💾 Archived View for spam.works › mirrors › textfiles › messages › phoenix2.msg captured on 2023-06-16 at 19:12:15.

View Raw

More Information

-=-=-=-=-=-=-

                      ASCII download  1-Aug-1997 12:41p
???????????????????????????????????????????????????????????????????????????????




              *** {Phoenix Project BBS Message Base File 2 of 3} ***

 ______________________________________________________________________________



     Copyright (C) 1993  LOD Communications.  No part of this  Work may be

     distributed or reproduced, electronically or otherwise, in part or in

     whole, without  express written  permission  from  LOD Communications

 ______________________________________________________________________________



                         *** {General Sub-Board} ***





< Q-scan General Discussion 1 - 132 msgs >

1/132: This Sub

> Permanent Message

Name: The Mentor #1

Date: Sun Jan 07 05:09:24 1990

This subboard is for general b.s. - you can talk about anything from who just 

got busted to sports to the headlines. This is also the proper place to plug 

other BBSes. Anything even mildly technical probably has its own subboard. You 

can get a list of subs by typing "*" and you can change subs at the main 

prompt by simply typing the number of the subboard you wish to go to.

Mentor



2/132: Welcome Back

Name: The Mentor #1

Date: Tue Jan 09 13:05:05 1990

Welcome back to Phoenix! Not everything is back together -- the transfer 

section, in particular, still needs some work. But I've started contacting our 

former users, and hope to have things back up to the normal speed by 

mid-February. 

Please advertise! Let everyone know that we're back!

The Mentor

Legion of Doom!



3/132: ...

Name: Erik Bloodaxe #2

Date: Tue Jan 09 13:47:47 1990

MAN...Ok, first off, everyone try REAL hard to get their messages

right the first time...the edit commands are terrible...

NOW:  I heard that Continental airlines has some kind of Super-super saver

fare in which you can fly one way anywhere for 9 bucks...Amazing?  Yeah

I thought so...so if that's the real story, there is no excuse for you

people who have said time and time again that you'd like to go to TX

to not actually come...(Ahem...DAN!).

So, in any event, welcome to the bbs...I'm damn glad it's local!

->ME

.s



4/132: One way to Houston...

Name: Daneel Olivaw #9

Date: Tue Jan 09 18:18:20 1990

what a trip!

$9 to Houston, $19 to Dallas I think.. not bad

Daneel

(Get it right the first time Erik)



5/132: airplanes

Name: Silencer #31

Date: Sat Jan 13 02:16:40 1990

Really?  where'd you here that?  A comercial or what...if its true it looks 

like I'm headed towards LA next week....heheh......Also..one big greet to 

everyone new and old.....

    - Silencer/ DFKN



6/132: Well...

Name: Erik Bloodaxe #2

Date: Sat Jan 13 10:02:07 1990

I was kind of wrong...

I read the ocntinental ad in the paper yesterday...

It seems that this is some kind of Texas thing, 

you can fly all over texas, and to OK City, and to New Orleans

for no more then $38 one way...I might go to New Orleans...

Hell for $38...I spend more than that on beer every night it seems...

->ME



7/132: Morris update

Name: Phiber Cut #34

Date: Sat Jan 13 12:54:00 1990

AM-HackersTrial     01-11 0370

^AM-Hackers Trial,0381<

Hackers Charged with Selling Computer Codes to Soviets on Trial<

                CELLE, West Germany (AP) _ Three West Germans ``hackers'' went

on trial Thursday charged with selling Western military computer

passwords and codes to the Soviets.

                Dirk Brzesinski, Peter Carl and Markus Hess were arrested last

March after an investigation by U.S. and West German officials

revealed they had obtained information giving them access to key

military and research computers in the United States, Western

Europe and Japan.

                A fourth man, 30-year-old Karl Koch, who was also arrested in

the case, committed suicide in May.

                Brzesinski, 30, a computer specialist, told the court that Koch

had come up with the idea of selling the information.

                ``We decided in 1986 to sell the information to the Soviets for

1 million marks ($605,000) to help them even out the technical

know-how advantage of the West,'' Brzesinski said.

                Carl, 35, said he was responsible for contacting the Soviet

trade mission in East Berlin, where he dealt with a contact

identified only as ``Serge.''

                Carl said he did not want to reveal anything more about the

Soviets in court for fear of reprisals.

                Court records show Carl made at least 25 contacts with the

Soviets and received a total of 90,000 marks ($54,500) for the

information.

                According to Brzesinski, Koch before his death claimed he had

managed to gain access to the U.S. Defense Department general

databank known as Optimus.

                After the arrests last year, U.S. and West German news media

reported that other computers the hackers entered included a NASA

and a ``Star Wars'' research computer, as well as computers linked

to nuclear weapons and energy research in Los Alamos, N.M., and the

Fermi Laboratory in Illinois.

                However, U.S. officials said last year that although the

hackers

obtained sensitive codes and passwords to enter the computers, they

were stopped short of obtaining any highly classified information.

                Investigators have said that codes and passwords from computers

in Japan, Britain, France, Italy, Switzerland and West Germany were

also obtained and sold to the Soviets.

                A verdict in the trial, scheduled to be completed in 12

sessions, is expected Feb. 8. The men face up to 15 years in prison

each if convicted.

                AP-NR-01-11-90 2317EST<



8/132: Morris update

Name: Phiber Cut #34

Date: Sat Jan 13 12:56:35 1990

AM-ComputerWorm     01-11 0504

AM-Computer Worm,0518<

Berkeley Programmer Says Worm Hid Itself From Victims<

By WILLIAM KATES=

Associated Press Writer=

           SYRACUSE, N.Y. (AP) _ The ``worm'' program that paralyzed a

nationwide computer network in November 1988 was designed so its

victims wouldn't know how they were being attacked, a computer

expert testified Thursday.

           Robert T. Morris' rogue program used several methods to worm its

way into the Internet network, said Keith Bostic, a program analyst

at the University of California at Berkeley.

           ``It was designed to break into as many computer systems as

quickly as possible and escape detection as it was doing so,''

Bostic said on the second day of testimony in Morris' computer

tampering trial in U.S. District Court.

           Morris, 25, of Arnold, Md., is charged under the 1986 Computer

Fraud and Abuse Act with ``hacking'' into a federal computer

network. If convicted, he faces as many as five years in prison and

a $250,000 fine.

           Prosecutors allege he devised and unleashed a program that

replicated wildly, immobilizing an estimated 6,000 computers linked

to Internet, including those at NASA and several Air Force

installations and universities.

           Defense attorney Thomas Guidoboni has said that Morris created

the worm as a computer security experiment, but that he made a

programming mistake that let the worm go berserk.

           Guidoboni said during opening statements that once Morris

learned of the problems his program was causing, he tried to stop

it, and when that failed, he tried to alert network users.

           But Bostic testified that no one in Berkeley's computer science

research group received any warning about the worm from Morris.

           Four top computer programmers worked 16 hours to crack the

worm's defenses, he said.

           According to Bostic, the worm entered the school's computer

system by using two defects in the software used by the system and

by solving passwords, either through a list built into the worm or

by checking possible guesses against the computer's own internal

dictionary.

           The worm also took advantage of the computers' ``trust'' for one

another on the same system, a process by which a second computer

will allow access to the system after seeing that an account

already has been authorized by another computer on that system,

Bostic said.

           The rogue program hid itself in four ways, he told jurors.

           It traveled via binary code, rather than a more easily read

source code, and those parts of the program that could be read by a

literate user were encrypted to further mask what the worm was

doing, Bostic said.

           Morris' program also was set up so that it provided phony

identification names when Berkeley's scientists were trying to

trace it. The worm created more deception by periodically changing

the program identification number attached to it by the Berkeley

computer system, he testified.

           Bostic said the ``quick and powerful attack'' by the worm left

no computer on the university system untouched.

           ``It would break into as many machines as it could, even

machines it could not run on. It was completely indiscriminate,''

Bostic said.

           AP-NR-01-11-90 2112EST<



9/132: Morris

Name: The Mentor #1

Date: Sat Jan 13 15:19:46 1990

So, how many of you think Morris will go to jail over this?  How many think 

he'll get anything but community service?

Mentor



10/132: Another update.... the case continues....

Name: Phiber Cut #34

Date: Sun Jan 14 08:06:59 1990

        SYRACUSE, N.Y. (UPI) -- A graduate student said Friday it was

``pretty amazing'' to watch classmate Robert Morris break into a

computer at the Massachusetts Institute of Technology with a program

that could land the computer whiz in jail.

        Dawson Dean III testified that five days before Morris allegedly

unleashed a destructive program called a ``worm,'' he showed Dean he

could enter an MIT computer without the machine acknowledging the

intrusion.

        ``The machine didn't know that he was logged in,'' said Dean, an

MIT graduate and doctoral candidate at Cornell Univesity. ``It was

pretty amazing.''

        Morris, 25, of Arnold, Md., is the first person to be prosecuted

under a portion of the 1986 Computer Fraud and Abuse Act.

        He was indicted in July on a charge of causing financial loss by

intentionally introducing a program into a military and research

computer network without authorization. If convicted, he faces up to

five years in prison and a $250,000 fine.

        Dean said the incident on Oct. 28, 1988, was preceeded by Morris

allowing him to look over his shoulder at a computer terminal on

Cornell's Ithaca, N.Y., campus and scan a list of more than 400

passwords Morris had discovered. The passwords had been translated from

an ``encrypted,'' or coded, form into English.

        ``There are 4,096 ways to encrypt a given password,'' Dean said.

``He said he had done it basically to see if it was possible to do.''

        Dean said Morris gave him the ``impression'' a computer at Cornell

spent four days running a program the defendant had designed to find the

true spelling of the encrypted passwords.

        ``I asked him, `Is mine in the list?''' Dean said. ``I also asked

him if the password of this other really obnoxious graduate student was

(listed).''

        Dean confirmed for Justice Department trial lawyer Ellen Meltzer

the list he read that night was similar to one investigators found in

computer files Morris maintained at Cornell.

        Dean testified Morris told him he would pursue a doctorate and

career in computer languages and, although he already had extensive

experience in computer security, did not plan to write his thesis on

security issues.

        ``He told me he had hacked around with computers before,'' Dean

said.

        Under cross examination from defense attorney David O'Brien, Dean

said he thought the suspect's efforts to break computer security systems

was the result of an inquisitive mind.

        ``He was a graduate student of computer science. You're learning to

do research. It's a real natural instinct to want to learn how the thing

works,'' Dean said.

        Earlier, William Johnston, a computer systems manager at the

Lawrence Berkely Laboratory in California, said the worm did not at any

time endanger cancer patients at the research center, but cost the lab

in excess of $10,000 to purge the system.

        Morris was a 1988 Harvard University graduate attending his first

semester of graduate school when, prosecuters argue, his program

replicated out of control Nov. 2, 1988, and froze about 6,000 computers

linked to the major military and research computer networks Internet and

Arpanet.

        A Cornell investigation found Morris, who has been suspended from

the university until September, worked alone on the program, which it

termed a ``juvenile act that ignored the clear potential consequences.''



11/132: The question is...

Name: Daneel Olivaw #9

Date: Sun Jan 14 19:19:12 1990

how many think he should go to jail... and for how long?

Daneel



12/132: long enough

Name: Grey Owl #10

Date: Sun Jan 14 21:38:38 1990

I think people who write viruses shouldn't be allowed to go free.  This is a 

personal opinion, but mistakes do happen as you saw with that internet virus.  

I know that I would be highly pissed if the net went down under me.

grey owl

13/132: well...

Name: The Mentor #1

Date: Mon Jan 15 01:31:30 1990

I dunno, I think he'll get hit with about 750 hours of community service and 

maybe a hefty fine ($100,000 or so...)  I doubt he'll do any time.

Mentor



14/132: well

Name: Phoenix #17

Date: Mon Jan 15 02:15:43 1990

Umm.. i dont disagree with the theory o viruses... what i do disagree wit is 

viruses which destroy systems. I a virus has a speciic task.. <eg - get root 

on unix> then by all means... go or it...but viruses which are deigned to 

destroy.. well.. only in the most dire o circumstances.. and even then..

Phoenix

<The Flatline>

Jacking Out..



15/132: Well...

Name: Konica #47

Date: Mon Jan 15 15:57:50 1990

I know a guy that writes viruses all day on anyhing he possibly can to destroy 

a system. So when I get into anything I never trust him with anything.

.s

/e



16/132: Yeah...

Name: Erik Bloodaxe #2

Date: Mon Jan 15 17:23:21 1990

Poor Mr. Morris...rough having to live under Dad's shadow...

hell, if the damn thing would have just worm-ed around like he had

wanted...it would have been beautiful.  Unfortunately, it had a minor

flaw and caused the problems it did.  What exactly did it overwrite?  

Portions of sendmail or something?  I don't remember.

Yo:  Loyd, maybe you or I should type up that Communications & the ACM

article on the whole episode.  I thought it was really

cool, and a lot of people on here probably haven't ever

read it.

->ME



17/132: hmm..

Name: Phoenix #17

Date: Mon Jan 15 17:48:44 1990

did morris ind the bug in sendmail himsel, or did he read it somewhere...

and has anyone ever tried using that bug <i would assume it would be dead... 

but there is always the ancient system whichhasnt been upgraded since time 

began..>



18/132: right

Name: Grey Owl #10

Date: Mon Jan 15 18:01:53 1990

I don't like viruses at all...just because of those unlikely mishaps that 

happened with the internet worm.  It's just too risky.  Either that or Morris 

wasn't careful enough.  

grey owl



19/132: worm

Name: The Mentor #1

Date: Mon Jan 15 21:32:44 1990

Well, it wasn't the overwriting that caused a problem. He put a mechanism in 

it that "queried" a target system - if the worm was already installed, it 

would ignore the system. But he decided that this would be an easy way to 

defeat it, so set the thing to go ahead and re-install on about 1 in 1000 

systems. He figured this would hit a couple a day - it turned out that it 

could be several hundred per hour. This clogged up the internet lines and 

slowed things down massively. (Yes, there were other symptoms - but this is 

the most obvious.)  

There are a couple of people on here who are testifying at that trial. We'll 

have to ask them for a summary once they're done.  (Yes, I know they can't 

talk about it until it's over.)

Mentor



20/132: transfer section!

Name: The Mentor #1

Date: Mon Jan 15 22:27:44 1990

Ok, I've gotten a bunch of stuff uploaded to the transfer section. If anyone 

has issues #1-21 of Phrack already broken up into separate files (anyone who 

was on the original Phoenix may have d/l'ed them from here, even), please 

upload them. I don't want to go through the hassle of splitting them up again.

When you are uploading files, unless you are in a specific computer section 

(i.e. Apple, IBM, etc.), please use a standard ARC program (not ZIP or PAK or 

LZH!). This way, most people can download them.

I'll try to have the gfiles up within a week - but they're a significant pain 

in the butt.

Mentor



21/132: ...

Name: Tak/Scan #44

Date: Mon Jan 15 22:40:45 1990

Yeah great. 

L{ts keep the UPLOADS{Coming in.i]

Darn Line Noise. hehehe



Tak/Scan

Sysopf Of the Fourth Dimension

The 4th Dimension! 619-745-1xxx. Login PW-SPECTRUM. Newuser PW-Gunship.



22/132: Worm, et al.

Name: Phiber Cut #34

Date: Tue Jan 16 06:54:56 1990

For those of you who are on the internet, read comp.docs and get rfc1135.  This

is yet another article on the worm.  It summarizes/reviews all previously

written worm articles (i.e., Eugene Spaffords, etc.), explains in lay

terms what actually happened (how the sendmail and fingerd holes worked

and were exploited).  It also has a very complete and very lengthy

bibliography for anyon e interested in reading up on the worm.



23/132: Bug

Name: Phase Jitter #3

Date: Tue Jan 16 09:42:12 1990

  The sendmail bug, I'm quite sure, was just the sendmail -bs WIZ bug..

That's been around forever!



24/132: phracks...

Name: Dark Sun #11

Date: Tue Jan 16 13:29:27 1990

Sure.... I'll upload 'em tonite.

                                 DS



25/132: sendmail bug

Name: Phiber Cut #34

Date: Wed Jan 17 19:58:46 1990

Phase... if you're talking about the sendmail bug "that

been around forwever", I assume you're talking about the

hole in the bsd versions 2 and 4 sendmail.  Actually, it's 

not really a hole.  Basically, it reads in 256 (?) bytes for

and address.  However, if you send 256 bytes of garbage, any

other information flows over into the receiveing system (like   

worm source instructions, etc).



26/132: well

Name: Phoenix #17

Date: Thu Jan 18 01:54:17 1990

and does it still work ?



27/132: phracks

Name: Silencer #31

Date: Thu Jan 18 05:26:55 1990

Well...if you want em....and no one gets em....I think most of that stuff 

(including the LOD tech journals and all that kinda stuff) can be found on 

Atlantis. am having trouble d/ling from there or I;d get em for ya.



28/132: Sorry for delaying...

Name: Dark Sun #11

Date: Thu Jan 18 12:29:23 1990

I'll post 'em (Mentor gave 'em to me about 1 year ago)... I was just waiting 

to know how he wants 'em uploaded.

BTW, Mentor, Someone fixed phrack 9 so, that wont be corrupted, but 2 issues 

ARE still missing.

