
Date: Wed Jan 31 12:42:03 1990
sorry...must have misread your "random" post...
pth
58/77: ravage
Name: Grey Owl #10
Date: Wed Jan 31 14:38:12 1990
That does sound like it would work (coming from you, I'm sure it does) but
some people arnot electronically oriented as that (me, for one). It would be
easier just to get a VOX or change the size of the drive gears. (or get a
crappier motor!)
grey owl
59/77: the basic circuit....
Name: Ravage #19
Date: Thu Feb 01 10:46:24 1990
can be found in most electronics texts under motor controller. it only consists
of about 8-10 pieces and is a good intro project.
60/77: Tape Recorders...
Name: Nemesis #122
Date: Thu Feb 01 23:50:29 1990
Well a _vox is easy, and switching pulleys is easy,{so if you use both of
them, you~ could probably get a whole lot out of it... However, if you can
put out a little money, Id rely recomend a real to real.. itdoesnt have to be
a 8 track or 16 track.. not even a 4 track.. but you can get a lot more tape
on one of those things then on the largest cassette... I mean a LOT.
61/77: 7e??
Name: Psychedelic Ranger #80
Date: Fri Feb 02 04:13:08 1990
Is this 7ESS brand new? I have not been up on the latest technology
as far as switching systems go, I have been concentrating on VAX/VMS.
The ESS versions I am familiar with are as follows:
1,1A,2,2B,3,4,5. The 5E, along with the Siemens EWSD, NTI's DMS-100F (dms
100 family of switches) are generally setting up the stages for ISDN.
The 4E's are set up in toll switch applications in most cases. The 1,
1A,2,2B, and 3 are set up for different areas, they have different
traffic capacities, different configurations, links to SPCS's, etc. etc.
If you would like, I can post several msgs. about switching systems,
just let me know and I'll post a bunch of specs. if you want them.
Psychedelic Ranger - Riding the forefront of the psychic revolution!! haha
62/77: Badger
Name: Psychedelic Ranger #80
Date: Fri Feb 02 04:34:10 1990
Is anyone else on here familiar with the BADGER test units? There is a
Change Notice on one that sounds very interesting....
63/77: well....
Name: Ravage #19
Date: Fri Feb 02 13:04:20 1990
put them up already!
this is supposed to be a teaching board right? why wait for someone to ask?
i know a lot of the folks on here have a lot to learn, including me.
64/77: would you get a little better quality
Name: Dark Sun #11
Date: Fri Feb 02 14:44:35 1990
if you sped up the tape? Even if you only got 15 mins it might be worth it
(for what I'd like it for I wouldnt need omre than about 10 mins a shot anyway)
DS
65/77: 7ESS
Name: Daneel Olivaw #9
Date: Fri Feb 02 22:42:59 1990
It is my understanding (from someone at ATT & SWB) that the 7ESS simlpy offers
more capacity. I know that 3M's 7ESS will be picking up several exchanges in
Austin (i.e. Bee Caves, Fairfax & Fireside), and that they are reselling it
back to SWB. Other than that, I'm not sure of the increased capabilities.
Daneel Olivaw
66/77: Tape
Name: The Inspectre #63
Date: Sun Feb 04 14:20:58 1990
Speeding up the tape will get you some improvement if you use quality tapes,
but you could just go spend $300 on a Nakamichi and get great quality.
67/77: But
Name: Psychedelic Ranger #80
Date: Mon Feb 05 03:26:17 1990
But I cannot post the whole damn manual...it would take several months
just to type the thing in! I have other things to do...but Ican
provide some info! Hm. wouldnt it be nice if we could sort of
"concentrate" all the text in the manual into a very short transmission
of data at an extremely high transmission speed that you could
"un-concentrate" and then read? sounds nice....
Psychedelic ranger
68/77: A800
Name: Psychedelic Ranger #80
Date: Mon Feb 05 03:33:36 1990
Anyone on here know how to connect to non-standard routing/system
codes without engineering an operator, a toll test board, or boxing
the call? I'm talking of other ways...
PR
69/77: 7ESS
Name: Phelix The Hack #89
Date: Mon Feb 05 11:21:57 1990
Well...
7ESS was introduced in its Beta stage late 1987..as a competor to NT fully
digital DMS series..the 7ESS is supposed to be essentially a 5ESS& that is
capable of full didgital support right down to the A-D convertors...designed
for a upper level CCIS(like 7)...and WITHOUT having to either software/patch
or adjunt frame the existing switch...AND in that it is Western Electric..the
plant engineers do not have to learn anything terrible different from what
they already know.
As far as unusual routing/mapping...there are a few interesting WATS lines
that allow a dirct map to AT&T's DOM with out having to blow MF..thats right
it is all done thruogh a DTMF menu!..pretty handy.
pth
70/77: TIRKS
Name: Grey Owl #10
Date: Mon Feb 05 16:42:11 1990
Psy: could you possibly FAX it?? I'm not sure about what it costs to have
something faxed, but I would be willing to pay for some fax charges. What
city are you in?
grey owl
ps-why don't we continue this in e-mail Ranger..
71/77: ...
Name: Tak/Scan #44
Date: Mon Feb 05 23:19:42 1990
Anyone have a DMAT for NPA-619. thankx.
The 4th Dimension! 619-745-1xxx. Login PW-SPECTRUM. Newuser PW-Gunship.
Tak/Scan
72/77: DAMT?
Name: Psychedelic Ranger #80
Date: Tue Feb 06 03:24:17 1990
Do you mean DAMT maybe?
73/77: WHY?
Name: Phelix The Hack #89
Date: Tue Feb 06 11:58:21 1990
DAMT's have to be one of the biggest wastes of time..(right up there with
Terradyne Fortel)...
/t
74/77: h
Name: Dtmf #27
Date: Tue Feb 06 19:48:02 1990
Anyone know anything about an Ericson Switch? I was, uh, well, anyway, I
found this thing about an ericson (sp?) switch laying around...Said they were
going to put one in here in texas...Along with some REAL serious ISDN shit in
a few months...Eek, scares the hel loutta me....
75/77: 7
Name: Nemesis #122
Date: Wed Feb 07 01:04:42 1990
From what I have heard, ESS7 is suposed to handel A LOT more than ESS5, I
dont recall exact numbers, but it was an incredible ammount. I have also
heard rumors that ESS7 is what is going to be the "official" type of switch
for ISDN, apparently is is already equiped for ISDN, whereas 5 needs to be
interfaced somehow. However what all this means on a basic level is nothing
realy, other than that you will have a lot more places on the same switch
under 7...Nice, so you dont have to find a different test number dial up for a
bunch of different areas.
I have a list of a bunch of DAMTs in the 619, around here somewhere, I cant
find it right now, but Ill leave them for you on your board if you like. They
are, however (like Phelix said) quite wortless.
76/77: 7ESS
Name: Daneel Olivaw #9
Date: Wed Feb 07 16:01:35 1990
Your right, but since my docs to the 5ESS predicted ISDN by 1989.... hehe...
I know that where I live, we are due to receive ISDN first in this area, but
who really knows when. The 7ESS is manly designed for more raw capability..
what you do with that is what's important.
Daneel Olivaw
77/77: austin
Name: The Mentor #1
Date: Wed Feb 07 18:45:54 1990
Austin just added two class-type features: distinctive ringing & one other.
What is it? Damn, brain damage has set in.
Mentor
____________________________________________________________________________
*** {Hacking Sub-Board} ***
< Q-scan Basic Hacking 4 - 58 msgs >
1/58: This Sub
> Permanent Message
Name: The Mentor #1
Date: Sun Jan 07 05:13:15 1990
This is the area for basic hacking discussions and questions. If it relates to
a specific system, there is probably a subboard dedicated to it; but if you're
just interested in how to get started, or what's popular and what isn't, etc.,
this is the sub.
Mentor
2/58: Hmmm
Name: Konica #47
Date: Mon Jan 15 16:08:52 1990
Well I don't see a sub for IBM's so here is my question.When you connect to an
IBM 3708 you type port password but what do the passwors usually consist of? A
First and Last name or does it require numbers or something?
3/58: 3708's
Name: Erik Bloodaxe #2
Date: Mon Jan 15 17:26:35 1990
The company I used to work for had one set up on an 800 that all the
agents would call in to get policy information on people.
They had all their info for logon set up as a host file on FTTERM...
I read the file, and their port password was IMSPROD or something
like that...It was relevant to the system...
If you have a IBM for some specific company, try system passwords
relevant to that company or its function. Obvious information, right?
Well, just saying that there isn't any set "DEFAULTS" or anything like
that.
->ME
4/58: Well...
Name: Konica #47
Date: Tue Jan 16 16:48:14 1990
I guess I should go and buy a book on it. Thats where I will learn to program
it. The only thing I hate is that the book can only teach you to program it.
Not to hack it. Just like any other mainframe.
5/58: IBM
Name: Sicilumm Thorne #28
Date: Fri Jan 19 15:31:26 1990
RE: Well...
IBM. If itt's actually IBM you are trying to get into with FTTERM or any
of the other cheazy terminals, good luck. Each account ports three times and
then the owner has to chance their password every two weeks. Security has to
validate the passwords, and they cannot be words. If you fuckup entering the
password, you cannot try again later. The account is turned off until the
owner gets realtime sig'd. Oh well.
Sic.DAYVM1
6/58: IBM
Name: Dark Sun #11
Date: Fri Jan 19 17:33:20 1990
RE: IBM
well, here in austin (AUSVM1,3,6,8), you get about 5 attempts before the
account is turned off for 24 hours, and security doesnt have to validate the
passwords. Maybe this is just a site-specific security rule. Personally, I
wouldnt mess with ftterm because pcterm's twice as good (with data compression)
DS
7/58: Hum..
Name: Warf #81
Date: Sun Jan 21 21:48:14 1990
I have the phone number to my school's mainframe. I just need a good
hacking prog. Anyone have one? Call sometime..
Call Now!
The Dead Zone
602) 844-0365
SysOp: Warf
Sorry about the NO color. It used to have color. Oh well.. hehhe!!
<=[Warf]=>
8/58: that #
Name: Dark Sun #11
Date: Mon Jan 22 15:34:52 1990
was for informational purposes only,right?? :-)
DS
9/58: what's this?
Name: Grey Owl #10
Date: Mon Jan 22 16:47:30 1990
If a system logs me on at 1200 baud with E71, and sends...
GLENAYRE 4.1.D TERMINAL
and then some miscelaneous commands after the header, what does this look like
to you?
grey owl
10/58: Well...
Name: Erik Bloodaxe #2
Date: Mon Jan 22 18:24:38 1990
depending upon what the "miscellaneous commands" are, it could be a ton 'O
things...
post the number and I'll check it out if you want...
->ME
11/58: I found
Name: Gary Seven #38
Date: Tue Jan 23 12:28:00 1990
I found a Vmb system owned by Gm motors. Coincidently i found 2 carriers next
to each other and close to the Vmb. i think they are PRIMEs from Gm. if
anybody wants the numbers i will gladly mail them. Later
12/58: ....
Name: Tak/Scan #44
Date: Tue Jan 23 22:20:43 1990
Yeah, Gary go ahead and send me those primes in mail and I will take a look aT
Them.
for information purposes-
The Fourth DImension BBS
619-745-1xxx
Login pw=Spectrum
New user pw= GUNSHIP
13/58: things...
Name: Erik Bloodaxe #2
Date: Tue Jan 23 22:57:29 1990
I think it's time for your friends at The Legion of Doom to start a new
service...(with great help from friends)
Decryption service! On any unix or Prime, send the etc/passwd file, or the
UAF file to the sysop directory, and you will be mailed back the encrypted
passwords...(on UNIX< any pw that the deszip could bust)
The Prime UAF must be in binary, so kermit it from the site, and xmodem it
here.
In return, we will not distribute any information gained from your site, but
we will probably look arounnd it anyway...but it will remain between you and
us.
What do you people think? Bad idea? Good idea? Hell...It is just another
attempt by me to piss everyone off.
->ME
14/58: aha..!
Name: Phoenix #17
Date: Wed Jan 24 01:30:35 1990
umm...hmmm
<doesnt know what to say..>
15/58: Heck
Name: The Parmaster #21
Date: Wed Jan 24 07:48:01 1990
Personally i like it :-)
Jason.
16/58: Decryption
Name: Grey Owl #10
Date: Wed Jan 24 19:10:52 1990
I think it's a great idea. I get a whole shitload of passwd files and some
UAF files too. \\\______got!
grey owl
17/58: Just a couple of questions...
Name: Konica #47
Date: Wed Jan 24 23:41:13 1990
Well since the feds know this is a hacker board whats from stoping them from
tracing every incoming call to Pheonix Project and getting all the #'s, then
monitoring then for illegal activity?