                             DS



29/132: .....

Name: Tak/Scan #44

Date: Fri Jan 19 20:51:12 1990

ATTN-

NAME- The Fourth Dimension Underground

Number- 619-745-1xxx

Login: SPECTRUM

NEW USER PW: GUNSHIP

90 Megz!

100% Amiga FILES!

Brand NEW BBS! growing fast alot of Expert conversations \\on the hour!

Call now..



Tak/Scan

TFD/PPP!



30/132: Arc

Name: Johnny Hicap #45

Date: Fri Jan 19 21:56:04 1990

Does anyone have a Commodore 64 arc program? If so, can you upload it for 

me....



31/132: phrack...

Name: The Mentor #1

Date: Sat Jan 20 02:58:54 1990

Welp, Phrack magazine is dead. Those of you who pay attention to BITNET know 

that the phrack accounts at U of M have been shut down. The story is as 

follows...

Government agents (not sure of the dept., probably SS) have apparently been 

monitoring the e-mail of the Phrack kids (Knight Lightning & Taran King) for 

some time now. Apparently, a portion of a file sent to them (and subsequently 

published) contained copyrighted information. This is all they needed. They 

have now seized the entire Phrack net mailing list (over 500 accounts), plust 

every piece of information that Randy & Craig have (and they have a *LOT*) on 

real names, addresses and phone numbers.

This is evolving directly out of the busts of three LOD members (Urvile, 

Leftist & Prophet). The Prophet (who is on probation) is apparently being 

threatened with a prison term if he doesn't cooperate. We don't know for sure 

if he cooperated or not, but what would you do in the same position?

The same officials are apparently *VERY* interested in our co-sys, Mr. 

Bloodaxe. His net account is being watched, etc. I'll let him tell the story.

Anyone wishing to communicate with Erik or myself should do so through the 

board only. I will be adding a secure (and I mean fucking secure) encryption 

routine into the e-mail in the next 2 weeks - I haven't decided exactly how to 

implement it, but it'll let two people exchange mail encrypted by a password 

only known to the two of them. Hmmmm... carry this conversation to the 

programming board.

Anyway, I do not think I am due to be busted, but then again, I don't do 

anything but run a board. Still, there is that possibility. I assume that my 

lines are all tapped until proven otherwise.

There is some question to the wisdom of leaving the board up at all, but I hae 

(have) personally phoned several government investigators and invited them to 

join us here on the board. If I begin to feel that the board is putting me in 

any kind of danger, I'll pull it down with no notice - I hope everyone 

understands.

It looks like it's sweeps-time again for the feds. Let's hope all of us are 

still around in 6 months to talk about it.

The Mentor

Legion of Doom!



32/132: hmm

Name: Phoenix #17

Date: Sat Jan 20 07:50:12 1990

this is getting truly annoying..

Phoenix

33/132: Phrack, etc...

Name: Phiber Cut #34

Date: Sat Jan 20 09:30:10 1990

RE: phrack...

I sounds to me as though the "SS" was really reaching.  I mean, to get

them on "copyright" violations is sort of like that had such a hard on

for the phracboys it was as though they went after gangsters with

income tax evasion!

What is the legality of them spreading all of this information that they

have obtained throughout the world?  I mean, if they got names, etc..,

isn't that private information?  Do they or wl they publish all of it

to the maniacsout there?



34/132: More news....

Name: Phiber Cut #34

Date: Sat Jan 20 09:41:23 1990

AM-MilitaryHackers     01-18 0693

M-Military Hackers,0716<

Break-In Shows Military Computer Vulnerable _ Prosecutor<

           SAN JOSE, Calif. (AP) _ Three Silicon Valley computer workers

have been charged with breaking into government and telephone

company computers in a case that prosecutors said Thursday

demonstrates the vulnerability of those systems.

           The three are accused of committing what may be the first

electronic invasion of a military computer network, according to

one expert. A federal indictment charges them with obtaining flight

orders for a military training exercise, of eavesdropping on

private telephone conversations and getting FBI information on

associates of the late Philippine president Ferdinand Marcos.

           The case ``does signal a vulnerability'' in the Pentagon's

computers, U.S. Attorney Joseph Russoniello said Thursday at a news

conference in San Francisco.

           The indictment, unsealed Wednesday in U.S. District Court in San

Jose, is one of the first in the nation to use federal criminal

statutes directed at computer crime, said assistant U.S. Attorney

Robert K. Crowe in a news release.

           The charges, Crowe said, reveal ``the extreme vulnerability of

the phone network.''

           Charged were Kevin L. Poulsen, 24, a former employee of SRI

International, a Menlo Park computer consulting company; Mark K.

Lottor, 25, a current SRI employee; and Robert E. Gilligan, 31, who

worked for computer-maker Sun Microsystems.

           ``Poulsen could do whatever he wanted to do with the telephone

system as well as with government computers,'' Crowe said Wednesday.

           The three are charged with 19 counts of conspiracy; computer

fraud; fraud involving computer access devices; using fictitious

names or addresses; possession of electronic wiretapping devices;

falsely repesenting a social security number; interception of

electronic communications; embezzlement and theft of public

property.

           Poulsen is named in 17 counts involving all of the offenses;

Lottor is named in five counts and Gilligan named in seven counts.

           If convicted, Lottor and Gilligan face 20 years in prison and

fines of $30,000. Poulsen could be sentenced to 37 years in prison

and a $50,000 fine.

           According to the indictment, Poulsen used common burglary tools

including surgical gloves, powdered graphite and lock picks, and

forged a Pacific Bell employee card to steal the telecommunications

equipment and access codes from the regional phone company's

offices.

           Gilligan and Poulsen are accused of trafficking in codes that

allow access to government computers through electronic mail.

           The pair got access to the Army's Masnet Computer Network, the

indictment said without detailing uses of the computer.

           In late 1987 and early 1988, Poulsen got air tasking orders for

a military exercise at Fort Bragg, N.C., called CPX Caber Dragon,

the indictment said. The information, secret at the time, has been

declassified because the event has already taken place, Russoniello

said.

           The Marcos information was a computer list of phone numbers and

cable assignments of Marcos and others that related to an FBI

investigation, the indictment said.

           Peter G. Neumann, a computer security expert at SRI, said this

was the first case he knew in which classified information was

allegedly obtained by computer break-ins.

           The indictment accuses Poulsen of using his computer knowledge

to obstruct the investigation into his alleged activities.

           Gilligan and Lottor were expected to surrender voluntarily.

Poulsen, who called federal authorities but manipulated the

computer so the call couldn't be traced, remained at large.

           Poulsen quit SRI in 1988 and took a job at Sun but later moved

back to Los Angeles to live with his parents, said Donn Parker,

security expert and senior management consultant with SRI.

           Poulsen was hired by SRI despite company officials' belief he

once broke into a computer at the University of California, Los

Angeles, Parker said.

           ``The people who hired him did know he had some hacker

experience in his background, but he was a very bright guy,''

Parker said. They considered the earlier incident youthful excess,

he said.

           The indictment doesn't indicate what authorities believe the men

intended to do with the military secrets, but Parker said Poulsen

told him several years ago that his youthful exploits were

motivated by curiosity.

           ``I knew him as a typical young hacker. At least in past

conversations he told me he was motivated by curiosity and the

challenge to get into systems,'' Parker said.

           AP-NR-01-18-90 1936EST<

 



35/132: Phrack and Pac*Hell

Name: Ripper #51

Date: Sat Jan 20 21:05:55 1990

Well-

 

A copyright infringment isn't all that major that the SS would bust them for 

just that.  I'm willing to bet they intercepted something bigger than a simple 

copyright piracy case.  Although they would be interested since the 

information is being transported accross state (and quite likly) national 

boundries.

About the San Jose case, sounds like they just got access to the TAN 

(Technical Access Network), and went from there.  Along with their other 

antics, they'll prob get a prison term, because they are really strict on the 

wiretap bit.  I don't get the part about the false names and addresses.  The 

courts have said in the past, you can just pick a name out of the blue and use 

it, and you can give any kind of information (like a false address or phone 

number for instance) as long as the documentation is not for an official 

purpose and is not intended to defraud someone.

I noticed Peter Neumann in there, he's a guy to listen to, and many of you 

might reconize him from the Risks forum on the net.  He is one of the few 

public figures involved in computers that knows which way is up.

Recap-

Phrack will most likly get a slap on the wrist, but will have a sober look at 

the world, and won't be inclinded to be as high profile as they were.

The San Jose case, I'm betting it'll turn high profile, and there will be alot 

of pressure for a nice long lock up.

Most of this is based on my dealings with local, state, and federal law, as 

well as experience I gain while working for the County of San Diego.

.



36/132: phrack

Name: Dark Sun #11

Date: Sat Jan 20 21:36:56 1990

I would think they knew of dealings between phrack & hackers/phreakers, but 

they had to have some real evidence in order to get in, once they did, they 

found much info that would make for a good prosecution... As any hacker knows, 

its the little things that matter

                             DS



37/132: The Bottom line.

Name: The Parmaster #21

Date: Sun Jan 21 10:05:38 1990

    The bottom line is..a crackdown.

We can now expect a crackdown because of the shit wiht the virus,the boys in 

cali,and the phrack kids....

The phrack boys were just the start, i'm sure of it..

I just hope that i can pull through this one..and that my friends can also.

This is the time to watch yourself...

No matter what you are into.. whether it's just codes,cards,etc...

Apparently the government has seen the last straw in their point of view.

Unfortunately with all of this in the news now, they will be able to get more 

government money to combat hackers.

And thats BAD fucking news for us.

I think they are going after all the "teachers" etc/.. people who educate 

others into this sort of thing..

(which i didn't need to say because it's obvious after what happened to randy 

& craig)

i wonder if they think that maybe these remote cases are linked in any way..

The only way they can probably see is that we are hackers..

And so that is where their energies will be put..

To stop ALL hackers..and stop people BEFORE they can becomea threat..

After they wipe out the educators taht is.

Just a theory.

Par,

Jason



38/132: Phrack

Name: Phiber Cut #34

Date: Sun Jan 21 13:09:20 1990

It's a scarry thought... - How did the intercept the information?? -

An informatn, ok, that's legal.... but how private is electronic mail?

Per haps we need a sub board to discuss some of these LEGAL issues...



39/132: ripper

Name: The Mentor #1

Date: Sun Jan 21 17:12:22 1990

Well, I know TK & KL pretty well, and they've been paranoid about doing 


was the only excuse that they could come up with...

Mentor



40/132: Well,

Name: Warf #81

Date: Sun Jan 21 21:47:05 1990

    I have somewone that is saying that he's gona' turn me into the pigs.  IF 

something happends to me then don't worry.  I'm gona' lay low for a while 

about a week or so.. so just dont' worry, BUT if something does start to 

involve you's then don't worry,, it won't.. heheh!

                                   <=[Warf]=>



41/132: Phrack

Name: The Dictator #43

Date: Mon Jan 22 01:19:32 1990

Im not sure what to make out of the Phrack.  I think the SS, FBI, and whoever 

has been waiting to bust them so long on ANYTHING that they waiting untill TK 

KL crossed the line in any way.  I mean, hell..TK and KL were paraniod, and 

they suspected everything..so they stopped..and the SS, FBI and whoever had 

nothing to go on...

 

Parmaster was right, TK and KL were "eductors"..a lot of hacks/phreaks looked 

up to them..maybe the SS and FBI thought that maybe if they couldnt get the 

little guys, then to go for "the big guys"..(same philosophy of the drug war, 

eh?  Get the dealers, not the users?)  Oh well..

 

I dunno..thats just my opinion... Shit, the public doesnt understand us enough 

for the government to declare war on us...  Maybe if you collect everyones 

opinion on this, we can come to ONE conclusion..

 

The Dictator



42/132: Phrack

Name: Erik Bloodaxe #2

Date: Mon Jan 22 02:40:13 1990

Craig was very upset when I talked to him a few days ago.

The Secret Service had been to their school and had taken all information off 

of their public accounts through the university...this included the ENTIRE 

phrack internet mailing list, future files, old issues, various lists of info 

on people they knew, etc...

Craig assured me that they didn't go through his room, or even mess with his 

pc, but that didn't matter, as they got enough from the system at school.

The problems stem from various articles published through Phrack, most 

specifically an article dealing with E911 that was written by The Prophet.  

They have said that this was stolen from a computer system, and was accepted 

and distributed knowing that it was illegally obtained propriatary 

information.  

(The Prophet was one of the 3 LOD members busted this summer in Atlanta)  This 

led to various questions dealing with LOD in general and a great deal of 

hazing towards Craig.  

For the most part, they pulled the same crap:  "We know what you did, so if 

you're smart you'll talk, or we'll make your life shit."  And the other 

approach, "Look, we know you're a smart kid with a bright future and we really 

 wouldn't want to see you fuck things up."  Basic cop bullshit.

Craig was visited first by 3 agents, and Randy was supposedly to be visited 

the following day.  (They are at different schools now)

They were interested in the Telenet Directory, The EFT Files, which by now, 

everyone knows that I wrote, since they had been grabbing the boys e-mail.

That pisses me off greatly, as Electronic Mail is supposed to be covered under 

the same protection as regular mail now, or so I understood.  I thought it was 

a felony to interfere with peoples mail.  Can you commit a felony, to stop a 

suspected one from occurring?  I hope not...hell, maybe Noriega is in charge 

now...

In anycase, I think I'm in for a world of shit...



43/132: MY feelings about this fucked up situation

Name: Erik Bloodaxe #2

Date: Mon Jan 22 03:31:01 1990

I do not live in a fascist country...or so I thought.

INformation is withheld, people are threatened daily by an elite group of 

Government thugs who operate above the law, hell, what do you call that kind 

of bullshit?

I'm growing more and more pissed by the minute...if I do get nabbed, which I 

semi-expect to, so you SS boys take a good look at this, I am dangerous.  

Maybe not in a physical manner, although I'm kinda suicidal, and don't know 

how I'll be on any given day, and I've only tried to kill my roomate once with 

a big knife, and I've only broken wine bottles over two people...

But, I am dangerous in that I'm quite eloquent and VERY outspoken on topics 

about which I feel strongly.  Guess what?  I kinda have a personal leaning 

towards computer crime.  Think carefully about reprocussions world-wide when 

reporters find out just how insecure your precious Internet is, or think about 

the stock fluctuations on Fortune 500 companies when their shareholders find 

out just how easily the company cuuld be shut down for a few days with a few 

keystrokes, or consider the implications following just a few choice comments 

about the lack of security at large banking institutions...hell, How fucking 

skilled does someone have to be to sit on a nua and capture every fucking 

Saudi Visa?  (No offense Par) but that shit is totally rediculous.  Security 

is pathetic, and the ones who can fix it, or at least point it out are 

supressed, and placed in jail.  

Fuck that.  If that's what you expect to do to me, then you had better be 

prepared to blow my fucking head off when you kick in the door, because I will 

be heard.

->ME



44/132: Another thing...

Name: Erik Bloodaxe #2

Date: Mon Jan 22 03:57:05 1990

Warf:  who the hell are you that your bust could worry anyone but yourself?  

Hell, I know I'll be up all night now.

Hell, maybe your problems all stem from posting bad things on bbses where they 

don't belong.

I'm still pissed...everyone else ignore me, things get clearer on a few 

subboards after this...WARF fucked up...don't you be next.

->ME



45/132: Attention Feds

Name: Black Magic #54

Date: Mon Jan 22 04:26:40 1990

Being Mr. Bloodaxe's roommate I do have one small request. We sleep late 

around here, so please delay any breaking down of doors or other noisy 

activity until after 12:00 pm. 

His room is the one on the RIGHT at the top of the stairs just to avoid 

confusion (our descriptions are very similar and I realize that you fucks 

aren't all that bright.)

Also, be sure not to let the cat out. Just prop the door back up on it's 

hinges or put him in a bathroom while exercising the warrant.

                Thanks,

                  Chris (what a coincidence huh)



46/132: Hum...

Name: Warf #81

Date: Mon Jan 22 07:41:16 1990

    I think the way this is set up is wierd.  I loged on new the other day and 

I could read all of the messages and all of the message beses.  Hum... so that 

means that some cop get's the number right?  And then he sees all of these 

phreakers and stuff and then boom.  We're all gona' be with each other in the 

same cell for about 5 yrs min... Hum.. SysOp, could you make it a LITTLE more 

secure?  Just helpin' out...

                                   <=[Warf]=>



47/132: well

Name: Phoenix #17

Date: Mon Jan 22 09:21:39 1990

as long as nothing illegal is not posted.. the board is ine..

<damn f key..>

well...

All i have to say is that i ss/eds/or in my case CIA start playing dirty..

we have been very nice in general about everything..

In act I cannot think o anytime when i have bought a system down..

But i it comes to it... we can ight ire with ire..

<add f's where chars are missing.. i gotta get a new keyboard..>

coz i seriously agree wiuth erik..

and when you guys start breaking the law to get at us...

well.. what the hell is the law or... i never liked the damn thing anyway..

jesus..

as a inal note... i will set up some sort o insurance...

not just or mysel... but or anyone who needs it... and cant provide it or 

themselves..

we can play below board just as much as any authorities can...

so there

Phoenix



48/132: security

Name: Phase Jitter #3

Date: Mon Jan 22 10:51:04 1990

  The reason you could read everything is because this board is for education

purposes.  It is not used for ANY illegal information trading.  There is no

point to have it secured, because there is nothing illegal on here..