And just say I was calling through my personal calling card.....What would
they get as the incomming #?
If I had a DNR on my line is there any way I could find out?
Sorry about this but I am not as good as most of you (except for the guy that
keeps posting codes) and the only way I am going to learn is by trying shit
out and asking questions....
Hope this is the right sub for these questions....
18/58: vv
Name: Dtmf #27
Date: Thu Jan 25 03:22:29 1990
RE: Just a couple of questions...
To check the DNR the best bet woud be to call bell security, or the SCC
19/58: well..
Name: Phoenix #17
Date: Thu Jan 25 07:27:43 1990
nothing stops them from tracing..
I dont know how it works there.. but down here all traces are illegal unless
they are for drug/murder reasons.. <well not traces, but taps are..>
20/58: Feds...
Name: Erik Bloodaxe #2
Date: Thu Jan 25 17:05:35 1990
Absolutely nothing would stop them from collecting all local calls, and/or any
longdistance company records of calls coming into this number...in fact, I
kind of expect them to at least get all local calls here...hell Austin is all
ess...most of them 5's...(I think...maybe 1's)
However, I doubt that tapping the data line is worth their while...especially
when they can just log on and read everything anyway. And the mail just isn't
that spectacular...
In any case, all calls here made by legal means are legaal, so don't worry
about it. Just because tee nature of this bbs isn't that of your average
mainstream bbs, doesn't negate its legality. Information posted here is kept
legal.
If you are truly worried about it, don't call, and sit home being paranoid.
Hell, I'm local...I call direct...and now I do it at 300 baud. Hell, I can
almost tell what's being typed at 300 baud while listening to it...forget the
data tap! Hehe, although a 300 baud data tap is SO simple to playback
completely error free...at 1200 or 2400 you kind of have to get the recording
levels just right...but 300 gives you plenty of room for error...
->ME
21/58: ess 1,5
Name: Dark Sun #11
Date: Thu Jan 25 20:14:00 1990
hey, whats the diff??? :-)
DS
22/58: decryption
Name: Silencer #31
Date: Thu Jan 25 23:35:01 1990
hmmm....like...you mean once you have an account...read the user file and then
you will deencrypt all the passcodez...sounds good....but what the fuck is
kermit...
- Silencer
23/58: kermit
Name: The Mentor #1
Date: Fri Jan 26 10:11:23 1990
Kermit is a 7-bit transfer protocol that is used to transfer files to/from
machines. It is mostly found on mainframes (it's a standard command on VAX,
for instance). Kermit has the added advantage of being able to work through an
outdial (because it is 7-bit).
Mentor
24/58: Kermit
Name: Sicilumm Thorne #28
Date: Fri Jan 26 11:20:10 1990
Kermit is merely another transfer protocol like Sealink, Xmodem, Modem7,
Zmodem, et cetera.
Its relatively slow, but was thought to be better than Xmodem, due to its
capabilties. (Don't remember what they are, I use Zmodem).
Sic.
25/58: my kermit
Name: Ravage #19
Date: Fri Jan 26 12:24:21 1990
lets me set it at 8 bits also. just another trivial note.
26/58: from what I know...
Name: Dark Sun #11
Date: Fri Jan 26 16:26:55 1990
kermit was originally designed to allow transmission of data across 2
computers running with different parity settings.
DS
27/58: and..
Name: Phoenix #17
Date: Sat Jan 27 07:28:45 1990
as a major disadvantage.. it is damn slow!
Phoenix
28/58: Well....
Name: Johnny Hicap #45
Date: Sat Jan 27 21:28:18 1990
No one answered that question (forget who posted it) that if he was calling
through a calling card is it possible to get the number of the person who
called even he was calling through hs calling card? What would they get as the
number comming in? Would they get the card? Of course then they would just see
who owns it.
JH!
29/58: more Kermit BS
Name: Grey Owl #10
Date: Sat Jan 27 23:53:57 1990
Kermit is slower than Xmodem, BTW. The packets are smaller (usually 64 bytes)
and the error-checking is shot to hell with any line noise. It's better than
ASCII though!
grey owl
30/58: packets for kermit
Name: Dark Sun #11
Date: Sun Jan 28 00:56:35 1990
can be something like 2k in the newer unix releases (something like that)
DS
31/58: 2k kermit packets
Name: Grey Owl #10
Date: Sun Jan 28 11:58:24 1990
that'll be the day when Telix supports that! So what if the unix can handle
it...you have to have it at both ends.
grey owl
32/58: but
Name: Phoenix #17
Date: Sun Jan 28 14:14:31 1990
ill post c source or zmodem up here, lots better than kermit.. and can be used
thru net as wll.. coz it too sends in packets!
33/58: kermit
Name: Guc #97
Date: Sun Jan 28 17:03:21 1990
doesnt ms-kermit allow one to set the packet size?
.s
34/58: xmodem
Name: The Mentor #1
Date: Mon Jan 29 00:06:28 1990
If you need xmodem source, there's a copy of it in FORTRAN for a VAX in
library 1.
Mentor
35/58: i have...
Name: Guc #97
Date: Mon Jan 29 08:37:35 1990
x,y,&zmodem for unix, if anyone wants it uploaded, let me know..
.s
36/58: source
Name: The Mentor #1
Date: Mon Jan 29 17:35:58 1990
Do you have the source? If so, please u/l...
me
37/58: that old question...
Name: Erik Bloodaxe #2
Date: Mon Jan 29 19:08:44 1990
hell, I don't even remember what the specific question was myself...
however, on my bills it says:
512-441-0xxx
CC Call from NPA-NNX-XXXX (where the call was made from)
->ME
38/58: the one i mentioned
Name: Guc #97
Date: Tue Jan 30 09:29:38 1990
does not include the source, but i'll check around on various archive sites
and see if i can find anything.
39/58: new development
Name: Grey Owl #10
Date: Tue Jan 30 17:41:09 1990
What are some common Cosmos passwords? Do any defaults exist? How long are
the passwords, typically?
grey owl
40/58: Cosmos
Name: The Dictator #43
Date: Thu Feb 01 02:37:02 1990
Cosmos is a dirivitive from Unix. Try any Unix default and see if you have
any luck. Ive seen a wide variety of logins/passwords from system to system,
but this is the case for ANY computer system.
Just jump in with both feet and swim toward shore. Make sure you dial
"safety" so those "big-bad sharks" dont tear you apart on your way.
The Dictator
41/58: hey
Name: Alter Ego #110
Date: Fri Feb 02 20:40:46 1990
y'all... a friend of mine has to debate FOR hacking... so we need reasons that
support the affirmative... got any ideas... either leave me e-mail or post it
here and I'll capture it for them... thanx...
Alter Ego
42/58: for hacking
Name: Grey Owl #10
Date: Fri Feb 02 21:57:38 1990
REAL hackers improve systems that they get into. They might have to read
sensative mail, but the eventually find stuff that needs fixing and fix it.
Check out Steven Levy's book _Hackers_ to find out about the early hackers and
what the hacker ethics are. They will help your friend dispell myths about
what and who hackers are. This is a good chance to spread the good word about
hacking.
grey owl
43/58: _Hackers_
Name: Daneel Olivaw #9
Date: Fri Feb 02 22:45:04 1990
I dunno about dispelling myths... my understanding is that he was not in the
Inner Circle (as he claimed), or many of the other groups.
As for how to argue for hacking... got to have a good definition... that is
the best start. I hacker is in it for the challenge of it primarily, and does
NOT destroy anything other than that required to cover his path. (Mentor..
you wanna interject a little ethics?)
Daneel Olivaw
44/58: i think...
Name: Dark Sun #11
Date: Fri Feb 02 23:11:59 1990
That anyone who has to debate for reasons to hack really shouldnt anyway...
The person must not really want to do it and just thinks he/she does... Any
comments on this opinion?
DS
45/58: Kermit (some more)
Name: Mr. Slippery #72
Date: Fri Feb 02 23:37:12 1990
I believe that there is a mainframe Kermit version but I'm not sure
if its VM or MVS. In any event, if you have kermit you can expedite
getting things on and off any mainframes you come across.
46/58: Kermit...
Name: Pain Hertz #84
Date: Sat Feb 03 03:13:36 1990
...is available for several mainframes. I know of a machine running VM as
well as a machine running MVS that have Kermit. Also, kermit is quite popular
on the VAXen running VMS. I also know of a Sperry 1100 that has kermit.
-PHz
47/58: hacking...
Name: Alter Ego #110
Date: Sat Feb 03 07:16:58 1990
RE: i think...
Well I know that they another person both choose hacking to debate on so the
filp a coin as towards which debated for and agaist it... They got for it
although against will be a helluva lot easier to do... for their wanting hack,
they say the do so I'm gonna pick-up a power supply for my other modem and
loan it to them... this way y'all can talk to them directly....
Alter Ego
48/58: hacking...
Name: Erik Bloodaxe #2
Date: Mon Feb 05 00:48:18 1990
weird...what a wild debate class you must have...
Actually, there is NO arguments to support illegal hacking, just as there are
no arguments to support peeping in windows...
Hacking is my one true love, but I can't justify it any further than to say it
gives me extreme pleasure and is one of the most addictive things I have ever
experienced, and now that I've had to almost stop for a while, the withdrawls
are terrible.
Going and nosing around someone's system may end up in the security on that
system being improved, but if you weren't supposed to be there to begin with
that need shouldn't have existed.
TO paraphrase Richard Stallman, hackers today just play a kind of sick game
with administrators...one constantly tries to outwit the other, and although
the end product may be better security, the time which should be spent on
actual programming and research is wasted in securing the system and playing
the mind games with the hacker...
Hell, what do I care...I used to run around with my other pervert friends and
spy on women through windows in apartment complexes...
(hehe, phoenix and I were talking about this today...)
It's the same kind of thing...people get their jollies by looking at things
they know they shouldn't be looking at...
so I'm an electronic voyeur...fucking shoot me...
->ME
49/58: COSMOS
Name: Phelix The Hack #89
Date: Mon Feb 05 11:26:19 1990
Well where COSNIX is essentailly a bastardized unix shell..I think that you
will have more luck attempting to try accts in the following format:
RS0X MF0X LA0X SF0X..etc...where RS is the particular field office that
uses the particualr Cosmos in question..and X is a digit 1-9...
ptjh
50/58: COSMOS
Name: Grey Owl #10
Date: Mon Feb 05 16:44:07 1990
I'll be sure to try that. So, San Antonio would be SA then...hmmmm.
grey owl
51/58: COSMOS commons
Name: Psychedelic Ranger #80
Date: Tue Feb 06 03:35:52 1990
You could also try department names such as NAC (network admin. center),
LAC (loop assignment center), RCMAC (recent change memory admin. cntr),
etc., and the ones that phelix mentioned, like RSxx, PAxx, RSxx, RCxx,
NAxx, MFxx, FMxx, and possibly COMx but I think those are usually
defined to be logonable from certain devices only if I remember right.
Or can be defined that way (Message and all that). If you are looking
for WC's, you can get them a shitload of places. Just go trashing
and you'll be likely to get some CLLI codes (common language location
identification) which contain the WC. The breakdown for some CLLI
codes is something like this: BSTNMABS61T. I think this is the right
number of digits. SO this would be BSTN = BoSToN, MA = Massachusets, BS = Wire
Center name, 61T = office designation number. So if you are on the
COSMOS that serves this WC (of course COSMOSes dont have to be in the
same NPA as the numbers they "serve", for instance the COSMOS systems
could be centralized in a major city, corp. HQ or something, or some
big MMOC or something...and all the NPA's in that state can then
dial in (or have a hardwired terminal in some cases) to the centrzlied
cosmoses. This happens, and goes contrary to the outdated file on
COSMOS by Lex Luthor and LOD/LOH from 1984. But there is still come
(should be some not come) good info in those files.
Psychedelic Ranger
WC# SIR
H TN nxx-xxx/nxx-xxxx/CS 1OF/.
_
52/58: ANI
Name: Cassius Cray #135
Date: Tue Feb 06 06:24:59 1990
Are there any good write ups on ANI? And to the guy who said he had DNR's on
his line--- can you tell when one is on your line? Is there clicking or does
your sound go to shit? Maybe I'm getting to paraniod... Well they do say,
"Paranoia is nothing to be scare of."
Cassius Cray
53/58: well..
Name: Phelix The Hack #89
Date: Tue Feb 06 12:02:32 1990
Grey Owl:..well not actually ..I think you misunderstood what I meant...RS
would be Repair Service...MF..Main Frame..etc...refering to the particular
field office in question...NOT the city..
As far as WC's...I have found the the mall queens that are using Cosmos/Work
Manager..etc...are more than willing to not only tell you which COSMOS they
use..but all of the WC's it services..
pth
54/58: Tapping
Name: Daneel Olivaw #9
Date: Tue Feb 06 17:34:50 1990
is easy to detect... the line voltage drops, just like when you add an
extension. The only problem is that the FBI will usually have your voltage
boosted so you'll never know... hehe... they aren't as stupid as they look.
Daneel Olivaw
55/58: df
Name: Dtmf #2
______________________________________________________________________________
*** {Phone Co. Computers Sub-Board} ***
< Q-scan Phone Company Computers 5 - 46 msgs >
1/46: This Sub
> Permanent Message
Name: The Mentor #1
Date: Sun Jan 07 05:14:56 1990
This is intended for fairly high-level interchange on specific phone company
computers and the switching systems. If you want to ask "Are 950s safe?",
please use subboard #2.
Mentor
2/46: Things...
Name: Erik Bloodaxe #2
Date: Tue Jan 09 14:09:54 1990
Recently, people have asked me to do some pretty wild things for them.
One in particular, although not terribly wild, was to put up an
800 number for a bbs. Very very simple thing. This is the kind of thing
that should be discussed on here.
First off, does anyone have access to their local bell computers? If so, say
so. I would love to tell you all what to do on these things, but I
really don't want to just pass on theory, I'd rather see it put into use.
I'm planning quite a dandy COSMOS file sometime, which should make anyone
who uses it, "KING" of COSMOS.
Another point: The various bell packet networks. You all should know by now
about the RBOC's venture into the packet game. SBDN, Pulse-net, Microlink II,
et al...in any case, there ARE wonderful things on these systems. Most of
you probably know about the "lmosfe" on ML2 that goes to a Dallas LMOS
front end. However, I doubt that more than a handful of people on here
have ever been on an LMOS (through an IBM or a UNIX based machine). It seems
to be quite a topic of conversation anyway.
Well, let's keep that topic alive...but for starters, where are you and what
telco-systems are you in?
->ME
3/46: LMOS
Name: Acid Phreak #8
Date: Tue Jan 09 17:56:23 1990
The most recent LMOS interlude was one in my local area. Got the host
processor (an IBM 3270) off Predictor. Overall, a very handy tool to add to
your telco 'collectables'. The FE's of course were PDP 11/70s using MLT for
reference.
Aw thit.. lookit all dem Hicaps.
--ap
(advanced phreaking)
4/46: Humm...
Name: Phase Jitter #3
Date: Wed Jan 10 07:23:31 1990
Cris,
Why ANOTHER COSMOS file? Too many allready, and it has to be about the
lamest PC computer there is...
As to LMOS and LCAMOS(Predictor) they are old news, anybod been playing with
CRIS (Customer Record Information SYstem). It seems to be a neet little
system, although the info is pulled through SMART.
Phase
LOD!
5/46: Silly Boy...
Name: Erik Bloodaxe #2
Date: Wed Jan 10 14:46:40 1990
COSMOS is pretty cool.
When you aren't in the sccs, COSMOS is the next best thing. ENtering in
things into RCP...hell, I didn't really even know that until Phiber
told me, and sure as shit, the order went through the next day.
Also, SIR is fantastic for finding ALL phone company computers. SIR is good
for finding pbx lines...SIR is just plain cool.
Maybe it's just a database, and nowhere near as interactive as LMOS, and maybe
you can't really change or find out personal shit, like you can through
CRIS (that is what that's all about right?) but it's terrible easy to
get into, to get root, to do all kinds of cool things to lines without
having to be on a switch. So nyah nyah nyah...
Besides, if you don't want to see "another" COSMOS file, then don't read
mine. I've only seen two...Lex's TOTALLY shitty one, and some other
lame-ass thing.
->ME
6/46: ICRIS
Name: Phiber Optik #6
Date: Wed Jan 10 16:37:27 1990
Not to nitpick, but an LMOS CP is an IBM S370 (3270 is an SNA, used to get to
BANCS through LOMS for instance).
CRIS, as mentioned, the Customer Record Information System is a dandy little
IBM system whose main purpose is to house customer records. There are a small
handful of "CRIS" systems, like LCRIS (Local), and ICRIS (Integrated, which
should be noted is used by the Residential Service Center). Here in NYNEX, the
only way to reach these systems (we obviously aren't hardwired hackers) is
through BANCS, a bisync network. BANCS is not direct dialable, but IS
available through a 3270 link on the LOMS system, used by LDMC (LAC or FACS,
depending where you live). And LOMS IS accessible. A host of systems are also
available through FACS (which can be reached through LOMS on BANCS) such as
CIMAP, LMOS, SOP, TIRKS, the COSMOS-PREMISE interface, etc. So as you can see,
rather than going after any specific system, going after the RIGHT system will
pay off greatly (LOMS in this example). Oh, waitta-minnit, those mentioned
systems are off of BANCS, sorry. You can reach FACS on BANCS, and access a
couple 'o things like some of those mentioned, COSMOS (certain wire centers
only), etc. OK, enough rambling. Let's hear someone else's input.
Phiber Optik
Legion Of Doom!
$LOD$
7/46: Huh?
Name: Erik Bloodaxe #2
Date: Wed Jan 10 17:15:25 1990
I'm confused...that rambling kinda threw me....
lessee...You are saying you can get to these CRIS (LCRIS & ICRIS) from
LOMS? Hell, I've got a ton'o'LOMS on the NYNEX packet net...
Specifically in the NewEngland side (3110:622) SO: now
tell me, oh ye telco gods, how are they intertwined? On the
LOMS I have, which are Unix based, (and hung on the network, so you
could just enter the nua and drop into shell) I didn't see any
applications to conenct to some other system...well, I didn't
really look at the ttys either.
Is the 3270 connection hooked into the thing as a device? Do you cu to
the tty it's on there to connect? What do you do? I'm interested now.
->ME
8/46: 3270
Name: One Assembler #11
Date: Wed Jan 10 17:35:41 1990
hmmm... always thought a 3270 was a terminal (At least, thats what all those
little labels that say "3270" and underneath the screwed logo... are you
interchanging 3270 with sna?
9/46: Datalink2
Name: Grey Owl #10
Date: Wed Jan 10 19:03:45 1990
What is it about getting into LMOS from DL2? How do I tell what areas
LMOS I'm into, or can I get to any of them? I call the local Datalink2 dialup
and login with lmosfe and then I get lost. I guess I need a good file in
learning LMOS...can you help...anyone???
grey owl
10/46: blah blah blah
Name: Phiber Optik #6
Date: Thu Jan 11 13:41:31 1990
First of all, that's MicroLink II, not "datalink". And 3270 IS SNA. 3270 is
the Synchronous Network Adapter to connect an async terminal to a sync or
bisync mainframe...
OK... On LOMS, you run the command "3270dsp" which is I believe in /usr/bin.
Before doing that, you have to run an environment profile (and also READ it in
order to get the BANCS logon and FACS name).
I believe the proper one is /loms/profiles/BANCSloms.env, or something
similar. Once the 3270dsp is run, you will be connected to BANCS. Enter "%log
xxx" where xxx is the logon from the env file. Then, connect to FACS. This is
also in the env file. Just type what the variable points to. You will then be
on FACS. I think FACS is easy enough to use without an explanation.
Now aren't we elyte?
Uh, Erik, what were you doing on LOMS if not using BANCS??? Reading "HOT RMA"
reports? Hehehe.
PHIBER OPTIK!
$LOD$
11/46: I I may...
Name: Daneel Olivaw #9
Date: Thu Jan 11 16:40:01 1990
may a minor correction to Phiber's post:
3270 is underlying protocol on the 3274 terminal multiplexers that all IBM
mainframes use (or some other model like a 3276 that does other things nice
to). 3270 is aterminal implementation that will only run syncronous (for some
assenine reason), and is wide spread. The 3101 is a comparable async
implementation of that standard.
SNA is System Network Archetecture and was developed and used within IBM. It
is influential elsewhere, both in layering and in specific protocols, such as
SDLC (the link data prto.) which have influenced CCITT and ISO.
BTW, 3270 and SDLC are intertwined, and one usually can be associated with the
other.
>> Daneel Olivaw
12/46: Daneel...
Name: Phiber Optik #6
Date: Fri Jan 12 09:22:03 1990
Thanks for the lesson in something I do for a living. What I was trying to
briefly mention without going into techno-details was that it is 3270 that
makes it possible for an ASYNC system like LOMS (unix) to connect to an IBM
host (BANCS). Without SNA, this isn't possible.
13/46: No problem...
Name: Daneel Olivaw #9
Date: Fri Jan 12 22:33:12 1990
just wanted to make sure nobody was confused (or wasn't confused?)..
Daneel
14/46: Confused..
Name: Silencer #31
Date: Sat Jan 13 02:33:40 1990
heheh...anyway...Erik:
Will your file contain a CMD list or something? I have heard that once in
LMOS you can go to a service dept and tap lines.....like you can monitor or
talk....
when you try and do it...it asks you for the number,...then the callback
number. it then hangs you up and calls back the number you entered...anbd
hooks you into the number you plan to monitor. Loops would be useful in this
case for callbacks.. This sounds like a load of fun to me (also a good way
to get info and stuff....like....tap some office of a LD carrier that you use
most often and get the latest scoop on whats going on). Do you know anything
more about this part of LMOS? Sounds cool as fuck to me...
- Silencer/DFKN
15/46: LMOS
Name: Phase Jitter #3
Date: Sat Jan 13 09:51:55 1990
You can monitor lines via LMOS, but it dosn't hang you up.. You enter the
IBM via the hicap (High Capacity Front End Processor) or various UNIX front
ends (ex. ARSB). It is possible to get to LMOS from other systems, but that
is for later discussion. Once in the IBM you enter a special mask (which I
will not mention) and then you enter an Employee code, Printer, Call Back
Number, TN You want to verify, and a few other things. Then you type the
monitor command. LMOS will respond with "Request In Progress" the number
you gave as a callback will ring, you pick up the phone and dial "0". Now
the conversation on the busy line is on your call back too.. You can rase or
lower the volume using "+" and "-".
Phase Jitter
Legion uh Doom!
16/46: Bell Atlantic
Name: Hotshot #52
Date: Thu Jan 18 10:30:38 1990
Does anyone have any information on Bell Atlantics Strategies Computer?
The # is 1-800-468-7546 and can connect at no higher that 12oo...
17/46: I didn't think...
Name: Daneel Olivaw #9
Date: Sun Jan 21 22:29:11 1990
you were supposed to post that....
Daneel Olivaw
18/46: ARG!!!
Name: Erik Bloodaxe #2
Date: Mon Jan 22 02:45:01 1990
He wasn't...Mr. Warf, if you post another fucking code on this bbs, you will
be deleted, and I will personally see to it that you are fucked over pretty
hard. Hell, the feds are due here any day now, so maybe you will be named as
my fucking accomplice on EVERYTHING...
Nah, you're too fucking stupid, they'd never buy it...just don't let it happen
again. This bbs has VERY few rules, so you should be able to understand them.
Keep the fucking codes to your own "K-rad" bbs.
->ME
19/46: Ok..
Name: Warf #81
Date: Mon Jan 22 07:45:57 1990
Sorry dudes. Well, I didn't know that this bbs is just for ANYONE to log
on and have ANYONE read ANY of the messages. You should get some security.
Oh well... Hasta and sorry again!
<=[Warf]=>
20/46: no
Name: Phoenix #17
Date: Mon Jan 22 09:23:39 1990
security is not the problem... you are the problem <or were..>
the board is not designed tohave any security..
it is not called a public access board or nothing..
but then again.. who am i to say anything..
Phoenix
21/46: It was...
Name: Daneel Olivaw #9
Date: Mon Jan 22 22:32:27 1990
also stated in the logon that EVERYBODY (i.e. SS (like the Nazis), CIA, FBI
all get access on first logon. Are you to ignorant to read, or just don't
give a damn about the rules.
Daneel Olivaw
22/46: blah
Name: Phelix The Hack #89
Date: Mon Jan 22 23:35:44 1990
no more to be said.
23/46: I
Name: Gary Seven #38
Date: Tue Jan 23 12:30:17 1990
Found a Carrier and when it is CNA'
CNA it is MBT Michigan Bell Telephone. I wonder what it is. I will try to
narrow down the o/s but im not familliar with the telco computers.
Cosmos,Lmos,Switches or anything like that. Later
24/46: if you don't mind everyone knowing...