Phase Jitter

Legion o' Doom!

(The few, the proud)



49/132: dumb feds

Name: Grey Owl #10

Date: Mon Jan 22 14:11:13 1990

Kill 'em all..as I like to say.  Seriously, what can they prove if you are a 

safe hacker?  (hacking via outdials, phreaking with divertors only..no codes 

etc.  nothing traceable)  They can't prove a damn thing.  So what do they do, 

but nail you on something trivial like copyright violation.  All that shows is 

that they have such a weak case that there is nothing solid to bust on.  

Enough rambling for this paragraph...

What we need to do is set up a hackers network where everyone has their hands 

in a few systems.  That way, we have this sort of insurance that Phoenix 

talked about:  if one hacker gets busted 2 systems _die_.  2 hackers get 

busted 4 systems bite the dust.  3 hackers...9 systems.  They need to quit 

messing with people who wouldn't otherwise be harmful to the computer world.

I know there are freeloaders around that get their kicks from trashing Apple][ 

boards and unixes, but this doesn't represent the majority of the hacker 

population.  It sure doesn't represent me!

grey owl



50/132: busts

Name: Dark Sun #11

Date: Mon Jan 22 15:33:56 1990

I dont think that would be a very wise idea... It would just cause the 

"authorities" and the general public to look toward us as destroyers, not 

explorers... The ONLY times I have killed a system is when I really get pissed 

off that the sysop keeps changing all the operator passwords (well... so maybe 

i am a little malicious at times, but not like some people on this board)

                             DS



51/132: Arg...

Name: Erik Bloodaxe #2

Date: Mon Jan 22 18:22:55 1990

Wiping out systems as a means of retribution, or vengance for a fellow hacer's 

bust is NOT a good idea.  You cannot take a bully approach when dealing with 

the world biggest bully (The US Government)  you will lose.  

You have only one manner of defense, and that is to outsmart your opponent, or 

to publicly humiliate him when faced with immediate danger.



By the way:  Phoenix, how come you can never type an "f" when it's in a word, 

but when you are complaining about your broken "F" key, it shows up fine?

COnfused as to the wonders of technology...

->ME



52/132: Back Phracks...

Name: Pain Hertz #84

Date: Mon Jan 22 21:59:17 1990

Whoever ul the back phracks, I have 29 and 30 if they are needed and a local 

doesn't have them.              -PHz



53/132: hello

Name: Phelix The Hack #89

Date: Mon Jan 22 23:28:09 1990

hello all, to those that know why..leave me mail...and you SHOULD know who you 

are as I have not talked to you for 7 mos or so...SO GET ON THE STICK.

 

to everyone else..well you can leave me mail if you choose..but ...

 

pth



54/132: Resistance

Name: Jedi #67

Date: Tue Jan 23 01:42:42 1990

We came across a fun article on p/h and pirating as a form of "post-modern"

resistance by a coupla academic types. If anybody wants, I can dig up a copy

and upload it



55/132: well

Name: Phoenix #17

Date: Tue Jan 23 06:48:33 1990

maybve we should think about what type o insurance we need..

ok.. agreed... bringing down systems will only piss them off more.. and make 

us look even worse..

public humiliation... that would do it... but not all individuals who get 

bustedhave the resources to deend themselves with...

also... once your information is bought out in public.. your cards are played..

and then they will tear you apart..

i think the saest thing here is a little bit o blackmail <ahem....>

if you have something that they really dont want aqnyone to know about..

still... im open to suggestions...

phoenix



56/132: well....

Name: Ravage #19

Date: Tue Jan 23 13:23:30 1990

seems to me that the best way to embarass them would be to obtain and publish

the internal files. many of these contain memoranca and notes on activities

that were not used in court, because of various legal questions, and were

only used for background. i understand that there is a group of police 

enforcement officials who have a unofficial and under the table groupl 

who share information on a lot of folks. houston and la were kicked out

a couple of years ago because officers would release the info into the

public domain. 

 

as to the copyright info. try to get it through the library or the 

field service engineer. if it can be gotten that way it cant be called

proprietary and my experience w/ field engineers is that they will get

just about everything you could ask for if you can give them specifics 

about what you want. 



57/132: Savage

Name: Signal Type #69

Date: Tue Jan 23 14:44:33 1990

Well I agree with the above posts regarding the proper way with to deal with

authorities. You should not use any violent means to take down or destroy 

systems. That will only make them more than not to come down on you harder.  

By the way did anyone hear the news on that guy who got busted 

for breaking into a government mainframe?  I didn't get all the details but

it seemed he is facing up to $200,000 in f fines and a possible five year 

prison term. A pretty stiff price.



$$$Signal Type$$$

.s



58/132: morris

Name: The Mentor #1

Date: Tue Jan 23 21:57:27 1990

Robert Morris was found guilty. If he's sentenced to do time, it'll be a 


<sigh>

Mentor



59/132: BLackmail?  

Name: Erik Bloodaxe #2

Date: Tue Jan 23 22:51:58 1990

Geez...I'd like to think myself above things like that...

In anycase, not everyone has GOOD sensitive information...(not all of us who 

ARE in this country have the balls to dig where that type of crap is...god I 

want to move to Australia!)

Maybe they'll kick me out of the country!  Right...I'm not that important, 

although I would like to think that I am...hehe

hell, maybe it IS time to start doing all the terrible things I always had the 

capabilities to do on the internet...need to get some "Insurance"

maybe...who knows...

->ME



60/132: well

Name: Phoenix #17

Date: Wed Jan 24 01:29:23 1990

like i said... im open to better ideas.. coz i we do have sensitive ino... 

then no matter what we do with it... it will be termed blackmail..

Phoenix4

<and once you have publicised it.. youve played your cards.. andthen theyll 

mess you up real bad..>



61/132: Morris Convicted

Name: Phiber Cut #34

Date: Wed Jan 24 04:43:24 1990

If RTM get's jail time we should all be suprised.  What he did was morrally

and ethically wrong, and he fucked upt and will now have to pay the piper.

However, hej is a very bright person and should not be put in a jail cell

with a bunch of hardended ass f**king criminals!

Hopefully he'll get some sort of community service and a fine, and this will

be enough to kkeep him from fucking up the network in the future.



62/132: i understand...

Name: Ravage #19

Date: Wed Jan 24 14:34:03 1990

that the prosecution had a hard time showing malitous (sp!) intent. does 

anyone know if that is true? if it is true then i doubt he will get any

time. probably a fine, community service, a probated time. what is the 

latest on the ccc guys? have they taken them out and shot them yet?

 

in my previous post i was refering to the publication, through tv,

radio,and paper, of sensitive information held by organizations. it

would not have to be identified as to sender. therer are plenty of

underground, small town, press services (hey how about the gossip 

rags?) that would be ideal to send that kind of stuff to. not only 

that but what about the up wire? you could put it in que and it 

would go all over.



63/132: gossip rags

Name: Grey Owl #10

Date: Wed Jan 24 19:08:07 1990

If it went to the Enquirer they would just claim that Enquirer made it all up. 

If the information got to NBC's evening news <from an anonymous source, of 

course> they might just take it and run.  It would make a good news story if 

what Phoenix says is true.

Maybe blackmail or internet death threats are the answer.  "I'll take down 

Inet unless bloodaxe goes free!"

grey owl



64/132: 2 new subs, & vote!

Name: The Mentor #1

Date: Wed Jan 24 19:51:24 1990

We've got two new subs online - We The People (now #2) and Internet (#8).  

Also, please take the time to vote...

Mentor



65/132: oh 

Name: Dtmf #27

Date: Thu Jan 25 02:58:38 1990

RE: phrack...

Just how much of a problem will it be if an account is on the Phrack mailing 

list for bitnet?? Uh oh....



66/132: and...

Name: Dark Sun #11

Date: Thu Jan 25 15:26:36 1990

would those accounts be gone already? I had 2 accounts that i had contacted & 

conversed with TK, and they are both bad (coincedence?)

                             DS



67/132: things...

Name: Erik Bloodaxe #2

Date: Thu Jan 25 16:45:23 1990

Don't worry about your name being on the Phrack mailing list...a lot of 

peoples were...

I am going to try to get the mailing list myself, so we can keep people 

flooded with files and shit like that...not Phrack, but something...

Randy & Craig shouldn't bitch, as hell, the feds already have it...why 

shouldn't a friend?  If they still say no, I'll make my own list and start 

from there...

->ME



68/132: Hey ...

Name: Sicilumm Thorne #28

Date: Thu Jan 25 20:28:57 1990

    re: phrack

 

    Erik, what's wrong with the continual releasal of Phrack.  Why not go 

ahead and release Phrack 31 (32?).  I mean seriously, what more could piss of 

the feds (or whoever).

 

    I mean it.  Seriously, if we just start some new newsletter, its not going 

to be any different, but by their viewpoint, they'd have destroyed a 

publication that is dated as far back as 1986 or 1985.  If we continue to 

release Phrack's, and I mean put some HARRY shit in there, we would show them 

that they cannot just pull us down.  We're unified, we're strong, and we're 

willing to stand up to them.

 

    [Of course, I don't mean personally.  grin.]

 

    "They tell me it will hurt me on down the line,

    but I don't care.  I'm young and stupid."

 

    Sic.



69/132: phracks

Name: Dark Sun #11

Date: Thu Jan 25 22:02:20 1990

Why not come up an almost untraceable method of distributing phracks thru 

internet? (IE many distributions originating from nowwhere via smtp to many 

people at a time)

                             DS

(we could use the existing phrack mailing list if you can get it,Erik)



70/132: Thats damn easy

Name: Guc #97

Date: Fri Jan 26 06:04:31 1990

just an estimate, how many people were on the mailing list?

heh, we could even send them out using richard stallmans account!



.s



71/132: heh

Name: The Mentor #1

Date: Fri Jan 26 10:06:26 1990

I believe there were about 500 people on the list...  

Mentor



72/132: yea...

Name: Dark Sun #11

Date: Fri Jan 26 16:23:40 1990

And, I was just wondering, because my account went bad just 2 days 

(approximately) after I had just finished discussion with TK about setting up 

an FTP site for the phracks... I know I was on it because I got some letter 

(to 2 of my accounts, which both are dead now) talking about a pirate-oriented 

newsletter organized like phrack... I just thought it is very much a 

possibility that that is the reason it got deleted.

                             DS



73/132: ya know...

Name: Erik Bloodaxe #2

Date: Fri Jan 26 17:15:32 1990

Phrack is Randy & Craigs baby...I would have to respect their wishes about 

using the name...I doubt they would want me to use it...they'd probably let 

Forest Ranger run it into the ground before they'd let me, but 

that's the way they probably think...

I'd rather start something a little better written, better formatted, with

better articles under a different name.

->ME



74/132: that

Name: Grey Owl #10

Date: Fri Jan 26 22:25:07 1990

sounds like something I would have done.  Most of the articles were well 

written, I think but there were a few things that I would have changed.

grey owl



75/132: Phrack etc....

Name: Pain Hertz #84

Date: Sat Jan 27 01:43:38 1990

Okay, I haven't been on for a few days and I just went through a slew of 

messages.  First off, I happen to know a guy who is security at TK and KL's 

school (TK's ex-school).  This guy, he says that he knows nothing about the 

mess and seemed to think it was a big story.  I don't know if he is just 

blowing hot air up my ass or what...probably.  He said he would keep his ears 

open for me, probably back stab, we shall see.

 

I agree with all of those that say Phrack (or another newsletter/magazine) 

should continue.  Those close to KL and TK should talk to them about a name.  

I had written an article for Phrack 31, which I am willing to submit for this 

new venture if it gets off the ground.

About distribution, I know of a few anonymous FTP sites that will let you PUT 

stuff.  Usually folks use these to swap .GIF files, but they could be used for 

whatever.  Perhaps a 'girlie' magzine could be created.  PUT the newsletter, a 

text file, as a name like FATBABE.GIF.  Those that GET it either know what it 

is or think their .GIF viewer is fried.  Anyone who GETs it not knowing what 

it is and finds out, so what?  It doesn't have to have anyones addresses in 

it.  Whats your opinion friend?

 

About gettting even/back, blackmail etc.  Being destructive is not good for 

previously posted reasons.  How about us collectively writing a story and 

sending it to the AP or something?  We, as a team, can get the story better 

than any reporter.  I seriously thought about calling the damn SS saying i'm 

Dan Rather or something and asking what the deal with Randy and Craig is.  

What the FEDS did with this pseudo-bust is only gain information about who is 


anyways.  Often thats because of p/h -ers narcing on each other (read the 

PHRACK circle trilogy if you haven't).  If the SS knew that Joe Hacker did 

something and they found out that Joe Hacker's internet address is such in 

such.  They know that some one calling themself (lves?) Joe Hacker used that 

account.  Whether it was the real owner or not remains to be proved.  The 

burden of proof is on them.  Still, if handles didn't matter, no one would use 

them anyways.

well shit. this is getting long....

 

Subscribe to VIRUS-L at LEHIIBM1, I have the director of CERT's net address:

its rdp@sei.cmu.(???).edu  (Richard Pethia).

-PHz



76/132: screw it..

Name: Phoenix #17

Date: Sat Jan 27 07:26:42 1990

distribution is damn damn easy...

smtp every where for one..

and a shit load of other things will work most merrily..

Phoenix



77/132: Why?

Name: The Parmaster #21

Date: Sat Jan 27 09:38:59 1990

    Why just "send it" to AP

Just take over the damn system and release it.

that way you KNOW it';s done..

and it's sent out almost immediately.

Later,

Par

Jason



78/132: Getting scarry....

Name: Johnny Hicap #45

Date: Sat Jan 27 21:17:01 1990

It is getting scarry as hell now a days. I know of three hackers that got 

busted in the last couple of days, ther handles will not be released by me but 

those who know them are probably shocked. I can't beleive?? it. 

Situation:

Someone gets busted for prgming switches, hacking LMOS, COSMOS, and all the 

??other phone company comp. He calls me from his line the next day to tell 

me..(Direct)

Question:

Do you think they are now monortoring me? Afer all he did call me direct.

They probably are...



79/132: UT micom/network annex

Name: Dark Sun #11

Date: Sat Jan 27 22:03:45 1990

Well, it looks like everyones pushed the UT administrators to disabling all 

links from off-campus... We can no longer telnet to off-campus sytems thru 

network... For awhile you could use UTAUS, but know logins there are disabled 

because they are turning off the cabality to telnet off-campus. I was on EMX 

just a few minutes ago telnet'ing to frosted-flakes.ai.mit.edu when I was 

kicked off, and I keep getting kicked off (same thing that happens at the 

annex when you tryo telnet off-campus). All those people shouldnt have used 

the systems to hack so much and (mainly this) play GAMES like TINYMUD! The UT 

administrators were getting tired of all the annex ports always being full.

                                     DS

plus, not to mention, all the security problems that they have had with the 

Suns.)

Maybe it has to do with people changing passwords on "act" accounts...... You 

know who you are !!!!



80/132: people who abuse

Name: Grey Owl #10

Date: Sat Jan 27 23:49:09 1990

Look:  I have one thing to say to people who screw up/abuse/ruin systems for 

other hackers...you suck.  

There is no point in screwing something, otherwise a perfectly good system, 

for everyone else.  If you get your kicks from trashing systems for the hell 

of it, your shouldn't call yourself a hacker.  Maybe asshole would be a good 

term for these people.

grey owl



81/132: re: ppl who abuse...

Name: Pain Hertz #84

Date: Sun Jan 28 02:20:45 1990

The true hacker works hard to make their presence unknown.  Screwing up 

accounts or a system is easy.    nuff said           -PHz



82/132: Things...

Name: Erik Bloodaxe #2

Date: Sun Jan 28 13:31:38 1990

First off...if the "BUST" you are referrong to is Mark & Joey and some other 

Queens punk, I think that is bullshit.  A friend of mine talked to  Mark a few 

days ago (after the reported bust) and Mark said nothing about it.

Programming switches, hacking LMOS...busted...well, we'll see.  If it is true, 

hell, chalk up another LOD bust and we'll scratch Phiber Optik off the active 

list...



Mark?  You been busted boy?

Another thing...Dark Sun:  you little thug...I didn't change the pw on your 

fucking act account, so stop your incessant whining about it...accounts on the 

disney suns are terribly easy to run through a dictionary hacker, so do that 

if you so desparately want back on them...there is NOTHING there...and if a 

CHAT thing ends up on there and I find it, I'll be  pissed off...run that off 

of ugwa, or whatever.

Why do you want on there anyway?  Why do you have to make such a big deal with 

the fucking public access unixes?  THERE IS NOTHING ON THOSE SYSTEMS!!!  I 

will not lose my account due to someone hacking off of the disney suns...ok?

jesus...is that asking too fucking much?

->ME



83/132: hmm

Name: Phoenix #17

Date: Sun Jan 28 14:08:56 1990

i changed the password on that act account..

got root off it too..

umm.. ut still lets you call off campus if you use the right systems...

by the way... what is that instructional vax cluster used for ?

phoenix



84/132: yeah...