Name: Grey Owl #10
Date: Wed Jan 24 19:11:52 1990
If you don't care who gets the number you might post it here. I'm sure
someone will be able to call it up and identify it for you...
grey owl
25/46: can anyone translate
Name: Grey Owl #10
Date: Sun Jan 28 00:22:26 1990
This is off a work order (from I don't know what)
Condensed for space:
SAS7200128 SAS720128 E 50BM 40 ABS/ABS/LALA COMPUTERS
DD 12/11/89 SMC 12/11/89
FB1/D3/RMVL SMC SMC
AUT
001 31/LGGS/811427 /SW P W C36
AUSTTXGRWAC AUSTXFI
SEF6RM9
FA01 AUSTTXFI SPE W P AUT
02 AUSTTXFI SPE P AUT
[END OF WORK ORDER]
Any ideas on what all of this is... i know that the 31/LGGS/811427 tells
circuit and feature information, but I have never seen the 'LGGS' codes
before... any ideas what this could possibly be? Also, does anyone know how
to decode all of the work information, I even have the Bell Line maps if that
will help...
grey owl
26/46: 911 upgrades
Name: The Data Wizard #16
Date: Sun Jan 28 23:50:20 1990
Im am in ess1a and recently heard on the news that the local telephone company
is going to charge extra to advance 911 features. Now, I have a question
concerning this. Is it possible to upgrade 911 services without upgrading the
switch to ess5? I hope yes. It dread to think of me being in 5. oh well..
Later,
TDW
27/46: I would think
Name: The Dictator #43
Date: Mon Jan 29 01:18:50 1990
I would think Yes, that they could upgrade the 911 to E911 without upgrading
the switch. Phoenix is mostly comprised of 1AESS switchs and I just cant see
them re-doing that many switches...
The Dictator
28/46: That report is from....
Name: Psychedelic Ranger #80
Date: Mon Jan 29 04:59:38 1990
That work order you posted looks like it is from TIRKS. I assume it is
the order for some sort of activity about the circuit...I have a TIRKS
manual so I could probably define the terms for you if you wish, let
me know.
Psychedelic Ranger
29/46: Yes...
Name: Daneel Olivaw #9
Date: Mon Jan 29 21:04:43 1990
actually if you could write a quick little file for acronyms that would be
handy, as I have roughly 1000 work orders for lines in my area, and some are
VERY interesting, like PBX outdials (dedicated PBX outs) and WATS lines..
Daneel Olivaw
30/46: there it is again!
Name: Grey Owl #10
Date: Tue Jan 30 17:44:16 1990
The same concept as pad2pad. If we could get the numbers to the outlines on a
PBX, we could intercept all calls made. He he heh..hahaha AHAHAHAHAHAH!!!
The mind mereley boggles at the possibilities. Daneel--wanna have a
translation party when we get the acronyms? Heh.
Psy: Type up those TIRKS terms, p?r f?vor. (that's por favor if you don't
have IBM graphics characters..)
grey owl
31/46: Port
Name: The Dictator #43
Date: Thu Feb 01 02:39:01 1990
Theoredically speaking:
It has been my experience that Cosmos systems are netting in one form or
another. Does any know of a way to port commands from one Cosmos site to
another? Could you possibly facilitate the CU command?
The Dictator
Having trouble
32/46: PBX and AT&T 3B2
Name: Pain Hertz #84
Date: Thu Feb 01 20:48:19 1990
I have some info on a PBX in my area, mostly circuit numbers... some one care
to help me decipher this stuff as im not quite up on this...
I have the circuit numbers, which are labled as follows:
DOD IDD, DOD SELECTIVE CALL SCREENING, 2 WAY REMOTE, DID WINK START nnn & nnn
NXXs, FX CIRCUITS (major LD co.).
On the 2 way remote number I get dial tone, through that I can dial any number
served by the PBX. But it won't let me dial out once in the PBX. Also, I
have some test numbers, 1000 Hz, and another one used for checking static.
I posted this in this sig cause the 3B2 which this site uses happens to be on
the Internet, which means, line orders could be entered via Telnet.
I guess my lack of phreak experience is showing... I tend to stay behind a
CRT. Any information would be appreciated.
-PHz
33/46: TIRKS
Name: Psychedelic Ranger #80
Date: Fri Feb 02 04:19:35 1990
Shit- I cannot post the whole thing, as the manual is quite thick, and
there are so many....it would be better if you would post or mail me
with a list of the ones you need the most, then I can give you those
rather than make a huge, huge file with all the TIRKS abbreviations.
TIRKS printouts are very hard to decipher without a manual! I mean,
you can guess at some of them, but after a while they get so specific
with things involving special services equipment setups that you get
a whole lot of shit thrown in there. I have found many nice things from
TIRKS printouts (WORD documents actually, Work Order Records and Details)
including dialups to systems, translations to 800 numbers, etc. etc.
And if you xlate the PL (private line) feature code included on the
WORD, you can learn more about the circuit which can lead you to something
you are looking for, perhaps. If anyone has any PL codes they want
xlated, I can do this..but other people can too, it is no big deal.
34/46: WORD
Name: Signal Raider #78
Date: Fri Feb 02 15:17:55 1990
RE: TIRKS
A WORD expert! Great. Maybe you can clear something up for me.
A typical PL circuit ID is of the form nnXXXXnnnnnn, such as 27LGGX123456.
What is the signifcance of the LGGX in the above? I'm guessing it is related
to the class-of-service of the PL (two-wire, four-wire, voice-grade,
hi-cap...), but I really don't know how. Can you help?
-SR
35/46: WORD
Name: Psychedelic Ranger #80
Date: Mon Feb 05 03:43:48 1990
You are correct in your guess that the LGGX code is related to the
class of service of the PL. The different positions mean different
things....I don't have my translation of PL codes in front of me
(but I will find out what LGGX is and let you know), but I do have
some old output from something else that has PL's. Here are a few
samples:
TP HIDF-0117 ST WK
SE CLR ST WK
TP HIDF-0234 ST WK
CP 7-0123 ST WK
PL 7.TLNC.104496..LB ST WK
(just including the PL field now)
PL 5.OPNC.501.232.4545. ST WK
PL 7.OSNZ.99944..LB ST WK
PL 3.TTDZ.151434..LB ST WK
As if you couldn't tell, these came from a COSMOS system that I
have obtained printouts from. The TLNC, OPNC, OSNZ, and TTDZ are
the codes you are referring to..I am not sure about COSMOS
formatting of PL's since TIRKS carries most of the data on PL
circuits, but you can fish some from COSMOS. But these 4 char
codes are the same as on the WORD documents.
Psychedelic Ranger
36/46: COIN
Name: Psychedelic Ranger #80
Date: Mon Feb 05 03:47:55 1990
Anyone know a way around COIN's detection of red-boxing??
PR
37/46: COIN
Name: Phelix The Hack #89
Date: Mon Feb 05 11:29:52 1990
well if the "quality" of your wink is good enough the SCP should never know
the difference...read my file in PHUN #4 on TSPS...also ask if you need to
know how to obtain a good recording ..for your area..as they have a tendency
to differ.
pth
38/46: good recording
Name: Grey Owl #10
Date: Mon Feb 05 16:49:31 1990
I'm not sure where I read this, but you can follow the wire that comes out of
the payphone and tap it. Then you put about 50 quarters in it. This is cheap
since you will always have enough recording time to call anywhere in the
world...you have to think about the long-term: 50 quarters is not that big a
price to pay for free calls until you get busted!
Does this mean that you can't build an electronic red box that will work in
any area in the US? I thought that the tones used in once city would be the
same as another. Please correct me if I'm wrong.
grey owl
39/46: that wouldn't
Name: Alter Ego #110
Date: Mon Feb 05 17:56:31 1990
RE: good recording
be to hard... the trick would be getting into the silver coil that holds the
wires, but you probably could do that with hack saw... just make sure you
don't cut the wires... I also thought the tones were the same no matter where
you were...
??
40/46: Just do this
Name: Psychedelic Ranger #80
Date: Tue Feb 06 03:39:56 1990
If you need to get a recording of the coins, just dial a silent termination
test number and insert quarters while holding a suction cup thingie to the
mouthpeice of the phone. We did this and it worked great, clean recording.
Other times I have gotten really shitty recordings though and they
only partially work, or not at all, and probably are noticeable due to the
abnormal call processing. But the other times I was trying to do this, there
were other factors involved the changed the recording quality.
Then just hit the coin return slot and you get all your $ back..and have your
pretty musical recording that you can bring to your music class
and play as a representation of such-and-such Milliseconds of such and such
and so on.
PR
41/46: why not...
Name: Ravage #19
Date: Tue Feb 06 11:00:46 1990
call your answering machine and record it that way?
42/46: good recording..
Name: Phelix The Hack #89
Date: Tue Feb 06 12:08:06 1990
Well I have found the best recording comes from a combination of the two above
suggestions...
Call up a friends house (who knows what the deal is) from a coin station ..AND
MAKE SURE THAT THE CALL IS INITAITED WIT HA QUARTER!...then have yuor friend
unscrew his mouthpiece (to eliminate any backbround noise) and press a key to
signal that he is ready to record (using your handy 1.99 Radio Shack
induction/suction mic)...and then start plinking quarters in...hit coin
release to get'em back (all but the first quarter that is)...
pth
43/46: Sheeeeeit
Name: Captain Crook #36
Date: Tue Feb 06 20:38:56 1990
On eproblem with all these recording coin tones. Like Scan Man has said
before what happens if you are using new or weak batteries to record and then
you put new or weak batteries in to replay? The sound/speed will be off
enough that the phone will not accept it.
44/46: Red Boxing...
Name: Nemesis #122
Date: Wed Feb 07 01:20:58 1990
Well here are a few of my experiences with redboxing... First, some phones
dont let YOU hear the tones.. They usually let the CALLED person hear them (I
have never found one that doesnt), so call home, and have your bro record
them..you can get a VERY good recording that way..
My main problem with red boxing is that MANY fones in my area MUTE the
mouthpiece untill the call goes through! It is VERY stupid because I cant
even use my pocket dialer (which is a necessity for all payfone
hackers.heheh)..So you almost always end up putting in a quarter..However, yet
get it back.. no big deal...
there are nice ways to "synthesize" the coin tones, but I have had a lot
of problems with those.. I found that the BEST way to do it was to make a
small Digitizer with playback..I then digitize it, and just push a button and
play back into the mouthpiece.. It works very well, and is VERY small..I could
use SMT to make it even smaller. I could even dump the ram, and burn an EPROM
and sell it..hey.. now theres an idea..hehehe
45/46: i've always.
Name: Guc #97
Date: Wed Feb 07 08:45:46 1990
spliced into the line BEFORE the payphone when red boxing. that way, you
bypass the muting in the fone.
.s
46/46: Sharper Image
Name: Daneel Olivaw #9
Date: Wed Feb 07 16:04:24 1990
sells a little digitizer for I think $49, and it stores 45 seconds of
whatever. That could be handy, and it is about the size of a pack of
cigarettes... when I get the cash, I'll probobaly get one.
Daneel Olivaw
< Phone Company Computers Q-Scan Done >
_____________________________________________________________________________
*** {Telenet (now SprintNet) Sub-Board} ***
< Q-scan Telenet 6 - 80 msgs >
1/80: This Sub
> Permanent Message
Name: The Mentor #1
Date: Sun Jan 07 05:15:46 1990
This subboard is specifically for discussion of GTE's packet network Telenet.
Of course, since you can get to damn near any network in the world off of it,
discussion may stray a bit...
Mentor
2/80: Yeeeeeeeeeee
Name: Erik Bloodaxe #2
Date: Tue Jan 09 14:16:49 1990
I've been scanning the fuck out of Telenet.
(Want proof? Look in the file section.)
It's kind of interesting. Systems seem to live exclusively in the
0-1000 range, and a few others lie scattered through the 50000-70000 range.
The systems that hide WAY up there have proven to be QUITE virgin territory.
You have NO idea how virgin.
I have also come to some kind of conclusion about the ENHANCED NETWORK
SERVICES NOT AVAILABLE message... It seems that WAY up there I've found a
ton of systems that connect and ask USER ID, and then PASSWORD, and then
respond with the identical error message givn when you enter a bad NUI.
It's my guess that the "ENHANCED" services are some kind of closed user group
application, but one that allows a user to connect from any terminal, rather]
than from just one that had been specified, and possibly with an ID not
specifically designed for that CUG. Dunno about that last part though, as I
don't have any more damn NUI's.
Anyone want to check out a load of rejectings? I've got ton's of them.
->ME
3/80: Debug Ports
Name: Phiber Optik #6
Date: Thu Jan 11 13:46:34 1990
I am requesting assistance in utilizing a TP3325 (preferrably) debug port.
Erik? I need to know how to use it MANUALLY, *NOT* through TDT2 (well
gooooolly!)
.
.