Name: Guc #97

Date: Sun Jan 28 16:49:33 1990

RE: hmm

you can get off campus IF you use a password on a system and do it from there. 

(ie: cs, if, emx, etc...)  But without a password there is noway to get off 

campus.

i asked a friend of mine at the computation center about this and he said it 

was done mainly because people were hack/trashing systems on the internet, and 

even more so a bunch of 12 year olds somehow found out about tinymud.

one afternoon i saw 7 annex ports logged into tinymud from portal1.



gah

.s



85/132: phoenix

Name: Dark Sun #11

Date: Sun Jan 28 17:24:04 1990

I was talking about phoenix... He said he was going to change it back but then 

decided to keep it for himself... And I know how easy it is to run thru a 

dictionary hacker (check act's home dir...) Erik didnt even know the passwd 

(Idont think)

                             DS



86/132: !@#)(*

Name: Phiber Cut #34

Date: Sun Jan 28 22:54:40 1990

John M??? T%hat wouldn't be as in "Cable Pair" would it?



87/132: no..

Name: Phoenix #17

Date: Mon Jan 29 02:48:09 1990

i didnt decide to keep it or mysel...



88/132: john m

Name: Dark Sun #11

Date: Mon Jan 29 17:59:09 1990

Whos Cable Pair?



89/132: cable pair...

Name: Erik Bloodaxe #2

Date: Mon Jan 29 18:56:56 1990

John Maxfield aka Cable Pair...

Notorious detroit fuckhead hacker buster & child molester.

hehe

->ME



90/132: Cat-wares

Name: The Jabberwocky #100

Date: Tue Jan 30 00:15:01 1990

Does anyone out there have anything to utilize the enormous possibilities of 

the AppleCat modem?  I used to have a few nifties, but that was a while back 

and over the past half-decade that I have been out of circulation(got bored) I 

have lost all wares except the piece-o-shit Com-ware II.  This kitten will 

sing any song imaginable of pretty mf tones and even had a voice simulator 

which makes for quite a bit of fun.  Anything which someone could u/l would be 

greatly appreciated.

-The Jabberwocky



91/132: hello

Name: Corrupt #114

Date: Tue Jan 30 08:11:40 1990

Damn!..finally got up on here as shit is tight....be looking forward 2 

shooting the gift with ya'll

shit..lemme x-late...wassup>?

the 2600 meeting is this friday here in New york....I'm sure some interesting 

things will be gleeaned     therefrom..if  I make it..

Be Careful Everyone...(Ithats a sentimental reitiration..shit..(sp)))

Corrupt[8lgm]



92/132: ammy hack warez...

Name: Ravage #19

Date: Tue Jan 30 10:53:04 1990

what are the names for some of the hack utilities for an ammy?

thx ahead of time.

 

                                                 ravage

                                                  rip

                                                   the

                                                    system



93/132: ...

Name: Tak/Scan #44

Date: Tue Jan 30 15:57:47 1990

I run a AmyHack Discussion Center. I think those files you are looking for are 

on there.

The 4th Dimension! 619-745-1xxx. Login PW-SPECTRUM. Newuser PW-Gunship.



94/132: tak/scan

Name: Ravage #19

Date: Tue Jan 30 21:38:19 1990

thanks, expect to get a call from my direction in the next few days.



95/132: tak

Name: The Mentor #1

Date: Tue Jan 30 22:48:56 1990

Could you u/l the amy hacking stuff to the Commodore directory? Thanks!

me



96/132: Thanks a lot people

Name: The Inspectre #63

Date: Tue Jan 30 23:03:17 1990

Now I can't even get onto the network from UT Micom. I have programs due for 

classes I have to work on on those computers. Now I've gotta go down to the 

stupid terminal room and wait around about 6 hrs for some goob to get off the 

sun terminals.



97/132: umm..

Name: Phoenix #17

Date: Wed Jan 31 04:01:56 1990

sorry.. but i wasnt the one playing ANY games..



98/132: ..

Name: Grey Owl #10

Date: Wed Jan 31 14:35:05 1990

Yeah.  Who the fuck was playing all these port 42something games on chaos 

besides Dark Sun?  I was going to do some FTPing and hacking and I noticed 

that 5 or 6 people were logged on to the same port on chaos...

Come on people!  This is retarted.

grey owl



99/132: 2600 and the Internet Source Code

Name: Dark Overlord #94

Date: Thu Feb 01 04:01:21 1990



I will like to state that 2600's selling of the internet Worm source code

was done without my knowage and I am not getting (or want) a cent.  I think 

this is very slimy of them.



              -Dark



100/132: well..

Name: Phoenix #17

Date: Thu Feb 01 10:06:58 1990

i did lots of hacking at ut... so i played a major part in its downfall in 

that area..

but never ever once did i play a single game off there.. <didnt even know 

there were any..!>

still.. i take FULL responsibility for stufing up the IV# vax cluster..

grr... did a login patch.. and set off an audit alarm..

that wasnt problem..

problem was that then i rushed.. and when i left, forgot to reset privs on 

loginout, so everyone could log back in, but no-one could log out <unless 

super user> moral: never ever rush a patch!!

phoenix

<disgruntled>



101/132: port 42

Name: Dark Sun #11

Date: Thu Feb 01 14:19:42 1990

Whats that??? If you mean 4201, I havent even looked at it for several 

weeks... 

                             DS



102/132: ...

Name: Tak/Scan #44

Date: Thu Feb 01 16:06:43 1990

Yeah Mentor and others I will upload some a my hacking shit. not to much 

they suck anyways./ but I will still dot it....



The 4th Dimension! 619-745-1xxx. Login PW-SPECTRUM. Newuser PW-Gunship.

Tak/Scan



103/132: FSA

Name: Corrupt #114

Date: Fri Feb 02 05:51:25 1990

yo..you know how i get..lemme just say this ya'll



        ****    ****

       *    ****    *

      *              *

     *                *

    *                 *

     *                *

      ** ***           *

        *   **          *

              *        *

               *      *

              *      *

Africa        *      *

              *      *

               *     *

                *   *

                 ***

                      

      Free South Africa

      -    -     -



$ 

Nelson Mandella ..let the guy goalready!

:-) 2600 meeting today..I'm gonna have some fun..we're gonna shoot homeMovies!!

(thats sorrta a joke,...dunno if u get it.)



104/132: 4201

Name: Grey Owl #10

Date: Fri Feb 02 21:54:10 1990

Unless you're calling through and outdial, it's not a good idea to do anything 

other than hack.  This is only my opinion.  

grey owl



105/132: what?!

Name: Dark Sun #11

Date: Fri Feb 02 23:09:50 1990

Its a helluva lot safer to play a game than hack!

                             DS



106/132: uh...

Name: Guc #97

Date: Sat Feb 03 06:29:48 1990

could someone please give a quick tutorial on how to make use of the info in 

xfer section 12?

.s



107/132: What is Phrack?

Name: Warf #81

Date: Sat Feb 03 18:20:25 1990

    Is it like some BBS Mag.?

                                   <=[Warf]=>



108/132: things

Name: Grey Owl #10

Date: Sat Feb 03 18:32:10 1990

I'm not talking about safety.  When you're on the system and things are 

getting logged, it's not worthwhile to be playing games.  You can do that 

legally.  If you have to spend time under the log, it's best to make it 

productive.

Phrack is a magazine that has been the longest standing electronically 

distributed magazine available.  The articles are always informative and 

usually good!

grey owl



109/132: UT Micom

Name: Daneel Olivaw #9

Date: Sat Feb 03 19:12:17 1990

I am pissed... people are abusing the hell out of it just to play games.  Dark 

Sun is one of the worst... For some reason he finds it necessary to play 

whatever he plays and do it online at UT.  This is getting everyone in 

trouble, and I know Erik ain't exactly ecstatic (sp?) about some FTP getting 

shut down.

Daneel Olivaw



110/132: hey

Name: Corrupt #114

Date: Sat Feb 03 20:57:24 1990

You I went to the 2600 meeting..sanme ole stuff..running thru a AT&T building 

with flare guns..ranking and dissing..drinking and picking up  women(men?) had 

sum fun..got rowdy.and ofcourse..a little talkabout this and that broing 

stuff..computers..

the Resteraunt with the nude girls was cool..the best part was On the Subway 

buggin out...singing..nmaybeI7ll sing here one day..dunno :-))

I also Managed To write MORE vms software..and got a BBS site together

on the network..anyone Interested in

checking it out (it's in new Zealand) Mail me here or On Altos [tchh] as vaxer 

or on QSD as box  ...the info for the board is on Altos[tchh]Bullet as well 

but ideas/comments/complaints/a nd bugs can be mailed 2 me here as well.

It's Semi-private? naw..I think thats the Last work I'll do..when i Complete 

the chatV4.0 and see it online I'll retire my keyboard for a bit .

have A Good one/Be Safe

network Ninjitsu GaiDan[8lgm]Corrupted



111/132: ...

Name: Phiber Cut #34

Date: Sat Feb 03 22:02:43 1990

AM-ComputerCrimes     02-02 0151

AM-Computer Crimes,140<

Criminals Have Discovered Computers<

           WASHINGTON (AP) _ Criminals have discovered the value of

computers and are using them ``in crimes of unprecedented economic

cost,'' the National Instiute of Justice said Friday.

           The institute cited a recent accounting firm study that

estimated $3 billion to $5 billion in thefts each year by high-tech

criminals.

           ``Increasingly, computers are being found in the illegal

activities of drug networks,'' said Attorney General Dick

Thornburgh. ``Drug traffickers use them to communicate with each

other, record their transactions and transfer and launder money.''

           The crimes include electronic funds transfer fraud and theft of

commercial inventories.

           The report mentioned a former insurance firm employee in Fort

Worth, Texas, who used a program to delete more than 160,000

records from the company's computer and also a prostitution ring

that had a data base of more than 80,000 clients, their credit card

numbers and sexual preferences.

           AP-NR-02-02-90 1516EST<



112/132: Hey,

Name: Black Death #95

Date: Sun Feb 04 00:16:37 1990



Call the Unholy temple

408-249-5xxx

New user password is "the Temple"

have phun



113/132: ...

Name: Tak/Scan #44

Date: Sun Feb 04 03:26:28 1990

Killer. I am going to set up something via - then nwetworks really soon i will 

keep you posted.. 

in the meantime-

The 4th Dimension! 619-745-1xxx. Login PW-SPECTRUM. Newuser PW-Gunship.



114/132: Network BBSs

Name: Pain Hertz #84

Date: Sun Feb 04 11:43:35 1990

Well, I have been interested in running a BBS on VM for sometime.  I have the 

code for such and am quite capable of writing it anyway.  Anyone else a REXX 

phreak?  Anyways, it has been quite difficult to find a safe VM account on 

Bitnet (or any net running RSCS/JNET/JES2 and its compatibles).  The 

requirements are that it is TELNET-able, has at least 2 cylinders of disk 

space, is able to run in DSC indefinately, and that the admins don't care 

about RSCS traffic.  If you have such an account and are interested in running 

a BBS/Chat/Fileserver plz get im touch with me. 

 

On another note, CERT.SEI.CMU.EDU does have a receive directory (FTP) so feel 

free to leave you interesting notes for others there.

 

                                         -PHz



115/132: games

Name: Dark Sun #11

Date: Sun Feb 04 17:47:49 1990

Tell me some evidence to support your theory that I am one of the worst game 

players at UT! very interesting that you think that...

                                  DS



116/132: AIDS VIrus

Name: Phiber Cut #34

Date: Sun Feb 04 20:11:46 1990

PM-Computer-Extortion     02-02 0333

PM-Computer-Extortion,0344<

Man Arrested in Alleged Computer Extortion<

           CLEVELAND (AP) _ A zoologist accused of unleasing a computer

virus that crippled computers in England and other countries two

months ago was arrested on a fugitive warrant in Ohio.

           Joseph W. Popp was arrested Thursday and is being held on a

federal fugitive warrant. He is charged in warrants issued by

Scotland Yard in London with blackmail and extortion.

           During an initial court appearance here today, Popp, 39, told

U.S. Magistrate Joseph W. Bartunek that he is under a

psychiatrist's care and must take drugs for a mental condition.

           Bartunek said he would schedule another hearing after two

psychiatrists evaluate Popp to see whether he is competent to face

further proceedings. A date was not set.

           Popp, a zoologist who worked for the World Health Organization,

is from Willowick, about 10 miles east of Cleveland, said defense

attorney John P. Kilroy. It was not immediately clear whether Popp

is still affiliated with the organization.

           The warrant alleges Popp distributed about 20,000

computer-crippling disks from London around Dec. 11. The disks were

labeled ``AIDS Information Introductory Diskette.''

           The U.S. attorney's office in Cleveland said the disks had

information on acquired immune deficiency syndrome for use by

hospitals, researchers and others.

           But authorities said the disks, when inserted into personal

computers by unsuspecting recipients, halted accessibility to any

other information in the computer.

           At the end of the program, the disk asked the computer user for

a leasing fee of up to $378, then printed an invoice with a Panama

address where money was to be sent, federal prosecutors said.

Computer owners were told that the rogue program they had inserted

in their computer would stop the machine from functioning unless

the money was paid.

           At the time the diskette began causing problems in early

December, authorities in London said it had been received by users

in Norway, Sweden and Denmark as well as Britain. Scotland yard

said at least 10 British computers were affected.

           AP-NR-02-02-90 1328EST<



117/132: Dark Sun's gaming evidence

Name: Grey Owl #10

Date: Sun Feb 04 21:14:41 1990

Whenever I did a 'who' from the annex it would show that you were playing 

games.  I know it was you because I would log on to a unix and you would 

imediately notice that I was there.  Also, whenever I went to 4201 (that one 

time) to see what was up, you were showing me around.  

grey owl



118/132: arg...

Name: Erik Bloodaxe #2

Date: Mon Feb 05 00:30:58 1990

Arg...ok, so Dark Sun is the TinyMUD gaming thug...or at least one of them...

what a drag.  I've half a mind to wipe out the damn program altogether.

Download the source and stick it elsewhere so you and your buds can play it 

and not bother actual college activities, so people like inspectre can do 

their fucking homework.  Hell, if it's that important for you mindless 

pre-pubescent twits to play fucking games call the ACT system and play their 

silly mud-like game, or call fucking MUD in england on the x-25 networks!!!

if you need the nua for mud, or the number to ACT here in austin, just ask!  

But from now on fucking think about what the hell you are doing!  Network only 

has so many queues!

->ME



119/132: NUA's

Name: Captain Crook #36

Date: Mon Feb 05 22:10:25 1990

  What are the NUA's for MUD and ACT??



120/132: what the hell?

Name: Dark Sun #11

Date: Tue Feb 06 00:11:22 1990

are you talking about (is this some kinda 'revenge'?? When did I show you 

aroumd and what account was I using? I only have 1 account on there. And since 

I had my emx accounts (2 months) I havent even USED annex... I can get my 37 

telnet sessions and my 3 outdial sessions going on at the same time, why use 

annex?

                                  DS



121/132: Watts happening to the hacking community

Name: Cassius Cray #135

Date: Tue Feb 06 06:11:39 1990

Shit guys... a year and a half ago we were on top of the fucking world... now

it is general mayhem and feds on every corner... I got into hacking the 

beginning of last year then I read in the paper about some guys at Ga Tech got

fucked so I decided to take a vacation and read.... I heard about good guys up

in New York, Detriot, and Chicago getting there shit seized by the feds...

I don't know what ever happen to the guys at Ga Tech but the other guys are 

definately FUCKED.... what a turn around.... I am beginning to believe the 

Feds are starting to take this shit seriously!!  Oh well... guess we could all 

go backing to pirating software... Nah!

Cassius Cray



122/132: What happens is...

Name: Daneel Olivaw #9

Date: Tue Feb 06 17:33:07 1990

people like Dark Sun who have "37 telnet and 3 oudial" sessions going at once. 

This seems to attract attention... I dunno why... gee, doesn't every CS major 

do that..  Shit, are you so stupid that you don't realize what attracts 

attention.  They notice if there are 15 people (of 16) logged in under the 

same name at the same time.

Daneel Olivaw



123/132: another round of busts....

Name: Gordon Meyer #65

Date: Tue Feb 06 20:27:33 1990

Today the feds announced, in a Chicago Press conference, that indictments have 

been brought against The Prophet and Knight Lightning for theft and other 

related "computer" crimes. (I didn't catch the rest of the charges).  See my 

message in the Phrack section for more info.

I've got the VCR set to record the news tonight so maybe I can cull some more 

info, but no doubt it will be all over the papers tomorrow.

Holy shit batman!

CIAO!

-=->G<-=-



124/132: DNR's

Name: Vet-San #29

Date: Tue Feb 06 21:21:59 1990

I'm in a bit of a fix here...   I have reason to believe that there may be a 

DNR on my line.  Can someone tell me how I can find out for sure?  Do I just 

walk up to the local courthouse and demand to know, fiegning jingoistic 

paranoia?  Any assistance will be appriciated...   thanx



125/132: heh

Name: The Mentor #1

Date: Tue Feb 06 22:41:06 1990

Yeah, that might work. Or try the local switch. Generally, though, I think 

you're just screwed...