Phiber Optik
($LOD$)
4/80: Interesting...
Name: Erik Bloodaxe #2
Date: Fri Jan 12 03:08:11 1990
Um...what have you gotten yourself into boy?
Lemme guess...you've snagged a debug port on your NYNEX-land PSN
and want to grab ASCII, right?
Uh, I'm kinda used to menu-drivethings when doing stuff like that.
Also, the basic info I've gleened from Telenet Techs on TDT2 applications
help for that too, although I guess that won;t help you.
What I'd do if I were you is call 1-800-Tel-enet and talk to one of
their techs. They'll love to talk to someone about something like
that. As a matter of fact, I was just talking to them today about
a command I never figured out what it did. (TAPE & DTAPE) He'd
never heard of them either, so he had to bring in a bunch of the
other techs to discuss it...turns out they are for some archaic
use to append a textfile you want to u/l to the end of a message
you want to send when in Telemail...
(I don't know either...sounded like a dumb command to me too)
They will probably even be able to send you some kind of manual or some
documentation on your specific needs...They have TONS of things
lying around they LOVE to ship all over the world for fun.
(I only wish TYMNET was more friendly like that...bastards wouldn't send me
a TMCS or PROBE manual...)
->ME
5/80: Ah.
Name: Phiber Optik #6
Date: Fri Jan 12 09:27:36 1990
I see. I attempted to order docs for telenet before, and they sent me
"pamphlets" on how great telenet was. I suppose I'll try again.
I have limited success using TDT2, but not much (like connecting and
x25screen'ing). The only real commands I kno of on debug ports are "Lxxxx",
where you specify a 16 bit hex base address, and "Rxxxx" where you specify how
many bytes from the base address to do a hex dump.
Other than that, I PAD-to-PAD to get accounts.
PO
LOD
6/80: debug
Name: Grey Owl #10
Date: Fri Jan 12 22:58:04 1990
What's up with debug ports? Erik--can you make a command summary for me on
the debug tools?
grey owl
7/80: Well...
Name: Erik Bloodaxe #2
Date: Fri Jan 12 23:56:16 1990
Not really...I'm far from competent using them...
I'm going to try again to order a tdt2 manual next week,
and if that falls through, I will forever be
stumped...Prime Suspect is the "expert" on the subject
and I don't even want to try to explain, on the
basis that I might give out shabby information.
Hopefully he will call here someday.
->ME
8/80: scnas
Name: Silencer #31
Date: Sat Jan 13 02:44:47 1990
fuck...I meant Scans.... umm...I was just scanning on 00-99 of a few area
codes...
I got a few that I am having trouble identifiing....seem interesting...
in 30520, 30522, 30563, 30573 all seem to be indenticle. When I type '?' it
says somthing like:"expected HELLO: ,JOB: ,DATA" Or something like
that.....souunds intersting,,,,maybe some sort of Credit institution or info
beaureu or the likes...I have no idea. Also...
20150 - something called Interet...not internet...interet....weird
20145 - Newsnet....?? anyone know anything about this system?
I found a couple others that I'd never seen or heard of before..but these
seemed the most interesting....
- SIlencer/DFKN
9/80: ok..
Name: Phoenix #17
Date: Sat Jan 13 03:35:08 1990
whatever asks for hello job or data is usually a hp series machine.
the system prompt is a ":", and the logoncommend is HELLO
Phoenix
10/80: ...
Name: Frame Error #5
Date: Sat Jan 13 12:01:46 1990
Norm - Seattle Telenet Technician - 206/382-0xxx.
If you have something pertinent to ask him, go ahead. Please do not harass
the guy. I'm not even sure if the number is good anymore. It should be.
FRAME ERROR
11/80: Pad to Pad is lame..
Name: Phase Jitter #3
Date: Sun Jan 14 01:05:33 1990
as ERIC said tdt2 is much better, the output is in HEX, but a simple program
converts the data to ascii.
Phase
LOD/h!
12/80: Pad to Pad
Name: Erik Bloodaxe #2
Date: Sun Jan 14 02:04:20 1990
is fan-fucking-tastic.
If you know what the plebes are connecting to, and can emulate it, you
have them by their balls.
Pad-to-pad is still possible in most areas...It seems that
only Telenet has done anything to stop it, thanks to the loose
lips of Mr. RNOC & Mr. Lex Luthor. Oh well, no use flogging
a dead horse...
I have gotten more things from pad-to-pad than I EVER expect to
from using tdt2 to monitor ports...but it is kinda useful, and it IS
real easy to convert hex to ascii...hell, I think there's even
an option to get it to DISPLAY ascii anyway.
Just don't try to gleen info from a Russian pad...the feds here will
think you're sending secret cyphers to your Russian spy buddies...
Right Par? hehe...you fucking traitor!
Will the Secret Service ever require more than a 3 week computer literacy
course to fulfill the Special Agents assigned to computer crime? I hope
so...
->ME
13/80: Only 3 weeks for computer crime in the SS?!
Name: Grey Owl #10
Date: Sun Jan 14 11:50:58 1990
That's ridiculous! If I owned a mainframe that was a target for hackers, I
would be raising hell that the people protecting haven't even had enough
training to learn DOS.
But since I'm on the other side I'm glad they are so stoopid.
grey owl
14/80: .
Name: Frame Error #5
Date: Sun Jan 14 12:51:39 1990
Who gives a fuck? The less education they have, the more we will be able
to do.
Which other networks are still vulnerable to PAD/PAD connections? I'd like
to play with them a bit.
Oh, are the addresses mnemonics or numerical?
15/80: pad-to-pad
Name: Grey Owl #10
Date: Sun Jan 14 21:39:56 1990
How does this aid hacking besides making the connection untraceable?
I know that you just connect to one pad, then to another, but why is this such
a big deal?
grey owl
16/80: owl
Name: The Mentor #1
Date: Mon Jan 15 01:34:29 1990
Ok, what you do is connect to another person's pad as they attach to the
network. When they think they are typing to the network, they are actually
typing to you. When they attempt a connect, you consult your directory and
give them a prompt appropriate to the system they're trying to connect to - if
you don't know what type of system, just give them a login: prompt - as The
Leftist always says, people are like sheep!
They then type their account name to you. You give them a Password: prompt and
they type that. You then give them a "INVALID ENTRY, RETRY" and disconnect.
They assume that they typed the pw in wrong and try again. You should have
logins for a half-dozen or so systems on hotkeys so that you just hit alt-v
for vax (or whatever). Simplest way in the world to snag stuff.
Mentor
17/80: and
Name: Phoenix #17
Date: Mon Jan 15 02:16:54 1990
I personally love it..
18/80: tdt2 in 813
Name: The Electron #32
Date: Mon Jan 15 06:42:50 1990
who managed to fuck up the tdt2 prime in 813?
dont bother answering...i KNOW who fucked it up...8)
19/80: Stuff
Name: Gary Seven #38
Date: Mon Jan 15 11:02:17 1990
Does anybody have a list of Outdials for all areas Global and the like. That
would be cool to have handy. Erik did you ever release your Datapac Scan
file. Datapac being Canada of course 3020 is the DNIC.
later.
20/80: tdt2
Name: Konica #47
Date: Mon Jan 15 16:36:43 1990
Can someone please explaine this in full detail? I am having problems with
understanding what you experienced people are talking about.
So when you say tdt2 please start from the bottem....
21/80: tdt2
Name: Grey Owl #10
Date: Mon Jan 15 18:06:11 1990
Those are the debug tools for Telenet. tdt2 is all the commands that you use
to set up and alter the parameters of a PAD.
So with pad-to-pad, I can find some way to get the NUA for the PAD I get when
I connect to Telenet, or do I find the one for a certain system? Is this
clear as mud?
grey owl
22/80: ummm
Name: The Mentor #1
Date: Mon Jan 15 21:35:10 1990
When you log on to telenet, (from 512, for instance) it will say
512 014A (or 512 014B, or so on). These are PAD addresses.
Mentor
23/80: hmm
Name: Phoenix #17
Date: Tue Jan 16 07:35:24 1990
I do sympathise with electron..
24/80: Pad addresses.
Name: Grey Owl #10
Date: Tue Jan 16 08:48:57 1990
I see, Mentor. That's what I thought. I'll just have to call Pac*it
through an outdial sometime and get lots of those addresses |-)
Does pad-to-pad still work with Telenet?
grey owl
25/80: What is
Name: Phase Jitter #3
Date: Tue Jan 16 09:46:03 1990
Pac*it just the other day I found a ton of Pac*it dialups scanning..
26/80: owl
Name: The Mentor #1
Date: Tue Jan 16 17:06:49 1990
Well, there are a few telenet pads around the nation that will still connect,
but the general answer is no, you can't do pad-to-pad off of telenet anymore.
Mentor
27/80: I tried
Name: Gary Seven #38
Date: Tue Jan 16 18:24:53 1990
I tried fooling with the pad-pad method also yesterday on Telenet.
Entering like 5173a or something and it just sat there until i sent a break
signal as usual. Again anybody have something to connect 3106 NUAS?
late
+r
28/80: Pac*It +
Name: Erik Bloodaxe #2
Date: Tue Jan 16 19:35:23 1990
Pac*It is GM's packet network...no wonder you found them...scanning Detroit?
In any case...don't use them. Maybe their local dialups are still ok,
but the 800's are dumping everyone calling location to GM thanks to MCI.
Um...Phase: try this on the local ports...find one of 200 or less,
then place a call to a Telenet address that RCC's, like a pcp dialer
and see if it goes through. The ports used to have some kind of
fucked up software that would allow you to connect to RCC addresses
without an NUI. (But only on ports 200-something or less)
But remember: That's part of what got Doc Cypher nailed, et al.
->ME
29/80: pac*it
Name: Grey Owl #10
Date: Wed Jan 17 08:49:54 1990
Pac*it is still up and working wonders for me. Of course, I'm using a
lightning fast outdial to call the already slow pac*it. (The outdial won't
let me do 1+dialing except for 800s) You just have to find a port less than
400. 399 works...(experience)
grey owl
PS: can I connect to the Telenet pads for pad-to-pad via pac*it?
30/80: telenet pads
Name: The Mentor #1
Date: Wed Jan 17 12:20:12 1990
If you're going to play pad-to-pad, the *first* thing you should do is either
find a pad other than your local one, or use some X.25 software that has your
address disguised. They *will* eventually notice something strange, and you
don't want your local port address in the header of every connect.
No, you aren't going to be able to connect to a Telenet pad via Pac*It. I
don't think there's more than 6 pads in the nation on Telenet that still let
you go pad-to-pad.
Mentor
31/80: pac*it to Telenet
Name: Grey Owl #10
Date: Wed Jan 17 16:59:02 1990
Why woulnd't I be able to connect from Pac*it to Telenet? I can connect to
the Telenet PCP dialers via Pac*it, so why not the pads?
Do you have any X.25 software for an IBM/AT?
grey owl
32/80: Telenet Pads...
Name: Erik Bloodaxe #2
Date: Wed Jan 17 18:58:21 1990
Telenet pads are access barred from ALL addresses, save a few internal 910
and 909 addresses.
That's why you can't pad-to-pad on Telenet anymore.
->ME
33/80: hmm
Name: Phoenix #17
Date: Thu Jan 18 02:02:01 1990
This is just theory... and it may be the biggest load of shit there is... or
possibly even coincidental but..
here goes
so ar the only networks which }ipad to pad has ever worked on have been
tremendously slow networks. all the aster networks <austpac, datex-p etc> have
never had pad to pad working on them. rom experiene i can tell you that the
problem has been present on more than one type of software, so although
possible, it is unlikely that software was problem. Thereore that leaves us
with hardware and its setup. If it means anything, tha is where i believe that
pad to pad problem lies, in the hardware/setup o hardware. I assume though,
that it would be very easy to patch with software modiications..
Phoenix
<The Flatline>
That f key is still broken
Jacking Out..
34/80: Pud to Pudding
Name: The Operator #42
Date: Thu Jan 18 22:32:42 1990
Yeah...It was intentional.
Anyway, PtP'ing was a blessing in it's time...These days, it has gotten
tougher but if you get (usually) a prime, one IS able to as long as it's out
of the 3110 DNIC...Ahh...The days of baggin' them Telenet Security
NUI's...Ahhh...I think I've ought to go look through my scrapbook...
The Operator
35/80: x.29
Name: Konica #47
Date: Thu Jan 18 23:17:16 1990
On Telenet I was scanning and come across a connection that said the following
X.29 Password:
And if you entered the wrong password it would disconnect you back to Telenet.
I am a begginer on Telenet so I would like to ask a few questions.
1. What is x.29?
2. What might be some common defaults (if any)
3. Is this just a waste of time?
36/80: Hope this helps ...