Mentor



126/132: A World of Your Own

Name: The Prophet #104

Date: Tue Feb 06 23:55:15 1990

Imagine that you're deaf, dumb, blind, and paralyzed from the neck down and 

totally unable to experience or communicate with the outside world.  How long 

could you retain your sanity?  How many of you would choose to die instead?  

How many of you think you could muster the willpower to create your own little 

mental world to live in for the rest of your life, and how long do you think 

the hospital would wait before putting you out of your misery?

  -The Prophet



127/132: DNRs

Name: Nemesis #122

Date: Wed Feb 07 00:55:49 1990

     Well, you can check for DNRs (and all the info they have recorded) on 

your local neighbprhood LMOS system...Other than that.. I would suggest a 

little SEing with your local fone co.. Just keep trying untill you find 

someone who doesnt know whats going on, and have them check it for you.. The 

basic idea is to dial repair and work your way in farther from there...how far 

you will have to go depends on how gulible the person you talk to is...But 

asside from that, since a DNR now a days (at least on my fone--I duno what 

typs of SS you are on), is all digital, and totaly undetectable by any simple 

means.



128/132: Body

Name: Sventek #137

Date: Wed Feb 07 02:13:46 1990

Once i loose my senses and Motion i am out of the picture.  Other words no 

mental visons of anything.  That would bring me in line of INsanity and 

Psychotic state of being.



sl8r

Sventek



129/132: what next

Name: Sector #123

Date: Wed Feb 07 13:40:43 1990

 

PM-911Hackers     02-07 0449

PM-911 Hackers,0462<

^Two Charged with Breaking into Nine-State 911 Emergency Phone

Network<

^By PAUL A. DRISCOLL=

^Associated Press Writer=

           CHICAGO (AP) _ A computer hacker broke into the 911 emergency

telephone network covering nine states in the South and another

intruder passed on the access data to other hackers, authorities

said.

           Robert J. ``The Prophet'' Riggs, 20, of Decatur, Ga., and Craig

M. ``Knight Lightning'' Neidorf, 19, of Chesterfield, Mo., were

indicted Tuesday by a federal grand jury and accused of computer

crimes, said acting U.S. Attorney Ira H. Raphaelson.

           He said Riggs was a member of the so-called Legion of Doom

hackers group, whose members are involved in numerous illegal

activities.

           Riggs and two other alleged members also were indicted Tuesday

in Atlanta and charged in other computer break-ins.

           The government would not say if any emergency calls were

disrupted or whether other damage was done during the tampering.

           ``These were not teen-agers playing games,'' Raphaelson said.

``They are thieves, they're reckless and they're dangerous.''

           In the Chicago case, Riggs is accused of entering Atlanta-based

Bell South's 911 system with a computer, stealing a copy of the

program that controls the system and publishing this data on a

hackers' computer bulletin board in Lockport.

           Neidorf is accused of transferring the data to his computer at

the University of Missouri in Columbia, where he allegedly edited

it for a computer hacker publication known as PHRACK.

           There was no immediate comment from either defendant. Directory

information had no listing for Riggs, and there was a recorded

message at the Neidorf residence. Neidorf's attorney, Art Margulis,

said he had not seen the indictment so he could not comment.

           Raphaelson said industry specialists estimate that $3 billion to

$5 billion is lost yearly to computer fraud. He said this is the

fourth hacker case brought by the federal government in the past

year.

           Bell South's 911 controls emergency calls to municipal police,

fire, ambulance and emergency services in Alabama, Mississippi,

Georgia, Tennessee, Kentucky, Louisiana, North Carolina, South

Carolina and Florida.

           ``People who invade our telecommunications and related computer

systems for profit or personal amusement create immediate and

serious consequences for the public at large,'' said Raphaelson.

           He said the 911 data was valued at nearly $80,000, but would not

say how a hacker could profit by stealing this data, other than by

selling the information to others.

           Riggs, if convicted on all charges, could be sentenced to 32

years in prison and fined $222,000. Neidorf could be sentenced to

31 years and fined $122,000 on conviction.

           Riggs and Neidorf are charged with interstate transportation of

stolen property, wire fraud and violations of the Computer Fraud

and Abuse Act of 1986.

           AP-NR-02-07-90 0549EST<

 

 

 



130/132: Utter Bullshit

Name: The Prophet #104

Date: Wed Feb 07 17:26:26 1990

Can you believe the above bullshit?

Dearly Beloved, Gone but Not Forgotten:

    Phiber Optik

    Thomas Covenant

    Supernigger (gone, unloved, and forgotten)

At the arraignment today, one of the Secret Service agents told me, "Everybody 

is narcing on everybody."  Something D.J. said once: keep your friends close, 

and your enemies closer.

  -TP



131/132: fuck

Name: The Mentor #1

Date: Wed Feb 07 18:44:45 1990

Rob, I cannot believe that bullshit. Good luck...

Sigh.  People, I don't know how much longer I'm going to keep this up. I mean, 

they seem to be going after people indiscriminately. Nailing Craig for 

publishing something in Phrack? That's bullshit. Utter and complete. Even 

assuming that the info was copyrighted or stolen (which I don't believe), how 

the *FUCK* was he supposed to know it?

I don't even know what issue of Phrack it's in. Am I liable for it because 

it's up in my file section? If so, what about the thousands of people around 

the world that have copies of it.

lame lame lame

mentor, the paranoid.



132/132: 1000 calls!

Name: The Mentor #1

Date: Wed Feb 07 18:55:04 1990

Welp, we managed to get over 1000 calls in less than 1 month! Good job, guys! 

(Caller #1000 was The Inspectre...)

The board went up Jan. 13!

me



 _____________________________________________________________________________



                     *** {"We The People" Sub-Board} ***





< Q-scan We The People... 2 - 26 msgs >

1/26: This sub!

> Permanent Message

Name: The Mentor #1

Date: Wed Jan 24 19:50:03 1990

This sub is for the discussion of today's society, politics, economics, etc. 

All views are welcome...

Mentor



2/26: Libertarianism

Name: The Mentor #1

Date: Wed Jan 24 20:10:11 1990

Y'know, the more I deal with the government, the more seriously I'm inclined 

to take Libertarianism. Has anyone else here read _Atlas Shrugged_? Ok, how 

about _Alongside Night_? J. Neil Schulman is now making _Alongside Night_ 

available on floppy. I'm going to get a copy, and see if he'll license (or 

whatever) it to me to put up in the Transfer section.

Mentor



3/26: io

Name: Dtmf #27

Date: Thu Jan 25 03:18:56 1990

I'm sure most of you have probably heard or given this speech(?) at some time 

or another.  

         It seems to me that many of the hackers problems today stem form 

disunity.  Most hackers tend to be loners, and very intelligent compared to 

the rest of the "A car a house 2.2 kids and a dog" society.  Because of this, 

we tend to do things alone, or in very small groups.  If you think about it, 

and I mean REALLY think, not just in passing thought,  if the hackers had a 

bit more unity we could accomplish quite a lot more.  At the current rate, all 

(well, most) of todays hackers will have quit or been busted within 10 years.  

The newer generations are faced with more and more problems in learning how to 

hack, so the population is rapidly decreasing.  What if we were able to put 

away all the petty bullshit and bickering and really go at this?  The more 

experienced ones of us could teach the new people that show potential, and 

therefore continiue the society.  A unification of the computer underground 

would more than triple the effectiveness, and allow us to explore more and 

learn more than if we continiue to go our own way.  

Just a thought, and not to coherent after 40 hrs no sleep, but I think you 

will get the idea here...

Oh, and one more thing...Its obvious that every day more and more things 

become computerized...The more control we have over computers, the more 

comtrol we will have over our lives...After all, Big Brudder isn't my favorite 

guy....

         DTMF



4/26: well...

Name: Phelix The Hack #89

Date: Thu Jan 25 12:21:00 1990

Ayn Rand does have a well structured viewpoint that is well worth 

reading/listening to...I also suggest "The Fountainhead".

 

One addition reason for the individualtiy  of most hackers...and in my mind he 

the most important one is as follows:

 

The fewer number of people that are involved in a certain 

orginization/society/group..etc...greatly edcreases the likelihood of an 

information breech.  I am not just talking about "group secrets" (although it 

certainly applies), but rather am appling this TRUTH to the entire H/P 

community.  I usually stand by a few general rules...one of which is "If I do 

not know you I do not trust you"...with the strong option for "I know you 

THERFORE I do not trust you".

 

Yeah it would be just peachy if the entire "underground community" could bind 

together into one big close knit LOYAL happily Cleaver-esque family.

Realistically though..this will not happen...nor do I think that I want it to. 

 I for one HAPPEN TO LIKE a certain amount of indivduality in my life.

pth



5/26: sex!

Name: Erik Bloodaxe #2

Date: Thu Jan 25 16:57:35 1990

hm...got some attention.

I, being a MAJOR Libertarian in my beliefs, although not quite as radical 

publicly as I'd like to have the nerve to be, relate strongly to the needs 

people have when dealing with a totally overbearing and somewhat outdated 

method of government.

Unfortunately, being in america, we no longer have minds in power capable of 

reaching decisions that would mold this country into something worth dieing 

for.  People like that are now held back by the good-ol'-boy system of 

government.  It's not what you know, but who you know, and how much money you 

have.

I am kind of radical in my ideas about what I'd do with an ounce of power, but 

a lot of the things I feel strongly about are shared by a great number of 

mainly conservative types.  Like cutting defense of Japan, nationalizing the 

health industry, legalizing drugs, starting a whole wide-range of social 

programs for everyone from the elderly to the homeless...etc...

But, again, this IS America, where the attitude is to kick back and let things 

happen.  We are no longer the new kid with the zest for life...we are the 

tired old redneck who likes to sit at the gas station drinking a beer and 

watching kids play while  we talk to others like us about the good old days.

Bullshit.

But, until people like myself who are disgusted with this situation come into 

a position (or age) to do something about it, or at least let our voices be 

heard, the disgusting current state of affiars will continue.

I just hope that by the time that happens, we all won't have fallen prey to 

the unbelievable degree of sloth that our leaders have fallen victim to.

->ME



6/26: well, if i said...

Name: The Urvile #90

Date: Thu Jan 25 18:11:56 1990



if i really said what i felt, i'd probably go to jail anyway,

so hey: kill the stupid people & start over.  ayn rand with her little essay 

on how science and a totalitarian government is pretty fucked up.  the only 

problem with that is that science teaches one to question, while any 'hard' 

government will attempt to suppres questioning.  now all we have to do is wait 

for a government to come along that really does have faith in its populace, 

and really encourage the scientific mind.  

or maybe i'm raving again.

it's good to be back, at least for a while.  greetings, mentor, bloodaxe, 

jitter.  shame i don't hear from y'all more often.



7/26: stuff

Name: The Mentor #1

Date: Fri Jan 26 10:09:34 1990

Tennesee (AP) - (paraphrased) A judge today imposed a $1 (one dollar) fine on 

anyone convicted of beating a flag-burner. "Well, if they want to beat the 

heck out of a flag-burner, go to it." This assault charge carries a maximum 

penalty of 5 years in prison and a $20,000 fine.

Jesus. While I personally don't like the idea of burning the flag, I like even 

less the idea of open-season being declared on flag burners. I wonder what the 

fine would be for shooting one? $10?

Mentor



8/26: no...

Name: Dark Sun #11

Date: Fri Jan 26 16:25:25 1990

for shooting a flag-burner it would be 12.50 (50 cents tax, and $2 

compinsation for the burners family)

                             DS



9/26: hmm..

Name: Phoenix #17

Date: Sat Jan 27 07:28:09 1990

the main difference between russia and america is that the russians admit they 

are monitoring the fuck through peoples lives...



10/26: phoenix

Name: The Mentor #1

Date: Sat Jan 27 12:11:32 1990

What's the government like in Australia? I have no idea how your system 

works...

Mentor



11/26: Hmm...

Name: The Apple Bandit #33

Date: Sun Jan 28 06:11:32 1990

Well always remember these: Dont Steal; The government does not like 

Competition. How about this: I was once walking down a dense path in an 

unknown forest, and I came to a fork in the path; I took the path less 

traveled by; and that has made all the difference! Or: The Last Freedom: The 

Freedom to Flee..



12/26: re australian government..

Name: Phoenix #17

Date: Sun Jan 28 14:11:17 1990

theyre pretty cool as long as they stay out of my way!

they lack the technology to monitor everyone.. which is pretty good..

and they arent the smartest people in the world..

which is also good...

and basically if they start to fuck around with various diferenet laws.. ill 

move to another country..

still for now australia = good.. no problems with government here!



13/26: COOL

Name: Silencer #31

Date: Mon Jan 29 20:13:57 1990

I thought about moving to Ausi land a couplke times....looks nice...  what 

sorta networks you got down there...besides the basics...alot of countries 

have specialty networks that just operate in that particular country...

    - Silencer

.s



14/26: hmm

Name: Phoenix #17

Date: Tue Jan 30 07:13:07 1990

our FEW networks seem to be much more advanced than your networks.. but i 

spose we <australian hackers> had something to do with that..!



15/26: Anarchism

Name: Psychedelic Ranger #80

Date: Fri Feb 02 04:02:43 1990



 I support the anarchist view. Read "Live Wild or Die" or something

from the Earth First! camp (some of their stuff is dogmatic though)

or Overthrow (a YIP!ster times publication) or SLINGSHOT or various

other underground radical magazines. 



16/26: huh?????

Name: Phiber Cut #34

Date: Fri Feb 02 08:06:47 1990

When the going gets weird, the weird turn pro.....

    (From a famous writters attorney with a Mongolian birthmark...)



17/26: my favorite political non-joke

Name: Mr. Slippery #72

Date: Fri Feb 02 23:31:51 1990

I did not create it but I love it --->

How do you know an honest politician,



he stay's bought!

Given that one California legislature was a little more obvious in selling

himself than the others and got convicted will let the others act pius when

they (1) must have known what was going on and (2) are more discrete but

still sell themselves to special issue groups and vote against what is

really needed.



18/26: good book

Name: Gordon Meyer #65

Date: Sat Feb 03 09:47:35 1990

Another inspiring book is THE MONKEYWRENCH GANG by Edward Abbey.  (a sequel 

was just published, "Hayduke Lives!" but I haven't read it yet.)  Check out 

this book....  

Abbey inspired the founding of the only (in my opinion) environmentalist group 

worth supporting and working for, Earth First!

As Abbey liked to say, "resist much, obey little"



19/26: Earth First!

Name: Psychedelic Ranger #80

Date: Mon Feb 05 03:22:34 1990



Some of EF!'s opinions (at least the ones held by the people such as

Dave Foreman - the so-called "founder" of Earth First!) are dogmatic

and one-away-from-the-real-issue. For instance, their main idea is that

the earths problems are due to the fact that the earth is overpopulated,

and that excess population is bad. Dave Foreman, or someone similar,

said once "If AIDS did not exist, it would be responsible for the

radical environmentalists to create one" which I think is bullshit.

They need to look back at the cause of the overpopulation, which, in

my opinion is the fact that our whole economic system and social

system seems to be based around sex. Of course there are al ot of other

factors involved as well. But I would still call myself a member of

EF! even though I don't belive in some of their ideas. I agree with them

that the earth needs to be protected and that people must learn or

pay. But, as far as some of the stuff, "throw a brick through a plate

glass window of some corrupt corporation" well, what happens then

to the shattered peices of glass? They get picked up, and thrown

away, or worse yet, just lay there. Either way, this is contributing

to the garbage and waste level. The company will just buy another

window, which pumps out more money into the economy, and puts more

money in uncle sam's pocket (taxes for instance) which propogates the

shit even further. So I think some of the "radical" actions are

(at least time-scope wise) just another part of the problem. But

there are a lot of variables here too....

I read an article in Live Wild or Die about a "puke-in" held by

protesters at a local mall during christmas season. As a protest

to consumerism, and shopping in general, several people ate a lot

of strange, colored food with various textures. Things like

yogurt, yellow jelly donuts, etc. were consumed. Then the group

each drank some syrup of icepac (dont know if that is the right

spelling) and took their positions in the mall by the Santa

setup. Before they puked, someone yelled "Shopping makes me puke"

and then puked all over the mall ground in front of everyone.

Other members in this group of people held signs sayiing things like

"The earth is dying and your shopping" and "shopping makes me puke"

while they puked and raised a fuss. However, mall security ended up

nabbing one of them, who puked in their office. THey all ended up

getting off with nothing though. Kind of an interesting story.

PR



20/26: Beautiful!

Name: Erik Bloodaxe #2

Date: Mon Feb 05 17:26:03 1990

Christmas makes ME puke.

I wish I could have been involved in that!!

Hm...how many more shopping days left?

->ME



21/26: ATI #9

Name: Jedi #67

Date: Mon Feb 05 23:43:00 1990

Does anybody have ATI #9 around? Nobody seems to have it, including

GZ, and it's all that's needed to make the collection here complete.



22/26: EF!

Name: Gordon Meyer #65

Date: Tue Feb 06 20:13:38 1990

RE: Earth First!

Our problem isn't sex per se, it's capitalism and the rape of the earth for 

profit.  The fucking Forest Service sells our national parks behind our backs, 

Uncle Sam protects the big corporation that our poisoning our water....

oh man..i'm gettting deppressed.

It's Equal Rights for all species, and the protection of Mother at all 

costs..even over and above our own economic, political, social, religious 

systems.