Name: Wiz #25
Date: Sat Jan 20 06:30:59 1990
RE: Stuff
I'm sure this is old news by now, but there seems to be a PC-Persuit modem
which is totally un-restricted (I frequently dial South African BBS's to
disguise my origin using this PCP modem) - the NUA that I type in to get to it
is ...
03110202001230X, where X is from 1 to 8, but usually only 1-5 work.
MPE Wiz
37/80: outdials
Name: Grey Owl #10
Date: Sun Jan 21 11:27:33 1990
Daneel Olivaw told me that there are outdials in every city that Telenet has
set up for rental. Is this true? This would be *extremely* handy for some
hacking that needs to go on local to me.
grey owl
38/80: Outdials...
Name: Erik Bloodaxe #2
Date: Mon Jan 22 02:49:38 1990
I don't think that Telenet has THAT many outdials...
Official Telenet OD's and PCP outdials are one in the same...
However, many companies have outdials placed all over the place...for the most
part the are stuck on subaddresses...
For instance, I have one in 202 that is on sub-address a, and says illegal
address unless you specify that sub address...most of these types of outdials,
(and I've found a bunch exactly like it) are ventel types, and you also have
to go back to command mode and change to half duplex to use it well.
Hell, TYmnet has a million outdials...
->ME
39/80: Internet
Name: Sicilumm Thorne #28
Date: Mon Jan 22 07:02:51 1990
Internet. The image of Cyberspace. That's all that name does for me.
Somebody with a lucid view of telecom, please explain exactly, physically,
what Internet is, does. [This may sound stupid, but hey].
In the future, when posting, with all the acronym's, why don't we also put
in parenthesis what each acronym means. I mean, I know most of them, some I
don't, but because this is a place of learning, hence "Phoenix Project", why
not educate everyone, right? Hearing a bunch of acronyms is a lot less useful
than knowing what they are and mean and recognizing them.
If I were to have an Internet Gateway address. Just how would I go about
using it?
Sic.
40/80: actually..
Name: Phoenix #17
Date: Mon Jan 22 09:40:02 1990
there are heaps o outdoials on telent..
you just gotta know where to look or them..!
Phoenix
41/80: internet
Name: Phiber Cut #34
Date: Mon Jan 22 18:56:07 1990
You've got to be kidding! INTER (as in InterLATA?) NET (as in Network?).
Put them togeather and what do you get? (tough one, eh?)
Bascially, the Internet is a result of the Defense Advanced Research Project
Agency (DARPA) which created ARPA net in the late 60's (I believe it was
1969). This network was used by researchers doing government/military
work. Eventually, the idea caught on and it expanded. Onwards came
MILNET (Military Network), BITNET, etc. etc. etc......
Put them all togeather and you get InterNET (Ethernet based communications,
primarily TCP/IP using high speed T1 links).
I know that this is a brief explaination, but I'm really tired. It seems
as though someone here called me with a shitload of bad news and I don't
think I'll get any rest for a week. But when I do, and if I remember, I'll
post a more descriptive article on the Internet.
42/80: dodnet
Name: The Mentor #1
Date: Tue Jan 23 01:08:05 1990
ARPAnet is supposed to be phased out in the next year or two - it's bandwidth
is pathetic. It'll be replaced with the fiber-optic DODnet. Wheeeee!
Mentor
43/80: maybe
Name: Phoenix #17
Date: Tue Jan 23 06:51:46 1990
a seperate board or internet ?
it could <one day> get pretty involved..
well... or rather ull ino on internet read the tcp/ip manual..i got it in red
paper back... dont know where it is now.. or d give you specs on it..
Phoenix
44/80: speaking of phiber optic nets...
Name: Ravage #19
Date: Tue Jan 23 13:27:55 1990
did you know that with a laser and a good optical sensor you can crack
fiber optic security. seems when the laser interacts with the beam in
the cable you get interference patterns that look like shadows and
bright spots, kinda like a twin split interferometry, that can be
detected and decoded.
45/80: DODnet?
Name: Phiber Cut #34
Date: Wed Jan 24 04:45:39 1990
Maybe there should be a D00Dnet?
46/80: fiber optic splicing..
Name: Phelix The Hack #89
Date: Wed Jan 24 12:15:05 1990
Wheras you may indeed be able to theoretically do it..splicing into a MUXed FO
trunk/feeder not only takes the above mentioned equipment ; but some erios
serious splicing equipment, the correct knowledge of what to do with that
equipment; and a Digital to Anolog converter (unless YOU happen to have
digital ready recvrs)...
I think that it is beyond my feeble powers..
pth
47/80: well....
Name: Ravage #19
Date: Wed Jan 24 14:37:35 1990
i have done it in a test situation. most computers have a analog joystick
port or paddle port, at least my ammy and my 64 do, that is more than capable
of doing it. but the ideal way would be to run it to a tape deck for later
decoding. while you do have to cut the outer sheath no splicing is done,
this would interrupt the cable and set off security. the sheath incision
can be done in a black bag like those used for fiels film changes. total
cost besides the laser is a hundred bucks. a lot of the stuff can be gotten
surplus so the price can be almost free.
48/80: DODnet
Name: Grey Owl #10
Date: Wed Jan 24 19:14:45 1990
What are the specs for this one?
If it ain't faster than the current Internet it will turn out to be DUDnet...
grey owl
49/80: DoD
Name: Dark Sun #11
Date: Wed Jan 24 20:25:35 1990
Has been around for some time now....
DS
50/80: hmmm.
Name: Konica #47
Date: Wed Jan 24 23:51:27 1990
No one seemed to answer my question about X.29 before....
On Telenet I got a NUA that responded with X.29 Password:
My questions were...
What is X.29?
And what would e the likly password that would allow me to access the system,
for information purposes of course.
51/80: ll
Name: Dtmf #27
Date: Thu Jan 25 03:30:10 1990
Maybe this is common knowledge, but no one evr told me so I figgure I'll pass
it on...When you are on altgers, and the 'from'has an address, try connecting
to it on telenet..I have found some interesting things that way...
By the way, does anyone know the full command set for the Internet servers?
With the set pri=g command, and the proper password, you get global privs
which let you do some things that arent even listed in the global help
screens...ANy ideas? Anyone know what I can do with one of the besides wreak
havoc on all the ports(booooorrrring d00d) ?
DTMF
52/80: od's
Name: Silencer #31
Date: Thu Jan 25 23:44:40 1990
Well... could someone compile a list of all the od's they know of or something
to that effect and u/l it....or send it via email to users requesting it. This
of course would be purely for informatiopnal purposes..heh.. when you log onto
an NUA that asks for a cmd and the only thing it accepts is dialout what is
this? I couldnt get the thing to connect either..hmm
.s
53/80: Hey...
Name: Sicilumm Thorne #28
Date: Fri Jan 26 08:09:11 1990
Could someone who fully understands debug and such (tdt2) and pad@pad on
Tymnet and Telenet please explain it to me, either mail, or, if you can
explain it in "information" terms, here.
Preferably mail, but I'm sure I'm not the only person in the dark.
Sic.
54/80: well...
Name: Ravage #19
Date: Fri Jan 26 12:25:37 1990
i would like to learn it as well. maybe we could compile the various notes
of individuals and put out an issue devoted to it? maybe even put in some
code for differnt machines?
55/80: pad2pad
Name: Grey Owl #10
Date: Sun Jan 28 00:01:22 1990
From what I know, it's no longer possible (except in VERY few and far between
systems anyway) on Telenet and I don't know about Tymnet. Here goes my
attempt at describing it...
When you call Telenet you type @D^M and get a prompt looking like
512 011B
TERMINAL =
and you just hit enter for the terminal prompt. Above the TERMINAL = line
there is an NUA of your pad. It's not a private pad that accepts reverse
charging, but it is a packet-assembler/disassembler. Pad2pad is when you
connect to one of these public pads and immitate Telenet.
Say a user calls up Telenet in NYC and Telenet decides to put him on the next
available pad...BUT you are already connected to it so what he types goes to
you. When he types "ID blahblah..." and his password, you give him the proper
response. You also have his NUI. When he types "C 51359" you have to look in
your handy-dandy scan directory and then find that it's a VAX and give him the
right prompts. You now have his login/password. Isn't this fun??
Too bad it doesn't work anymore. Try to apply this concept to other things
such as phone interception and stuff like that. THAT'S hacking.
grey owl
56/80: Pad 2 Pad, the concept
Name: Pain Hertz #84
Date: Sun Jan 28 02:48:48 1990
Actually, I read somewheres, on another board I think. About some guy who
applied this to an ATM (Automated Teller Machine ;-) ). Supposedly, got his
PC between the ATM and the bank mainframe. Had the PC tell the ATM what it
wanted to hear, responses to the customers actions, and had the PC tell the
mainframe, waiting for customer. I wasn't there... but sounds quite
plausible. -PHz
57/80: it was
Name: Grey Owl #10
Date: Sun Jan 28 11:59:19 1990
Telenet has secured up pad-2-pad possibilities. They REALLY don't want people
doing that anymore.
grey owl
58/80: Pad to Pad
Name: The Parmaster #21
Date: Sun Jan 28 18:17:02 1990
The most awesome gift god has given to hackers..
Many thanks to the boys that discovered it..
You know who u are! :-)
Later,
Par
Jason
59/80: was I right?
Name: Grey Owl #10
Date: Sun Jan 28 18:37:03 1990
Is pad to pad totally dead?
grey owl
60/80: atm
Name: The Mentor #1
Date: Mon Jan 29 02:31:40 1990
I don't believe that will work. From everything I've surmised, data is
encrypted inside the ATM and not decrypted until the bank. If someone has
direct experience to the contrary, please let me know...
Mentor
61/80: hmm
Name: Phoenix #17
Date: Mon Jan 29 02:52:45 1990
i have direct experience to the contrary..
there was a bank which was continuously dialling its host whenever an atm
would be used..
from memory the nua it would call was 8181 or 8184 i cant remember..
i dont know the name of the bank... but what i did as as follows..
pad to pad.. intercept atm connection to host..
capture data..
disconnect from remote atm..
connect to host and send data to it..
the reply was not encrypted.. in raw text ormat..
we then found all sorts of uses for that thing.. :-)
and i still dont know the name of the bank 8-)
ahh, the good old days...
phoenix
62/80: hmmm
Name: The Mentor #1
Date: Mon Jan 29 17:37:31 1990
How long ago was this? Android Pope & I found an ATM that had a standard
4-prong phone jack next to it. Just for fun, we checked it out. We couldn't
get anything but garbage (we tried many different paritys) - and yes, we did
establish that data only flowed when the machine was in use.
me
63/80: ...
Name: Erik Bloodaxe #2
Date: Mon Jan 29 19:17:26 1990
You can still connect to public pads on several networks around the world.
Find out which ones yourself...
ATM's...I don't see why they would be encrypted...especially those that are
hooked up with dedicated lines to their institution. The ideal ones to mess
with are those at remote locations where they only update once a night
(usually 12 or 1) and grab everything as it spills out.
This intrigues me greatly...never can have too much cash laying around. Neat
how we are already talking about data taps too, huh? Can the feds put 2 and 2
together and get 4? Hehe...
->ME
64/80: ATMs
Name: The Dictator #43
Date: Tue Jan 30 01:22:02 1990
This should really go on "Electronic Banking", but since we are discussing it
here..... The example Grey Owl is refering to was on "America's Most Wanted",
or somthing like that...about a guy who worked at a bank, learned the system
and whatnot. He went home, and programed a "duplicate" (extensive trojoan, if
you will)...on his PC.
He then placed his PC between the ATM and the host...When the host would send
or request commands, those commands would be intercepted by the PC first...the
programmer would then send his OWN commands to the ATM. Etc, etc.. The show
did not say whether or not the data was encrypted. It would seem to me, that
since this guy worked at the bank, that it wouldnt matter...cus he would know
the encryption process anyway...
The Dictator
65/80: ok..
Name: Phoenix #17
Date: Tue Jan 30 07:21:13 1990
well.. this all happened in the setting stages of pad to pad on telenet
basically i noticed that a whole lot o ports would continuously try to connect
to a certain constant nua. upon intercepting this call.. i recieved no input
<ahem i mean response> visible on screen, but noticed my modem RX lights
blinking. turn controlchars on,and notice cntrl-e flooding in, constant breaks
between each. this was same on any connection made to this nua. what the
system was waiting for was a control character as a response to start session,
and upon recieving it transmitted data to the host. after several attempts, i
managed to figure out pretty much how todo most transactions.. what i did use
it for was to sprint various numbers <ie left some mainfrme connecting to it
day and night trying various numbers and seeing what worked>.
had i known the name of the bank, and domeone who lived in the area, could
have had a lot of fun! actually it may still work.. havent checked it for many
a moon..
phoenix
66/80: atm's
Name: Ravage #19
Date: Tue Jan 30 10:57:19 1990
well the basic technology is available in any engineering library. the one
here at ut has several good books on them. a lot of them are connected by
secure dedicated land lines to the banks and s&l's. some of the newer ones
use a coding scheme based on the trap door algorithm which was broken by
the isreali's. but it takes a big machine a long time. nothing even
approaching real time.