24/26: They won't listen

Name: Cassius Cray #135

Date: Wed Feb 07 06:57:19 1990

The Fed's are happy as long as the Trump's and Forbe's of the world are happy, 

they don't give a rat's piss about the middle class that's footing the bill. 

They'll let 10,000 acres of beautiful forest go under axe before letting some 

rich ass lose a cuple thousand  ... Editorial opinion EOL.

Cassius Cray



25/26: well....

Name: Ravage #19

Date: Wed Feb 07 09:56:11 1990

then it seems to me that some of this should go in matrix. what do ya

think mentor and et al? does it sound like something the rest of the 

community would enjoy?



26/26: It seems that way...

Name: Daneel Olivaw #9

Date: Wed Feb 07 15:59:49 1990

and it is... The government is run by the upper class for the upper class... 

as a memeber of the middle class, I speak from experience.  Trying to even get 

a lowly city council member to accept an appointment is a pain in the ass, if 

not imposible.  Doesn't the constitution guarantee some kind of freedom?

Daneel Olivaw



 _____________________________________________________________________________



                        *** {Basic Telecom Sub-Board} ***





< Q-scan Basic Telecom 3 - 77 msgs >

1/77: This Sub

> Permanent Message

Name: The Mentor #1

Date: Sun Jan 07 05:11:59 1990

This subboard is for questions and discussion on the basic working of the 

phone system - how it works, what's safe, what isn't, etc. If you want to 

discuss specific phone computers (TIRKS, LMOS, COSMOS, etc.), please take it 

to subboard #4. Also, beginners shouldn't hesitate to ask questions. There 

will be someone on here who can answer almost anything you can ask...

Mentor



2/77: Basic...

Name: Erik Bloodaxe #2

Date: Tue Jan 09 13:52:17 1990

The other day I had the good fortune to type to a fellow hacker on QSD

who asked me if I phreaked.  I said, not recently, but yeah, I loved boxing.

He asked me what "VMBZZZZ" had to do with anything, and proceeded to pester

me for codes.

This board is for YOU.

->ME



3/77: Welp

Name: Acid Phreak #8

Date: Tue Jan 09 17:51:55 1990

If codes are what he wants, then this board SHOULDN'T be for him...

--ap



4/77: Blue Boxing...Is it truly gone forever?

Name: Erik Bloodaxe #2

Date: Fri Jan 12 02:57:03 1990

Someone want to find out?

I think one of these days we Austinites should get a few tapes made of

random calls, and take a case or three on a drive out to the country, 

and look for places on step, or places with xbar toll offices and 

goddamn well find us a route to box again.  I miss the hell out of

boxing.  I used to find ALL kinds of great stuff hidden away

on the 0XX & 1XX prefixes.  

I remember one time me and a guy named MOB*RULES were scanning away

in 512, roaming the tandems, finding all kinds of strange things

that would wink and await further MF...he had some kind of MF DNR on

his line though (because of some previous entanglements) and ended

up getting a nasty call, saying to stop scanning, because

one of the things we were playing with was some kind of GSA owned

link from FTS to Bell or vice versa...kinda neat.  (At least that's what

he said was told to him...he lied a lot)

I did find both the Houston and Dallas alliance bridges...when everyone

thought there were only White Plains & Los Angeles...YES that was ME.

Houston disappeared after 4 months...and Dallas was the chosen site.

So what we need is the translate the 0700's and find a route that will allow

us to box again, so I don't have to worry about getting my Long Distance

bill ever again.

->ME



5/77: boxing under 5ess

Name: Grey Owl #10

Date: Fri Jan 12 22:55:48 1990

Could someone enlighten me?  I have heard everything under the sun about this. 

Is is or isn't is possible?

grey owl



6/77: Boxing...

Name: Erik Bloodaxe #2

Date: Sat Jan 13 00:08:53 1990

Of course it is...

The problem isn't where you box from, it's where you box to, and the

route it travels to get to a final destination.

Our problem seems to be that our trunk routing to boxable areas, 

like 806 go through areas with toll centers having CCISS

so it cuts the connection when you lose answer supervision via 2600.

That's why I want to find some area that doesn't have this problem...

->ME



7/77: After doing mass research...

Name: Phoenix #17

Date: Sat Jan 13 03:32:40 1990

Australian phone system sux.

OK - does the following... pick up a line and it completes a loop, places you 

on common equipment. The only way you can send information to the exchage is 

through thi common equipment shit, and that will only acccept dtmf tones. It 

then translates your tone, sends them to exchange <CCITT #5> and the rest you 

all know. Problem with doing any form of knocking off a trunk is that the 

second you break out of the CEPT <common equipment..> it breaks your loop, and 

you lose the line. I know all the tones and shit... all i need is a method to 

actually get the raw tones to the exchange, in orther words, bypass the common 

equipment. If anyone has any ideas....

Phoenix

<The Flatline>

Jacking out..



8/77: Fuck it.

Name: Frame Error #5

Date: Sat Jan 13 11:54:25 1990

 Everything is going digital at an incredible rate.  We should find some 

 other method that will allow us to defeat the telco, besides c0dez or 

 boxing.  It's going to be rough, I know.

 FRAME ERROR



9/77: swb

Name: The Mentor #1

Date: Sat Jan 13 15:23:58 1990

Well, my friendly neighborhood SWB rep just finished playing with my lines for 

about 2 hours. Someone needs to scan the 512-442-xxxx prefix. 0161 is the test 

number for their 3M line testers. All of the Austin COSMOSes and LMOSes (that 

he knows of) are located in San Antonio and Houston. SWB linemen are going to 

be issued CRAFT terminals in the next 6 months. 

Regarding the line, the wiring in the apartment may need to be redone. He 

split my two lines off of the quad they were on, but they're still in the same 

cable. He's going to find out when/if they can run a second cable. God, I love 

INLINE service. Makes the $4/month worthwhile...

Mentor



10/77: 442-016x

Name: Dark Sun #11

Date: Sat Jan 13 16:42:45 1990

When you dial the 0161 you get a 1000hz like a loop, but when you dial 

0162,3,or 4 you just get a click, like you were connecting to the silent side 

of the loop. But, the tone on 0161 doesnt stop (perhaps muted?)

                        BS



11/77: Whats happened to the 513 loop?

Name: Wiz #25

Date: Sat Jan 13 19:00:04 1990

For quite a while now I have been able to call the USA (I live in South 

Africa) collect on the high end of a loop. All of a sudden the other night the 

operator told me that the high end of the 513 loop (513-921-1xxx) was barred 

from accepting collect calls. This is strange because just one evenening 

earlier I chatted to the Apple Bandit for about 20 minutes. Has the phone 

company got wise to the use of loops? Is there a probem with the 513 loop 

specifically?

Any help would be appreciated, as I would be lost without loops.

MPE Wiz.



12/77: loops..

Name: Ground Zero #30

Date: Sat Jan 13 22:05:46 1990

I wouldn('t use those  513 loops/.

I'm sure they're being monitored, due

to the fact that everyone seems to be

using them. Use some other loops,

guys.  I have a bunch/...

-gz



13/77: Ground..

Name: Grey Owl #10

Date: Sat Jan 13 23:19:17 1990

Zero, could you put? up some loops for me?

grey owl



14/77: Loops

Name: Gary Seven #38

Date: Mon Jan 15 10:47:56 1990

    Hello, does anybody have any Michgan loops? Id 313,61,517,906 area codes.  

If so can ya PLEASE post them.  Thanks.  Boxing, is it true you can create 

some sort of hardware called a BOUNCER that somehow tricks ESS into thinking 

your someplace else.  Later





15/77: how do you make a bouncer?

Name: Grey Owl #10

Date: Mon Jan 15 18:02:50 1990

I don't know much about boxing...especially under ESS5!  What's the deal on it?

grey owl



16/77: Alliance

Name: Grey Owl #10

Date: Mon Jan 15 18:18:18 1990

I was on this conference a few months ago.  The AT&T people said it was 

something like November 25th.  I don't remember which conference it was, but 

it was appearantly illegal.  (surprised?)  The bitch on the other end told me 

that someone broke in to a business and beige boxed the conference, but not in 

those words.  I was pretty pissed when she told me that they could press 

charges for the $15 bucks that my part of the conference costed!  All I have 

to say about this is bullshit.  There's no way that a 15-20 minute call from 

me to a conference could cost $15.  None of them have been good enough to 

warrant more than 15-20 minutes.  I think AT&T should be shot for 

1) charging so damn much to call a friggin' conference and

2) thinking they can charge me for a reverse-billing meet-me.

If they do want me to pay, I'll just say I thought it was legal.  ("the guy on

QSD SAID it was legal...how was I supposed to know?")  They won't be able to 

do anything, right?

grey owl

(thoroughly pissed off)



17/77: ummmm

Name: The Mentor #1

Date: Mon Jan 15 21:33:35 1990

If you didn't do anything but answer your phone, you don't have to worry about 

it...

Mentor



18/77: ...

Name: Tak/Scan #44

Date: Mon Jan 15 22:41:51 1990

I never liked AT&T and probably NeverWILL!

Tak/Scan



19/77: You'll have to pay

Name: Erik Bloodaxe #2

Date: Mon Jan 15 23:46:15 1990

You called the Meet*Me

Noone forced you to call...

tough darts buddy.

->w3MEt(

w3

->ME



20/77: AT&T

Name: Phiber Cut #34

Date: Tue Jan 16 06:58:08 1990

Well I haven't read all the messages yet so someone might already have begun

to discuss this elsewhere, but here goes...

I understand that 3/4 of AT&T National network was down last night.  The

controlling systems (N something or another) were ALL down around the

county.  Rumors were that AT&T shipped itself some bad software, but

that's probably a line of shit.  They haven't ruled out sabotage or

a viruse, etc....



21/77: minor note..

Name: Phoenix #17

Date: Tue Jan 16 07:34:47 1990

owl..

correct me i i am wrong...

but one thing i would NOT say is that the guy on QSD said..

coz i dunno icalling QSD is the most legal thing in the world..

but never can tell :-)

Phoenix



22/77: yeah.  Thanx Phoenix

Name: Grey Owl #10

Date: Tue Jan 16 08:47:34 1990

I wasn't sure if trt:g (or anyone elses username:g is legal!)

I'm just pissed that they think I'm responsible if someone else breaks into a 

business and beige boxes a call.  Sheeeeit.

grey owl



23/77: AT&T Network

Name: The Dictator #43

Date: Tue Jan 16 11:12:01 1990

According to the news, the problem was with the "SS7" software, the network 

that is responsible for routing calls to their destination.  Dan Rather (who 

even looked like he didnt know what he was talking about) said that when a 

call would be placed, the network would dump the entire translation and route 

the call to the recording "All circuits are busy".

Aprox 56% (?) of the calls would not go through.

 

The Dictator



24/77: Well

Name: Gary Seven #38

Date: Tue Jan 16 18:22:48 1990

    I myself found that fucked also.  I was wondering why the Itt dialup wasnt 

working.  Along with some otherThis is the Ctrl-D Macro routines wouldnt work



25/77: stuff

Name: Silencer #31

Date: Thu Jan 18 05:38:08 1990

Well....luckily for me I was out of town during that great AT&T 

fuckup...Heheh....anyway:

Does anyone have like a list of all the different types of switching 

systems..what they are capable of.   improvements with each new ESS 

etc etc.....or at least know how I could get hold of this information?

Gary Seven....herez some Michigan loops....dunno how many work.,..but some 

must...

-------------------------------AREA CODE: 

313----------------------------------

            XXX-9996

            XXX-9997

XXX= 977, 477, 751, 721, 591, 474, 671, 552, 898, 875, 369, 465, 321, 445, 722,

     281, 626, 399, 868, 963, 683, 237, 256, 299, 886, 585, 665, 591, 561, 234,

     569, 577, 822, 776, 465, 781, 478, 272, 787, 556, 575, 224, 225, 924, 526,

     871, 995, 833, 471, 477, 252, 399, 397, 388, 277, 362, 483, 487, 497, 326,

     649, 728, 292, 942, 934, 646, 356, 644, 851, 647



god damn...lots of fucking line noise...~.-a.. sorry|....?>~| those are 

all in 313...t~ the suffixes are 9996 and 9997....the prefixes are whats 

listed.....l8r

    - SILENCER

~~/S



26/77: quick question

Name: Guc #97

Date: Sat Jan 27 10:38:10 1990

just how safe is scanning a prefix in seq. order? i recall hearing somewhere 

that ma bell will investigate if they see you've been doing so.  I have 

non-sequential dailing programs for dos, but the ones i have for my c64 are 

just sequential (0001,0002,0003) and i'd rather not tie up my XT war dialing...



27/77: seq. scanning

Name: Dark Sun #11

Date: Sat Jan 27 11:01:34 1990

I do not believe Bell has the capibility to detect this (well, I guess they 

code if LMOS can store the last #s you called), but dont implement probably 

for reasons of there thinking that it would take too much time and effort... I 

dunno... All I can really say is, MANY MANY MANY people have been doing it for 

years and no problems so far (besides getting caught by some old lady saying 

your modem was harassing her)

   Hmm.. If you dont want to tie your XT up war-dialing, then why do it anyway?

                             DS



28/77: Scanner

Name: The Genetic Terrorist #107

Date: Sat Jan 27 17:51:08 1990

Does anyone have a random prefix scanner? One that will scan randomly from

the lower bound to the upper bounded limits non-sequentially for the IBM?

If so, send it up here.

|07-|15TGT

 



29/77: wouldnt be to hard to make...

Name: Dark Sun #11

Date: Sat Jan 27 19:08:55 1990

Do you want to just take every #, scramble 'em and try each in a random order 

, or just a completely random scanner?

                                  DS



30/77: data taps...

Name: Dark Sun #11

Date: Sat Jan 27 19:10:58 1990

what is the best way to place a *STRICTLY DATA* tap on a line? (I guess it 

could record voice, but I'd like to use it mainly for data)

                                  DS



31/77: tape

Name: The Mentor #1

Date: Sat Jan 27 20:29:11 1990

What baud rate? A good tape recorder will snag 300 & 1200. 2400 I'm not sure 

about...



32/77: Yea..

Name: Dark Sun #11

Date: Sat Jan 27 21:58:07 1990

What would be a good PORTABLE model (By portable i mean easy to conceal)

                                  DS



33/77: try a VCR

Name: Grey Owl #10

Date: Sat Jan 27 23:52:14 1990

If you can spare your stereo VCR, you can monitor 3 lines at once!  One line 

on each of the stereo channels and one on video==3 lines.  Of course, there is 

a simple circuit you can build (I'll u/l it here sometime) that will turn on a 

microcasette recorder when the line goes off-hook and shit it down when the 

line goes back on-hook.  Great for leaving in those CAD Pedestals...come back 

every now and then to change the tape!

grey owl



34/77: nonononono

Name: Dark Sun #11

Date: Sun Jan 28 00:55:46 1990

You can easily conceal a stereo vcr behind someone's house or business? I'd 

love to see that!

                             DS



35/77: vcr's

Name: Ravage #19

Date: Sun Jan 28 13:52:03 1990

they make those little sony watch man with a vcr that you can hold in your

hand. the size is no problem. as for recording check out the simpti (dont

remember the exact spelling sorry) digital converters for recording audio

on video tape. very good resolution. they should handle everything you

could want to do. they are about the size of a 3 ring notebook. and if you

use a wired remote type i/o to the recorder then you could use a vox.



36/77: but

Name: Phoenix #17

Date: Sun Jan 28 14:13:30 1990

whod want to buy a tiny sony vcr for x millions of dollars ?

and then leave it behind someones office, running the risk of never seeing it 

again ?

well - id just jump at the chance todo something like that ;-)

phoenix



37/77: 2 thing

Name: Guc #97

Date: Sun Jan 28 17:02:01 1990

re: wardialing

first off, i seriously doubt anyone will complain about someone harassing them 

when someone is wardialing.  you only call each number one time, and how often 

do you call ma bell when someone calls and doesnt say anything just once?

secondly, i just said fuck it and started from scratch on a non-sequential 

wardialer for my 64, i just need to come up with a decent algorythem that will 

eventually do all numbers in a prefix, while not doing the set sequentially.

re: datataps

i got mine working virtually error free upto 1200 baud.  i've not tried 2400 

baud yet, but will soon.  300 baud is damn easy and doesnt really require 

quality equipment, but noone uses 300 anymore, at least noone who has a 

password i'd give a fuck about.

the vcr idea is a good one, but as Dark Sun pointed out they're rather hard to 

hide.  i can cram my microcassete recorder INSIDE a phonebox.



oh, right before the system went down last year, there was a discussion on 

slowing down tape roters to get more time per side, has anyone had any success 

doing this? If so, let me know, I'd love to find out how.



.s



38/77: one more thing

Name: Guc #97

Date: Sun Jan 28 17:07:22 1990

has anyone *recently* scanned 794-XXXX?  If so, please upload the data, it'd 

save me a few days work.



39/77: no, but

Name: Dark Sun #11

Date: Sun Jan 28 17:25:40 1990

I'm gonna start on 5000 and go up tommorow, then I'll post the results

                              DS



40/77: Well...

Name: Grey Owl #10

Date: Sun Jan 28 18:36:18 1990

one guy did manage to leave his VCR in a Telenet place.  It was nothing but a 

room in a mall with lots of X25 machines and cooling equipment and phone 

lines.  The idea is that it's a stolen VCR, hopefully.  

grey owl



41/77: First of all....

Name: Dark Sun #11

Date: Sun Jan 28 19:55:22 1990

That was a fuckin' text file, and I myself doubt he really did it.

                             DS



42/77: Random Dialing

Name: Daneel Olivaw #9

Date: Sun Jan 28 22:14:41 1990

All you need is a perfectly random alogorithm, it'll never repeat until it has 

done all of them once.... alas, it doesn't exist.

I see no reason to even bother....

Daneel Olivaw



43/77: hmmm

Name: The Mentor #1

Date: Mon Jan 29 00:05:53 1990

Ok, I'd set the algorithm to make a 10,000 byte array and start filling the 

slots with a random number generator. Once all the slots had been filled 

(actually, I'd fill about 90% then assign the rest sequentially in leftover 

blanks), write the thing to a data file and have the hacker use it.

Mentor



44/77: DataTaps

Name: The Dictator #43

Date: Mon Jan 29 01:23:08 1990

DataTaps are fun to mess with...Whoever said that no one uses 300 baud 

anymore..Bahahahaha...  Most of the small-time companies that connect to TRW, 

COMPUSERVE, etc...use 300 baud ...  At least out here.  Ive encountered a lot 

of 300 bauders.

 

The dictator

 

Not that I would do anything as evil as datatap anybody...nnonono..



45/77: sony watchmans...

Name: Ravage #19

Date: Mon Jan 29 11:17:19 1990

are only a couple of hundred bucks. it seems to me that if one doesnt have

the resources to do the job first rate they shouldnt be doing it. this

may account for the rash of busts, technological pre-emminance. the feds

have a technological edge and are using it.



46/77: random..

Name: Phelix The Hack #89

Date: Mon Jan 29 12:15:30 1990

The problem with simply gerating random numbers is that the seed is likely to 

generate the same number more than once and some numbers not at all.  Ex: a 

random number generator is told to generate 10000 numbers between the numbers 

1 and 10000...it is certainly "possible" that all of those numbers will be the 

same.

 

Here is a basic algorithm which will allow a non repeating FULL random number 

scan.

   

NOTE:  most of this example will be written in PASCAL with occasional explain 

nations in C.  I will also assume that this is used to scan a certain prefix 

so the boundaries will be 1 to 10000  (or actually 0 to 9999...to save word 

space...we must be FRUGAL!)

 

ok..define the following structure:

 

TYPE

    hackrec = record of 

         hackattmpt : integer

    end;

VAR

^^^ whoops ...ignore that

    

    hackarray = array[0..9999] of hackrec;

VAR

    hack : hackarray;

 

ok..now initialize ALL elements "hackattmpt "to the array index..ex:

 

    for count = 0 to 9999 do

         hack[count].hackattmpt = count;

when a number is randomly generated it is substituted as the index for the 

particualr array location..ex: the randomly generated number is in the var 

rand...hack[rand].hackattmpt  would be the reference to the actual number 

displayed.FD?

    

Every time a number is used ..the field hackattmpt is changerd to hold the 

number of 9999 (or whatever the last element is); and the filed at index 9999 

is changed to the original index + 1.

 

A chck is made to see if a randomly gernated index holds a value of 9999..if 

it does it will make its new index hack[9999].hackattmpt...and will continue 

...

 

its that easy...any questions?



pth.



47/77: Okay heres a question

Name: Alter Ego #110

Date: Mon Jan 29 16:29:11 1990

y'all were talk about Electric Switching Systems and you refered to them with 

numbers i.e. #1, #5... whats the difference between the two(besides the 

number)???

Alter Ego



48/77: phelix

Name: The Mentor #1

Date: Mon Jan 29 17:35:41 1990

Hmmm... I thought that was what I suggested doing... nice algorithm, though. 

<scratches head, goes back to reread post>

me



49/77: difs...

Name: Erik Bloodaxe #2

Date: Mon Jan 29 19:05:42 1990

the differences between types of esses are subtle...they have to do with new 

features, amount of traffic they are capable of handling, etc...

One of the fortune 500 scanners runs off of an array 0-9999...it also stores 

busys etc, so you can retry them...

The thing about the vcr tapping telenet/tymnet whatever...was that agent 

steal's file/idea/whatever?  I really think that was just bullshit.  Although 

I could be wrong...

And by the way...I'm at 300 baud...but I don't guess anyone would be 

interested in any of the things I'm into...

->ME



50/77: Hmm...

Name: Daneel Olivaw #9

Date: Mon Jan 29 21:02:41 1990

ESS: Electronic Switching System...  my understanding (from a tech at SWB) is 

that the 7ESS can handle over 40 million simultaneous transmissions (i.e. data 

or voice or video), and I beleive over 4 million independant phone circuits. 

Theoretically, one 7ESS could handle central Texas...

After I beleive 3ESS, they made a drastic move towards more ISDN support, and 

the 5ESS is the most popular here in Austin, I think there are 5 of them (not 

including redundant units, usually 2 per setup)

Something that I remeber from working for a legal newspaer locally is showing 

people how to use their TRW terminals to search our online legal database.  

Those 300 baud pieces of termal paper fueled shit... but they worked... I 

remembered (luckily) a few of the accounts, but all are now invalid... oh 

well.. such are the breaks.

Daneel Olivaw



51/77: look into

Name: Ravage #19

Date: Mon Jan 29 23:13:46 1990

key hashing algorithms. you may be able to break the big array of numbers 

down into smaller groups. you could then select the two groups based on

two seperate keys, group and member. this would mean that at any one time

you would only be hashing one small group of keys. since very few search

algorithms are linear but rather logarithmic a simple halving can have

quite a bit of effect. just a thought.



52/77: Dialing algorithms...

Name: Pain Hertz #84

Date: Tue Jan 30 02:12:53 1990

Pick a random number, 0 - 9999.  Pick another random number 0 - 9.  Say the 

first number is 3849 and the second is 3.  We are dialing the 512 exchange so 

dial...

   512-3849   add the 3 to first place of last 4 digits...

   512-6849   add the 3 to 2nd place of...

   512-6149   add the 3 to 3rd...

   512-6179   add the 3 to 4th...

   512-6172   

 

follow?  if the sum is greater than 9 just subtract 10.  Count how many youve 

dialed, store the last number, position 1-4, and the number 3. and you can 

start and stop whenever...

 

Also, this is going from left to right.  If im not mistaken, you can choose 

the digits to add to in 24 different ways (4!)  so pick another number 1 - 24.

This algorithm won't repeat until youve gone through all the numbers.  How 

many different orders are their to dial using this method?  Well a bunch...

 

I hope everyone can follow this...  if not perhaps Ill write something a bit 

more formal.                 -PHz



53/77: Speaking of

Name: The Blade #64

Date: Tue Jan 30 13:29:07 1990



Where has Agent Steal been?  Havent seen him around for 2 months or so.



Blade



54/77: that file

Name: Grey Owl #10

Date: Tue Jan 30 17:39:47 1990

Whether or not Agent Steals file was shit or not is not the point.  The point 

was that it COULD be done.  His plan was (practially) flawless so it is 

possible that he did do it.  Are you confused yet?

grey owl



55/77: Slowing tapre recorders

Name: The Inspectre #63

Date: Tue Jan 30 23:15:24 1990

  Somebody asked about slowing tape recorders a while back.. 

  It's really easy to do on standard portable sized tape recorders, just open 

the thing up, find the motor (it runs the tape motors via a rubber band over a 

large wheel), yank off the small wheel on the motor and replace it with a 

piece of heat-shrink tubing or other soft rubber tube. Then put the drive band 

back and see what recordings sound like. I've can get about 250 minutes on a 

C-120 with decent (but not great) sound quality with this method. 

  There's a way to get much longer play times with decent quality recordings, 

but it requires taking out the drive band system and rebuilding the link with 

a slower gear drive system, but most recorders are hard to convert easily and 

usually a VOX is a better investment.

   The Inspectre

/e

/d



(doesn't this system let you edit a message?)



56/77: motor speed...

Name: Ravage #19

Date: Wed Jan 31 12:15:06 1990

can be controlled directly by using a 555 timer to control a 2n2222 transistor

in series w/ the motor. by varying the duty cycle you can get a lot of speed

control w/o a loss of torque, a problem w/ varying the diameters of the 

pulleys, except at the very lowest speed. total cost is about $10.

 

                                                 ravage

                                                  back

                                                   in

                                                    black



57/77: mentor

Name: Phelix The Hack #89

Date: Wed Jan 31 12:42:03 1990

sorry...must have misread your "random" post...



pth



58/77: ravage

Name: Grey Owl #10

Date: Wed Jan 31 14:38:12 1990

That does sound like it would work (coming from you, I'm sure it does) but 

some people arnot electronically oriented as that (me, for one).  It would be 

easier just to get a VOX or change the size of the drive gears.  (or get a 

crappier motor!)

grey owl



59/77: the basic circuit....

Name: Ravage #19

Date: Thu Feb 01 10:46:24 1990

can be found in most electronics texts under motor controller. it only consists

of about 8-10 pieces and is a good intro project.



60/77: Tape Recorders...

Name: Nemesis #122

Date: Thu Feb 01 23:50:29 1990

    Well a _vox is easy, and switching pulleys is easy,{so if you use both of 

them, you~ could probably get a whole lot out of it... However, if you can 

put out a little money, Id rely recomend a real to real.. itdoesnt have to be 

a 8 track or 16 track.. not even a 4 track.. but you can get a lot more tape 

on one of those things then on the largest cassette... I mean a LOT.



61/77: 7e??

Name: Psychedelic Ranger #80

Date: Fri Feb 02 04:13:08 1990



Is this 7ESS brand new? I have not been up on the latest technology

as far as switching systems go, I have been concentrating on VAX/VMS.

The ESS versions I am familiar with are as follows:

1,1A,2,2B,3,4,5. The 5E, along with the Siemens EWSD, NTI's DMS-100F (dms

100 family of switches) are generally setting up the stages for ISDN.

The 4E's are set up in toll switch applications in most cases. The 1,

1A,2,2B, and 3 are set up for different areas, they have different

traffic capacities, different configurations, links to SPCS's, etc. etc.

If you would like, I can post several msgs. about switching systems,

just let me know and I'll post a bunch of specs. if you want them.

Psychedelic Ranger  -  Riding the forefront of the psychic revolution!! haha



62/77: Badger

Name: Psychedelic Ranger #80

Date: Fri Feb 02 04:34:10 1990

Is anyone else on here familiar with the BADGER test units? There is a

Change Notice on one that sounds very interesting....



63/77: well....

Name: Ravage #19

Date: Fri Feb 02 13:04:20 1990

put them up already!

this is supposed to be a teaching board right? why wait for someone to ask?

i know a lot of the folks on here have a lot to learn, including me.



64/77: would you get a little better quality

Name: Dark Sun #11

Date: Fri Feb 02 14:44:35 1990

if you sped up the tape? Even if you only got 15 mins it might be worth it 

(for what I'd like it for I wouldnt need omre than about 10 mins a shot anyway)

                             DS



65/77: 7ESS

Name: Daneel Olivaw #9

Date: Fri Feb 02 22:42:59 1990

It is my understanding (from someone at ATT & SWB) that the 7ESS simlpy offers 

more capacity. I know that 3M's 7ESS will be picking up several exchanges in 

Austin (i.e. Bee Caves, Fairfax & Fireside), and that they are reselling it 

back to SWB.  Other than that, I'm not sure of the increased capabilities.

Daneel Olivaw



66/77: Tape

Name: The Inspectre #63

Date: Sun Feb 04 14:20:58 1990

  Speeding up the tape will get you some improvement if you use quality tapes, 

but you could just go spend $300 on a Nakamichi and get great quality.



67/77: But

Name: Psychedelic Ranger #80

Date: Mon Feb 05 03:26:17 1990



But I cannot post the whole damn manual...it would take several months

just to type the thing in! I have other things to do...but Ican

provide some info! Hm. wouldnt it be nice if we could sort of

"concentrate" all the text in the manual into a very short transmission

of data at an extremely high transmission speed that you could

"un-concentrate" and then read? sounds nice....

Psychedelic ranger



68/77: A800

Name: Psychedelic Ranger #80

Date: Mon Feb 05 03:33:36 1990



Anyone on here know how to connect to non-standard routing/system

codes without engineering an operator, a toll test board, or boxing

the call? I'm talking of other ways...

PR



69/77: 7ESS

Name: Phelix The Hack #89

Date: Mon Feb 05 11:21:57 1990

Well...

7ESS was introduced in its Beta stage late 1987..as a competor to NT fully 

digital DMS series..the 7ESS is supposed to be essentially a 5ESS& that is 

capable of full didgital support right down to the A-D convertors...designed 

for a upper level CCIS(like 7)...and WITHOUT having to either software/patch 

or adjunt frame the existing switch...AND in that it is Western Electric..the 

plant engineers do not have to learn anything terrible different from what 

they already know.

 

As far as unusual routing/mapping...there are a few interesting WATS lines 

that allow a dirct map to AT&T's DOM with out having to blow MF..thats right 

it is all done thruogh a DTMF menu!..pretty handy.



pth



70/77: TIRKS

Name: Grey Owl #10

Date: Mon Feb 05 16:42:11 1990

Psy:  could you possibly FAX it??  I'm not sure about what it costs to have 

something faxed, but I would be willing to pay for some fax charges.  What 

city are you in?  

grey owl

ps-why don't we continue this in e-mail Ranger..



71/77: ...

Name: Tak/Scan #44

Date: Mon Feb 05 23:19:42 1990

Anyone have a DMAT for NPA-619. thankx.

The 4th Dimension! 619-745-1xxx. Login PW-SPECTRUM. Newuser PW-Gunship.

Tak/Scan



72/77: DAMT?

Name: Psychedelic Ranger #80

Date: Tue Feb 06 03:24:17 1990



Do you mean DAMT maybe?



73/77: WHY?

Name: Phelix The Hack #89

Date: Tue Feb 06 11:58:21 1990

DAMT's have to be one of the biggest wastes of time..(right up there with 

Terradyne Fortel)...

/t



74/77: h

Name: Dtmf #27

Date: Tue Feb 06 19:48:02 1990

Anyone know anything about an Ericson Switch?  I was, uh, well, anyway, I 

found this thing about an ericson (sp?) switch laying around...Said they were 

going to put one in here in texas...Along with some REAL serious ISDN shit in 

a few months...Eek, scares the hel loutta me....



75/77: 7

Name: Nemesis #122

Date: Wed Feb 07 01:04:42 1990

     From what I have heard, ESS7 is suposed to handel A LOT more than ESS5, I 

dont recall exact numbers, but it was an incredible ammount.  I have also 

heard rumors that ESS7 is what is going to be the "official" type of switch 

for ISDN, apparently is is already equiped for ISDN, whereas 5 needs to be 

interfaced somehow.  However what all this means on a basic level is nothing 

realy, other than that you will have a lot more places on the same switch 

under 7...Nice, so you dont have to find a different test number dial up for a 

bunch of different areas.

   I have a list of a bunch of DAMTs in the 619, around here somewhere, I cant 

find it right now, but Ill leave them for you on your board if you like.  They 

are, however (like Phelix said) quite wortless.



76/77: 7ESS

Name: Daneel Olivaw #9

Date: Wed Feb 07 16:01:35 1990

Your right, but since my docs to the 5ESS predicted ISDN by 1989....  hehe... 

I know that where I live, we are due to receive ISDN first in this area, but 

who really knows when.  The 7ESS is manly designed for more raw capability.. 

what you do with that is what's important.

Daneel Olivaw



77/77: austin

Name: The Mentor #1

Date: Wed Feb 07 18:45:54 1990

Austin just added two class-type features: distinctive ringing & one other. 

What is it? Damn, brain damage has set in.

Mentor







____________________________________________________________________________



                         *** {Hacking Sub-Board} ***



< Q-scan Basic Hacking 4 - 58 msgs >

1/58: This Sub

> Permanent Message

Name: The Mentor #1

Date: Sun Jan 07 05:13:15 1990

This is the area for basic hacking discussions and questions. If it relates to 

a specific system, there is probably a subboard dedicated to it; but if you're 

just interested in how to get started, or what's popular and what isn't, etc., 

this is the sub.

Mentor



2/58: Hmmm

Name: Konica #47

Date: Mon Jan 15 16:08:52 1990

Well I don't see a sub for IBM's so here is my question.When you connect to an 

IBM 3708 you type port password but what do the passwors usually consist of? A 

First and Last name or does it require numbers or something?

3/58: 3708's

Name: Erik Bloodaxe #2

Date: Mon Jan 15 17:26:35 1990

The company I used to work for had one set up on an 800 that all the

agents would call in to get policy information on people.

They had all their info for logon set up as a host file on FTTERM...

I read the file, and their port password was IMSPROD or something

like that...It was relevant to the system...

If you have a IBM for some specific company, try system passwords

relevant to that company or its function.  Obvious information, right?

Well, just saying that there isn't any set "DEFAULTS" or anything like

that.

->ME



4/58: Well...

Name: Konica #47

Date: Tue Jan 16 16:48:14 1990

I guess I should go and buy a book on it. Thats where I will learn to program 

it. The only thing I hate is that the book can only teach you to program it. 