67/80: btw: I never saw
Name: Grey Owl #10
Date: Tue Jan 30 17:48:03 1990
I never saw that episode of America's Most wanted, but that does sound cool.
It's scary to think that I have the same mind-set as one of the top-10
criminals in the US.
grey owl
68/80: Hey, does
Name: Alter Ego #110
Date: Tue Jan 30 19:03:09 1990
anyone have any idea on how to aquire an NUI?? Leave me e-mail... Thanx...
Alter Ego
69/80: call
Name: The Mentor #1
Date: Tue Jan 30 22:51:02 1990
Call telenet engineering and b.s. them out of it...
Mentor
70/80: Saudi
Name: The Parmaster #21
Date: Wed Jan 31 14:14:38 1990
Then there is the old Saudi citicorp system i connected to...
(same concept as pad to pad)
when it got it's little <ctrl-L>
it fed me :-)
it fed me good.
Every fucking card issued by citicorp to Saudi Arabia..
several different Multi-Bank authorizations reports acutally...
with ALL the detailing information.
all the damn thing wanted was a control-L
and to think...
I just did it to clear the fucking screen.
Later,
The ParMaster
<Jason>
71/80: heh
Name: The Mentor #1
Date: Wed Jan 31 16:28:56 1990
There are several systems that respond in a very positive manner to a
control-E.
Mentor
72/80: par
Name: Silencer #31
Date: Wed Jan 31 21:34:55 1990
you ever use at&t calling cards or the like? my grand mother recently recieved
a $7500+ phone bill from at&t. seems someone got her calling card....lots of
calls to saudi arabia.... i would kill to have her fucking phone bill....god
damn..but the bitch wont gimme it.
- me2
73/80: Stuff
Name: The Dictator #43
Date: Thu Feb 01 02:43:24 1990
Hahaha... Thats funny...AT&T calls to Saudi Arabia...ahem..I mean, my
condolences to your Grandmother..heehh
Par, Control-L huh? Damn...Kinda nice when live those in those little
"extras" huh? hehe..
Grey Owl : If you think about it...the best criminal minds in the country are
those guys who write those murder mystery shows. Now THATS some creative
stuff.
The Dictator
74/80: memories..
Name: Phoenix #17
Date: Thu Feb 01 10:09:02 1990
par.. remember that one which had the 7 digit limit..
ahh.. never even used the damn thing.. <sighs.
phoenix
75/80: X.29
Name: Mr. Slippery #72
Date: Fri Feb 02 23:41:20 1990
Someone about 25 posts ago asked about X.29. Its part of the X.25 protocol,
I think along with X.3 and some other numbers. X.25 is what Tymnet and
Telenet and the RBOC equivalents use as the protocol.
76/80: Ctrl-L?
Name: Phelix The Hack #89
Date: Mon Feb 05 11:31:08 1990
as in TRW?
pth
77/80: Pheenster...
Name: The Parmaster #21
Date: Mon Feb 05 20:08:58 1990
Yes i do remember that 7 dig bad boy...ah memories are forever someone
once said. also a Mister "f" i think (like the letter thats phucked on your
keyboard). and Phelix... ctrl-L on TRW? Well we'll have to talk about that
sometime.
Later,
(still <AMAZINGLY> Alive!!)
Par
Jason
.
78/80: ..
Name: Tak/Scan #44
Date: Mon Feb 05 23:21:29 1990
Well On some system "..." also activates a certain OP system.
so try ... or %%% or something like that. but always use ctrl characters when
nuth else works that usually activates it.
NO SYSTEM is100% Secure!
The 4th Dimension! 619-745-1xxx. Login PW-SPECTRUM. Newuser PW-Gunship.
79/80: SDS and Packet/74
Name: Sventek #137
Date: Tue Feb 06 07:32:44 1990
I ran into a SDS gateway type of sytem on TElenet. If anyone have any
correspondants to it other than TSS could ya post em. Allso if ya know any
other type of info on it post it as well.
I also ran into a Packet/74. Ctrl-M a few times and a message concerning port
00 being busy. As well as some other info like MHP 1232 swa etc. If anyone
can enlighten me on this system, please do so.... all ears.(eyes).
Sventek
80/80: hmm
Name: Phoenix #17
Date: Tue Feb 06 13:24:06 1990
the thing about people like us is that we never give up <hehe>
just when they thought it was safe to start usingcommon/no passwords again..
that mr "f"<key works now> has done some major developments in that area 8)
phoenix
______________________________________________________________________________
*** {BT Tymnet Packet Net Sub-Board} ***
< Q-scan Tymnet 7 - 49 msgs >
1/49: This Sub
Name: The Mentor #1
Date: Sun Jan 07 20:44:33 1990
This sub is for the discussion of British Telcom's Tymnet packet network.
Mentor
2/49: ...
Name: Erik Bloodaxe #2
Date: Tue Jan 09 14:29:25 1990
Hehe...I bet a lot of you didn't know that.
Um...things:
On many tymnet hosts, you can specify different routings, and different
sub-addresses by adding a number after the username.
IE: username:200 will connect to the host connected to that username at 200.
(if one exists) This is VERY cool on usernames that go into a subnet.
For instance, the Veteran's Administration has a subnetwork on Tymnet (Which
I should still be heavily entrenched, if anyone knows a few wounded Vietnam
vets who need extra money in the Disability check) and you can connect
to literally hundreds of different systems by specifying the nubmer after
the colon. Waycool, eh?
In the case that many of you are familiar with, adding the g and dnic after
the username, ala username:g2624, etc... That is telling tymnet to rout
the packet connections through whatever gateway needed to complete the call...
SO, when you call france through fradec, you get ftcc, when you call germany,
you get sf. Neat.
Also: the standard for tymnet "Nui's" is a t. followed by a username, incase
any of you want to hack away. I'm eventually going to scan ALL usernames
from a to 99999999 when I get around to writing the damn program. NUA scans
of Tymnet have been done, and a ver recent one should be floating around,
as Phoenix has just finished it. The problem I have with NUA's is that
I can only get to them from Canada! (Or other places) Which is a bitch,
since I need to figure out a way to do it from Tymnet. Anyone
know an nui on tymnet that will allow for connections back into 3106?
->ME
3/49: ok.. ill put my tymnet scan up here
Name: Phoenix #17
Date: Thu Jan 11 03:56:52 1990
but its not quite finished yet..
Phoenix
/e
4/49: anyone with a Scanner..
Name: Grey Owl #10
Date: Thu Jan 11 18:02:33 1990
Right now, I'm just a spare CPU. In other words, I can run a scanner for you
to help speed up scan. NUA's, Tymnet etc. is ok.
grey owl
5/49: tymnet to tymnet
Name: The Electron #32
Date: Mon Jan 15 06:30:33 1990
dunno about nui's but the only nuas hosts on tymnet can call on tymnet are 3106
and 31069 as far as i can tell....
and i guess nui's would be the same...btw tymnet is one of the few nets that
doesnt
send the calling address to the remote host (lets the pad software do it)
so u could probably patch stuff like psipad.exe to send a fake calling
address....
nice for hacking govt stuff i guess
6/49: Tymnet
Name: Gary Seven #38
Date: Mon Jan 15 11:06:32 1990
You have a way to reach 3106 DNIC's Erik. Hmm if ya could relay that
information to me someway via mail or post it. I have a NICE outdial from
Tymnet 300/1200/2400 + they convert. Say you call at 2400 and want to call a
300 baud system they convert the baud rates. If its still up that OD is NICE
it calls everywhere in the U.S i know not sure about GLOBAL possibility's
7/49: Well....
Name: Konica #47
Date: Mon Jan 15 16:43:29 1990
Instead of doing a :g2080 I made a mistake and did a ; instead. Now after I
did that what was it I might have gotten? I ot something that promted me with
a bunch of things.
8/49: Tymnet...
Name: Erik Bloodaxe #2
Date: Mon Jan 15 17:30:00 1990
You can reach 3106 addresses from Datapac...
You can also do it from most overseas networks,
and you can do it from Telenet, provided you have an NUI.
Notice, if you do 031069 it says not responding, but try it with
an NUI. Real big drag. It works. Telenet error messages are
terrible.
->ME
9/49: How do I get to dpac?
Name: Grey Owl #10
Date: Mon Jan 15 18:08:17 1990
Is there a dialup you can give me? (WATS maybe?!) I wonder if there's an
interface like there is for Autonet?
grey owl
10/49: DPAC
Name: Erik Bloodaxe #2
Date: Mon Jan 15 23:48:04 1990
In order for you to call 3106 addresses from DPAC, you will
have to call up one of the Canadian dialups...
I will have to dig around to find the DPAC information computer, so
you can get a listing of the damn dialups...there are no
WATS numbers for DPAC that you can reach from the USA.
->ME
11/49: and
Name: Phoenix #17
Date: Tue Jan 16 07:36:23 1990
when was last time anyone scanned the darn thing... mine is rom beginning 88,
3 digit scan all areas...
anyone got better/newer ?
phoenix
12/49: dpac info NUA
Name: Grey Owl #10
Date: Tue Jan 16 08:51:14 1990
There are two of them and I'll just post 'em here:
0302092100086
03020760101901
These have lots of dpac NUAs for thier outdials and some other stuff like
that. I can find a direct dialup myself. I was just asking to see if I could
save myself the trouble and get a WATS.
grey owl
13/49: DPAC
Name: Erik Bloodaxe #2
Date: Tue Jan 16 19:37:46 1990
My DPAC scan was finished last month...it ran from mid Sept. to December.
I haven't checked everything out yet, as the files are HUGE and my time
is limited. If anyone local wants to help, I'll give them a copy of the
printouts and they can check them out with me...(if you want)
That way, maybe it will get finished before NEXT September. Hehe
->ME
14/49: hmm
Name: Phoenix #17
Date: Thu Jan 18 02:03:48 1990
networks are getting bigger and bigger..
sigh
one o these days ill write something which reads nua list and calls them all...
just to make sure they all still work.
will make updating a hell o a lot quicker..
actually thats really stupid
Phoenix
<tired>
15/49: dpac dialups
Name: Silencer #31
Date: Thu Jan 18 06:07:14 1990
Well...I have quite an extensive list of dialups...I'll u/l it in some section
of the xfer....herez a few if thats all you need...
DATAPAC 3101 PUBLIC DIAL ACCESS NUMBERS
Y = ACCESS AVAILABLE
N = NO ACCESS AVAILABLE
ST CITY MODEM AC PHONE # 300B? 1200B? 2400B?
-- ---- ----- -- ------- ----- ------ ------
AB Airdrie 212 403 234-7440 Y Y N
AB Banff 212 403 762-5080 Y Y N
AB Calgary 212 403 264-9340 Y N N
AB Calgary 212 403 290-0213 N Y N
AB Calgary 224 403 265-8292 N N Y
AB Edmonton 212 403 420-0185 Y N N
AB Edmonton 212 403 423-4463 N Y N
AB Edmonton 224 403 429-4368 N N Y
AB Ft. McMurray 212 403 743-5207 N Y N
AB Ft. McMurray 212 403 791-2884 Y N N
AB Ft.Saskatchewan 212 403 421-0221 Y N N
AB Grand Prairie 224 403 538-2443 N N Y
AB Grande Prairie 212 403 539-0100 Y N N
AB Grande Prairie 212 403 539-6434 N Y N
AB Leduc 212 403 421-0250 Y Y N
AB Lethbridge 212 403 327-2004 N Y N
AB Lethbridge 212 403 329-8755 Y N N
AB Lethbridge 224 403 320-8822 N N Y
AB Lloydminster 212 403 875-4769 Y Y N
AB Lloydminster 224 403 875-6295 N N Y
AB Medicine Hat 212 403 526-6587 Y N N
AB Medicine Hat 212 403 529-5521 N Y N
AB Medicine Hat 224 403 528-2742 N N Y
AB Peace River 212 403 624-1621 Y Y N
AB Peace River 224 403 624-8082 N N Y
AB Red Deer 212 403 342-2208 N Y N
AB Red Deer 212 403 343-7200 Y N N
AB Red Deer 224 403 341-4074 N N Y
AB Sherwood Park 212 403 421-0268 Y Y N
AB St. Albert 212 403 421-0280 Y Y N
AB Stoney Plain 212 403 421-0236 Y Y N
therez the majority of the dialups for Alberta.
Anyone interested in lists of Telenet, Tymnet, Datapac, or LATA dialups...call
this info data line.
800-848-4480,
Host Name: CPS
User ID: 74,74
Password: Network
l8r on - SIlencer
16/49: Tymnet
Name: Sicilumm Thorne #28
Date: Fri Jan 19 15:46:53 1990
Does Tymnet have any InterActive chats like Altos or Hamburg?
Sic.
17/49: ??
Name: Silencer #31
Date: Fri Jan 19 18:11:52 1990
Altos OR Hamburg? Altos is located in the city Hamburg as far as I know...and
does Tymnet have any? Well.. that chat systems QSD and both altos's can be
reached from just about any network in the world... on tymnet there are
several ways of reaching them. I use trt...btw.. CAn someone tell me what
this is exactly? What is Trt?
- SIlencer
18/49: trt
Name: Grey Owl #10
Date: Fri Jan 19 19:17:42 1990
trt is a username. the :g part indicates that you want billing for the
following NUA to be sent to the username trt. And valid username will work
like that.
grey owl
19/49: trt
Name: Dark Sun #11
Date: Fri Jan 19 19:58:59 1990
Its also an x.25 net (check out the file on dnics in the file section)... I
guess when u use trt you're actually using a gateway to trt's facilities
(wherever they are)
DS
20/49: Well....
Name: Johnny Hicap #45
Date: Fri Jan 19 22:12:14 1990
Try doing trt; and you will get a menu of things....
What is this menu for?
21/49: trt menu
Name: Grey Owl #10
Date: Fri Jan 19 23:13:44 1990
it's for changing the parms of the gateway if you don't know the Tymnet
commands.
The only command I know for Tymnet is backspace...turns off echo. trt is a
username. The :g<DNIC>;<address> tells it to bill that call. trt is not the
name of a network.
grey owl
22/49: nononono
Name: Dark Sun #11
Date: Sat Jan 20 00:14:54 1990
the trt menu is the same as the fradec04 menu... It lets you select which port
you want to connect to (ie a pattern testing port)... Selecting port 90 is the
same as "c 0311611122222.90"... notice that port 99 is an exit command...makes
you wonder...
DS
23/49: Please sahre ...
Name: Wiz #25
Date: Sat Jan 20 06:36:56 1990
RE: Tymnet
I have a NICE outdial from
Tymnet 300/1200/2400 + they convert."
Gary - please sahre the NUA with us all so that I can use it - the PCP global
outdial that I have is only a 1200 BUAD outdial, so a 2400 one would be a
dream come true.
Thanks.
MPE Wiz
24/49: Tymnet outdial
Name: Sicilumm Thorne #28
Date: Sat Jan 20 17:49:16 1990
I've got an outdial service too. Its been working for three years,
believe it or not. And just recently moved up to 2400 (thank you). I'll
share the NUA, but not publicly. If I lost it, now THAT would suck.
Ciao.
25/49: TRT
Name: The Parmaster #21
Date: Sun Jan 21 10:12:52 1990
Well aside from all the explanations i've seen so far.
(in my opinion)
it is the username for the barbados (maybe it was bahametel. don't remember)
the username for their test diag s/w
i think it's a little option we can take to our advantage (the :g )
It seems to work on any username that connects specifically intl (as far as
i've seen)
thought maybe it meant "global" and then looked thru the DNIC HOST tables and
prompted you for the rest of the address after looking to see if it was
actualy in the tables.. there by bypassing the actual address it was supposed
to connect you to and allowing you to specify one.
But dunno.
(not sure about anything anymore the world is fucked up )
but peaceful
<for everyone but us..>
Later,
Par
Jason
26/49: what's the best way to scan Tymnet now?
Name: Grey Owl #10
Date: Sun Jan 21 11:29:39 1990
Since Telenet was shitty enough to ditch the connection between
Telenet/Tymnet, scanning Tymnet has been hell for me since I live in the US.
What other networks in the states are linked to Tymnet?
grey owl
27/49: As was said by someone earlier (maybe on this board)
Name: Dark Sun #11
Date: Sun Jan 21 20:55:11 1990
the :g tells the username to route the call thru any gateway it needs to to
get to its destination (hence, the g).
DS
28/49: Telenet/Tymnet
Name: Daneel Olivaw #9
Date: Sun Jan 21 22:30:43 1990
According to the techs at Telenet...
There is still a gateway between, but it is limited access...
Daneel oLivaw
/?
/h
/a
29/49: tymnet
Name: Ravage #19
Date: Sun Jan 21 23:51:30 1990
1-800-336-0149 for information. all i do is tell them what city i am
in and what the numbers are and they give them to me.
far as i know you dont need an account on any of the connected systems
to get this info.
30/49: ???
Name: Erik Bloodaxe #2
Date: Mon Jan 22 02:56:29 1990
What? You are saying that you can call the techs, give them an nua, and they
will give you the mnenmonic??? YOu must be talking about something else...god
I hope so, I can see them being that dumb...
Uh, scanning tymnet, if you won't do it nua-wise through DPAC, try doing all
the combinations, but on each 3rd time, type a username that does connect to
something so that the error count resets...like old lovable t.fradec02 or
something...
For you outdial hungry kids...I suggest you get a job and do this:
On tymnet, STARLINKINFO it will connect you to starlink's information service
so you can find out all you need to use this...It's tons better than
pc-persuit, cheaper, and more locations served...
not bad
->ME
31/49: xray
Name: Phelix The Hack #89
Date: Mon Jan 22 23:50:36 1990
umm...anyone have any notes to compare on xray (hint hint erik?) I have found
quite a few VERY interesting "things" (for lack of a better non-descript
word), and any additional help on PDP-10 /ISIS would be helpful as it gets
real old learnig from online help mans...
pth
32/49: ummm
Name: The Mentor #1
Date: Tue Jan 23 01:08:41 1990
What do you want to do on the PDP? I'm sure I've got my old manuals
someplace...
Mentor
33/49: tymnet...
Name: Ravage #19
Date: Tue Jan 23 13:31:49 1990
no that will just get you the local number to call for access. the rest
is up to you. i read the intro.
isis was also used by intel on the intel mdl 800 development system
so give them a call and get some manuals on it.
we have a bunch of manuals for the pdp 11's, but more are appreciated
what will eventually happen in the next year or so is this, we will
expand to six phone lines, use novel net to network the 3 pdp's and
about 40 other machines with an i-net node and a compuserve feed
(it is great being non-profit). this will give us at least 600M
disk space, 2 9 trk for offline stores, and two different international
feeds out of the network at local cost.
34/49: XRAY
Name: Erik Bloodaxe #2
Date: Tue Jan 23 23:04:18 1990
Arg...I will send you the whole xray manual if you want...
There is an option to attach to a node and print ascii dataflow...although I
can't get it to work right, (but I haven't dicked with it seriously at all)
This is good to learn, as I have XRAY access on a ton of TYMNET subnets! Even
a bank or two...hehe.
Also, if anyone can get me a TMCS or PROBE or NETVAL manual, or can find
somewhere where I can get it online...(I know that trw has tem online
somewhere) I would REALLY appreciate it!
->ME
35/49: everyting
Name: Phelix The Hack #89
Date: Wed Jan 24 12:22:05 1990
Mentor: ok..on a PDP-10..running RSTS/TOPS...each sub directory is treated as
a "user" of the system; regardless of whether or not that is the case. I can
list out these directories (FILES/DIR) IF and only IF I know the name of the
directory...how can I get a master "root" listing of ALL avaialble
directories? As of right now, I have to keep scrounging around until I find a
new one (new to me) mentioned in mail or in I/O...
EB: yeah..send me everything you have on xray..about the node option are you
doing it by ex: loginid:XXX..where xxx is the particualr node in
question?...that is the only way that I know of specifing..as far as
ASCII..hell, just buffer it in Hex and run it thruogh a connvertor ...
pth
36/49: "trt:g"
Name: Sicilumm Thorne #28
Date: Wed Jan 24 13:19:04 1990
As most of you know by now, Barbados is now off the network.
And the fradecal systems aren't too hot. They can do some of 2080
(france) and some of Germany (2624).
37/49: they can do almost anything
Name: Dark Sun #11
Date: Wed Jan 24 16:01:39 1990
the fradec's can do almost anything but telenet by using the :gDNIC parameter
DS
38/49: f
Name: Dtmf #27
Date: Thu Jan 25 03:31:23 1990
RE: ??
you ask what is trt? Well, trt is dead is what it is..Shit...Anyone know
about the username 'dte' on Tymnet?
DTMF
39/49: trt
Name: Dark Sun #11
Date: Thu Jan 25 15:31:37 1990
was up and down irregularly and now it IS gone... use the :g parameter with
the 2 other usernames you know (they are common knowledge, but i wont post 'em
here due to mentors ``rules''
DS
40/49: two things
Name: Sicilumm Thorne #28
Date: Thu Jan 25 20:39:41 1990
Someone was mentioning things they found on Tymnet.
Here's no login's with no passwords:
pcinet
alascom
And of course, some public information is:
dpac; 3020xxxxxxxxxx
It will do some other DNICs.
I have some other stuff, but I'm not too sure where I put it. <That's
safe.>
Sic.
41/49: dpac; 3020xxxxxxxx
Name: Dark Sun #11
Date: Thu Jan 25 22:03:18 1990
that will only work on non-refused-collect pads......
DS
42/49: hmm
Name: Silencer #31
Date: Thu Jan 25 23:49:37 1990
cna is also an acct....needs a pass though..
I find it hard to believe that since trt died ALMOST EVERYONE has stopped
calling the chat lines (other than QSD)..god...what a bunch of incometent
fools... shit. I'm sure ANYONE can use fucking Pac*it plus...right?!?!
.s
43/49: Or.
Name: Sicilumm Thorne #28
Date: Fri Jan 26 08:12:58 1990
Yes, since "trt" died everyone is gone. A lot of those people were "MDA"
(some Phreak groupie band in trhe midwest).
I was online for two minutes last night, thanks to whoever informed me
that the "fradical" accounts could still do it, even if they were barred from
DNIC's, by doing the following [in case you missed it]:
fradical:gDNIC;password
Of course fradical is merely a made up name and has nothing to do with
real life, or my dreams. And DNIC is, of course, a number, and password,
silly, that's not real either, but it sure would make life easier.
Sic.
44/49: Outdial
Name: Sicilumm Thorne #28
Date: Fri Jan 26 11:23:47 1990
Curiousity.
Can an outdial dialup DNIC's? Like normally, or for instance this is how
I call Phoenix Project:
please log in: dialout:1306;password
^^^^\
Tymnet Dialout Port
(I use 1306 because that way Phoenix is not a long distance call, wah la).
Now, if I were to do something like:
dialout:g2342;password
would that do anything for me. Is there a text file that explains all
the Tymnet little keyword/keycharacters?
Sic.
45/49: yes
Name: Silencer #31
Date: Mon Jan 29 20:30:31 1990
yeah...you can type "information" from tymnet logon...it might be of use...
also... the acct:gdnic method wont work for USA dnic's for some reason..i
dunno why... it connects THROUGH USA gateways though....hmmm
46/49: :g for USA dnics
Name: Dark Sun #11
Date: Tue Jan 30 11:20:25 1990
There is some kinda "regulated" gateway between tymnet/telenet (and may be for
the other nets like TRT)... I guess the only way to connect to one of those
NUAs is to go thru that specific gateway...
DS
47/49: arg...
Name: Erik Bloodaxe #2
Date: Mon Feb 05 00:57:33 1990
i was just wondering...
has anyone ever been able to get ftcc to do anything?
ftcc:gdnic; gives you the ; back like a gateway, but always connects you to
FTCC MACS
which I was never able to evoke ANYTHING from...real fucking annoying.
->ME
48/49: if anyone's interested..
Name: Grey Owl #10
Date: Mon Feb 05 16:50:24 1990
the usernames 'sched' and 'dbsched' work on Tymnet. I've not gotten passwords
yet though.
grey owl
49/49: j
Name: Dtmf #27
Date: Tue Feb 06 19:54:52 1990
[CThe only thing I have been able to come up with ?on the MACS is that if you
hit ctrl-e then it will say FTCC MACS again...It almost looks like an editor
(Like EMACS)
< Tymnet Q-Scan Done >
______________________________________________________________________________
Copyright (C) 1993 LOD Communications. No part of this Work may be
distributed or reproduced, electronically or otherwise, in part or in
whole, without express written permission from LOD Communications
______________________________________________________________________________
*** {End of Phoenix Project BBS Message Base File 2 of 3} ***