Not to hack it. Just like any other mainframe.



5/58: IBM

Name: Sicilumm Thorne #28

Date: Fri Jan 19 15:31:26 1990

RE: Well...

    IBM.  If itt's actually IBM you are trying to get into with FTTERM or any 

of the other cheazy terminals, good luck.  Each account ports three times and 

then the owner has to chance their password every two weeks.   Security has to 

validate the passwords, and they cannot be words.  If you fuckup entering the 

password, you cannot try again later.  The account is turned off until the 

owner gets realtime sig'd.  Oh well.

    Sic.DAYVM1



6/58: IBM

Name: Dark Sun #11

Date: Fri Jan 19 17:33:20 1990

RE: IBM

well, here in austin (AUSVM1,3,6,8), you get about 5 attempts before the 

account is turned off for 24 hours, and security doesnt have to validate the 

passwords. Maybe this is just a site-specific security rule. Personally, I 

wouldnt mess with ftterm because pcterm's twice as good (with data compression)

                        DS



7/58: Hum..

Name: Warf #81

Date: Sun Jan 21 21:48:14 1990

    I have the phone number to my school's mainframe.  I just need a good 

hacking prog.  Anyone have one?  Call sometime..



Call Now!

The Dead Zone

602) 844-0365

SysOp: Warf

Sorry about the NO color.  It used to have color.  Oh well.. hehhe!!

                                   <=[Warf]=>



8/58: that #

Name: Dark Sun #11

Date: Mon Jan 22 15:34:52 1990

was for informational purposes only,right?? :-)

                                 DS



9/58: what's this?

Name: Grey Owl #10

Date: Mon Jan 22 16:47:30 1990

If a system logs me on at 1200 baud with E71, and sends...

                            GLENAYRE 4.1.D TERMINAL

and then some miscelaneous commands after the header, what does this look like 

to you?

grey owl



10/58: Well...

Name: Erik Bloodaxe #2

Date: Mon Jan 22 18:24:38 1990

depending upon what the "miscellaneous commands" are, it could be a ton 'O 

things...

post the number and I'll check it out if you want...

->ME



11/58: I found

Name: Gary Seven #38

Date: Tue Jan 23 12:28:00 1990

I found a Vmb system owned by Gm motors.  Coincidently i found 2 carriers next 

to each other and close to the Vmb.  i think they are PRIMEs from Gm.  if 

anybody wants the numbers i will gladly mail them.  Later



12/58: ....

Name: Tak/Scan #44

Date: Tue Jan 23 22:20:43 1990

Yeah, Gary go ahead and send me those primes in mail and I will take a look aT 

Them.

 for information purposes-

The Fourth DImension BBS

619-745-1xxx

Login pw=Spectrum

New user pw= GUNSHIP



13/58: things...

Name: Erik Bloodaxe #2

Date: Tue Jan 23 22:57:29 1990

I think it's time for your friends at The Legion of Doom to start a new 

service...(with great help from friends)

Decryption service!  On any unix or Prime, send the etc/passwd file, or the 

UAF file to the sysop directory, and you will be mailed back the encrypted 

passwords...(on UNIX< any pw that the deszip could bust)

The Prime UAF  must be in binary, so kermit it from the site, and xmodem it 

here.

In return, we will not distribute any information gained from your site, but 

we will probably look arounnd it anyway...but it will remain between you and 

us.

What do you people think?  Bad idea?  Good idea?  Hell...It is just another 

attempt by me to piss everyone off.

->ME



14/58: aha..!

Name: Phoenix #17

Date: Wed Jan 24 01:30:35 1990

umm...hmmm

<doesnt know what to say..>



15/58: Heck

Name: The Parmaster #21

Date: Wed Jan 24 07:48:01 1990

    Personally i like it :-)

Jason.



16/58: Decryption

Name: Grey Owl #10

Date: Wed Jan 24 19:10:52 1990

I think it's a great idea.  I get a whole shitload of passwd files and some 

UAF files too.                 \\\______got!

grey owl



17/58: Just a couple of questions...

Name: Konica #47

Date: Wed Jan 24 23:41:13 1990

Well since the feds know this is a hacker board whats from stoping them from 

tracing every incoming call to Pheonix Project and getting all the #'s, then 

monitoring then for illegal activity?



And just say I was calling through my personal calling card.....What would 

they get as the incomming #?

If I had a DNR on my line is there any way I could find out?

Sorry about this but I am not as good as most of you (except for the guy that 

keeps posting codes) and the only way I am going to learn is by trying shit 

out and asking questions....

Hope this is the right sub for these questions....



18/58: vv

Name: Dtmf #27

Date: Thu Jan 25 03:22:29 1990

RE: Just a couple of questions...

To check the DNR the best bet woud be to call bell security, or the SCC



19/58: well..

Name: Phoenix #17

Date: Thu Jan 25 07:27:43 1990

nothing stops them from tracing..

I dont know how it works there.. but down here all traces are illegal unless 

they are for drug/murder reasons.. <well not traces, but taps are..>



20/58: Feds...

Name: Erik Bloodaxe #2

Date: Thu Jan 25 17:05:35 1990

Absolutely nothing would stop them from collecting all local calls, and/or any 

longdistance company records of calls coming into this number...in fact, I 

kind of expect them to at least get all local calls here...hell Austin is all 

ess...most of them 5's...(I think...maybe 1's)

However, I doubt that tapping the data line is worth their while...especially 

when they can just log on and read everything anyway.  And the mail just isn't 

that spectacular...

In any case, all calls here made by legal means are legaal, so don't worry 

about it.  Just because tee nature of this bbs isn't that of your average 

mainstream bbs, doesn't negate its legality.  Information posted here is kept 

legal.

If you are truly worried about it, don't call, and sit home being paranoid.

Hell, I'm local...I call direct...and now I do it at 300 baud.  Hell, I can 

almost tell what's being typed at 300 baud while listening to it...forget the 

data tap!  Hehe, although a 300 baud data tap is SO simple to playback 

completely error free...at 1200 or 2400 you kind of have to get the recording 

levels just right...but 300 gives you plenty of room for error...

->ME



21/58: ess 1,5

Name: Dark Sun #11

Date: Thu Jan 25 20:14:00 1990

hey, whats the diff??? :-)

                                  DS



22/58: decryption

Name: Silencer #31

Date: Thu Jan 25 23:35:01 1990

hmmm....like...you mean once you have an account...read the user file and then 

you will deencrypt all the passcodez...sounds good....but what the fuck is 

kermit...

    - Silencer



23/58: kermit

Name: The Mentor #1

Date: Fri Jan 26 10:11:23 1990

Kermit is a 7-bit transfer protocol that is used to transfer files to/from 

machines. It is mostly found on mainframes (it's a standard command on VAX, 

for instance). Kermit has the added advantage of being able to work through an 

outdial (because it is 7-bit).

Mentor



24/58: Kermit

Name: Sicilumm Thorne #28

Date: Fri Jan 26 11:20:10 1990

    Kermit is merely another transfer protocol like Sealink, Xmodem, Modem7, 

Zmodem, et cetera.

    Its relatively slow, but was thought to be better than Xmodem, due to its 

capabilties.  (Don't remember what they are, I use Zmodem).

    Sic.



25/58: my kermit

Name: Ravage #19

Date: Fri Jan 26 12:24:21 1990



lets me set it at 8 bits also. just another trivial note.



26/58: from what I know...

Name: Dark Sun #11

Date: Fri Jan 26 16:26:55 1990

kermit was originally designed to allow transmission of data across 2 

computers running with different parity settings.

                             DS



27/58: and..

Name: Phoenix #17

Date: Sat Jan 27 07:28:45 1990

as a major disadvantage.. it is damn slow!

Phoenix



28/58: Well....

Name: Johnny Hicap #45

Date: Sat Jan 27 21:28:18 1990

No one answered that question (forget who posted it) that if he was calling 

through a calling card is it possible to get the number of the person who 

called even he was calling through hs calling card? What would they get as the 

number comming in? Would they get the card? Of course then they would just see 

who owns it.

JH!



29/58: more Kermit BS

Name: Grey Owl #10

Date: Sat Jan 27 23:53:57 1990

Kermit is slower than Xmodem, BTW.  The packets are smaller (usually 64 bytes) 

and the error-checking is shot to hell with any line noise.  It's better than 

ASCII though!

grey owl



30/58: packets for kermit

Name: Dark Sun #11

Date: Sun Jan 28 00:56:35 1990

can be something like 2k in the newer unix releases (something like that)

                             DS



31/58: 2k kermit packets

Name: Grey Owl #10

Date: Sun Jan 28 11:58:24 1990

that'll be the day when Telix supports that!  So what if the unix can handle 

it...you have to have it at both ends.

grey owl



32/58: but

Name: Phoenix #17

Date: Sun Jan 28 14:14:31 1990

ill post c source or zmodem up here, lots better than kermit.. and can be used 

thru net as wll.. coz it too sends in packets!

33/58: kermit

Name: Guc #97

Date: Sun Jan 28 17:03:21 1990

doesnt ms-kermit allow one to set the packet size?

.s



34/58: xmodem

Name: The Mentor #1

Date: Mon Jan 29 00:06:28 1990

If you need xmodem source, there's a copy of it in FORTRAN for a VAX in 

library 1.

Mentor



35/58: i have...

Name: Guc #97

Date: Mon Jan 29 08:37:35 1990

x,y,&zmodem for unix, if anyone wants it uploaded, let me know..

.s



36/58: source

Name: The Mentor #1

Date: Mon Jan 29 17:35:58 1990

Do you have the source? If so, please u/l...

me



37/58: that old question...

Name: Erik Bloodaxe #2

Date: Mon Jan 29 19:08:44 1990

hell, I don't even remember what the specific question was myself...

however, on my bills it says:

512-441-0xxx

  CC Call from NPA-NNX-XXXX (where the call was made from)

->ME



38/58: the one i mentioned

Name: Guc #97

Date: Tue Jan 30 09:29:38 1990

does not include the source, but i'll check around on various archive sites 

and see if i can find anything.





39/58: new development

Name: Grey Owl #10

Date: Tue Jan 30 17:41:09 1990

What are some common Cosmos passwords?  Do any defaults exist?  How long are 

the passwords, typically?

grey owl



40/58: Cosmos

Name: The Dictator #43

Date: Thu Feb 01 02:37:02 1990

Cosmos is a dirivitive from Unix.  Try any Unix default and see if you have 

any luck.  Ive seen a wide variety of logins/passwords from system to system, 

but this is the case for ANY computer system.

 

Just jump in with both feet and swim toward shore.  Make sure you dial 

"safety" so those "big-bad sharks" dont tear you apart on your way.

 

The Dictator



41/58: hey

Name: Alter Ego #110

Date: Fri Feb 02 20:40:46 1990

y'all... a friend of mine has to debate FOR hacking... so we need reasons that 

support the affirmative... got any ideas... either leave me e-mail or post it 

here and I'll capture it for them... thanx...

Alter Ego



42/58: for hacking

Name: Grey Owl #10

Date: Fri Feb 02 21:57:38 1990

REAL hackers improve systems that they get into.  They might have to read 

sensative mail, but the eventually find stuff that needs fixing and fix it.  

Check out Steven Levy's book _Hackers_ to find out about the early hackers and 

what the hacker ethics are.  They will help your friend dispell myths about 

what and who hackers are.  This is a good chance to spread the good word about 

hacking.

grey owl



43/58: _Hackers_

Name: Daneel Olivaw #9

Date: Fri Feb 02 22:45:04 1990

I dunno about dispelling myths... my understanding is that he was not in the 

Inner Circle (as he claimed), or many of the other groups.

As for how to argue for hacking... got to have a good definition... that is 

the best start.  I hacker is in it for the challenge of it primarily, and does 

NOT destroy anything other than that required to cover his path.  (Mentor.. 

you wanna interject a little ethics?)

Daneel Olivaw



44/58: i think...

Name: Dark Sun #11

Date: Fri Feb 02 23:11:59 1990

That anyone who has to debate for reasons to hack really shouldnt anyway... 

The person must not really want to do it and just thinks he/she does... Any 

comments on this opinion?

                             DS



45/58: Kermit (some more)

Name: Mr. Slippery #72

Date: Fri Feb 02 23:37:12 1990

I believe that there is a mainframe Kermit version but I'm not sure

if its VM or MVS. In any event, if you have kermit you can expedite

getting things on and off any mainframes you come across.



46/58: Kermit...

Name: Pain Hertz #84

Date: Sat Feb 03 03:13:36 1990

...is available for several mainframes.  I know of a machine running VM as 

well as a machine running MVS that have Kermit.  Also, kermit is quite popular 

on the VAXen running VMS.  I also know of a Sperry 1100 that has kermit.

                            -PHz



47/58: hacking...

Name: Alter Ego #110

Date: Sat Feb 03 07:16:58 1990

RE: i think...

Well I know that they another person both choose hacking to debate on so the 

filp a coin as towards which debated for and agaist it... They got for it 

although against will be a helluva lot easier to do... for their wanting hack, 

they say the do so I'm gonna pick-up a power supply for my other modem and 

loan it to them... this way y'all can talk to them directly....

Alter Ego



48/58: hacking...

Name: Erik Bloodaxe #2

Date: Mon Feb 05 00:48:18 1990

weird...what a wild debate class you must have...

Actually, there is NO arguments to support illegal hacking, just as there are 

no arguments to support peeping in windows...

Hacking is my one true love, but I can't justify it any further than to say it 

gives me extreme pleasure and is one of the most addictive things I have ever 

experienced, and now that I've had to almost stop for a while, the withdrawls  

are terrible.

Going and nosing around someone's system may end up in the security on that 

system being improved, but if you weren't supposed to be there to begin with 

that need shouldn't have existed.

TO paraphrase Richard Stallman, hackers today just play a kind of sick game 

with administrators...one constantly tries to outwit the other, and although 

the end product may be better security, the time which should be spent on 

actual programming and research is wasted in securing the system and playing 

the mind games with the hacker...

Hell, what do I care...I used to run around with my other pervert friends and 

spy on women through windows in apartment complexes...

(hehe, phoenix and I were talking about this today...)

It's the same kind of thing...people get their jollies by looking at things 

they know they shouldn't be looking at...

so I'm an electronic voyeur...fucking shoot me...

->ME



49/58: COSMOS

Name: Phelix The Hack #89

Date: Mon Feb 05 11:26:19 1990

Well where  COSNIX  is essentailly a bastardized unix shell..I think that you 

will have more luck attempting to try accts in the following format:

 RS0X  MF0X  LA0X SF0X..etc...where RS is the particular field office that 

uses the particualr Cosmos in question..and X is a digit 1-9...

ptjh



50/58: COSMOS

Name: Grey Owl #10

Date: Mon Feb 05 16:44:07 1990

I'll be sure to try that.  So, San Antonio would be SA then...hmmmm.  

grey owl



51/58: COSMOS commons

Name: Psychedelic Ranger #80

Date: Tue Feb 06 03:35:52 1990



You could also try department names such as NAC (network admin. center),

LAC (loop assignment center), RCMAC (recent change memory admin. cntr),

etc., and the ones that phelix mentioned, like RSxx, PAxx, RSxx, RCxx,

NAxx, MFxx, FMxx, and possibly COMx but I think those are usually

defined to be logonable from certain devices only if I remember right.

Or can be defined that way (Message and all that).  If you are looking

for WC's, you can get them a shitload of places. Just go trashing

and you'll be likely to get some CLLI codes (common language location 

identification) which contain the WC. The breakdown for some CLLI

codes is something like this: BSTNMABS61T. I think this is the right

number of digits. SO this would be BSTN = BoSToN, MA = Massachusets, BS = Wire 

Center name, 61T = office designation number. So if you are on the

COSMOS that serves this WC (of course COSMOSes dont have to be in the

same NPA as the numbers they "serve", for instance the COSMOS systems

could be centralized in a major city, corp. HQ or something, or some

big MMOC or something...and all the NPA's in that state can then

dial in (or have a hardwired terminal in some cases) to the centrzlied

cosmoses. This happens, and goes contrary to the outdated file on

COSMOS by Lex Luthor and LOD/LOH from 1984. But there is still come

(should be some not come) good info in those files. 

Psychedelic Ranger

WC# SIR

H TN nxx-xxx/nxx-xxxx/CS 1OF/.

_



52/58: ANI

Name: Cassius Cray #135

Date: Tue Feb 06 06:24:59 1990

Are there any good write ups on ANI? And to the guy who said he had DNR's on 

his line--- can you tell when one is on your line?  Is there clicking or does

your sound go to shit?  Maybe I'm getting to paraniod... Well they do say,

"Paranoia is nothing to be scare of."

Cassius Cray



53/58: well..

Name: Phelix The Hack #89

Date: Tue Feb 06 12:02:32 1990

Grey Owl:..well not actually ..I think you misunderstood what I meant...RS 

would be Repair Service...MF..Main Frame..etc...refering to the particular 

field office in question...NOT the city..

 

As far as WC's...I have found the the mall queens that are using Cosmos/Work 

Manager..etc...are more than willing to not only tell you which COSMOS they 

use..but all of the WC's it services..

pth



54/58: Tapping

Name: Daneel Olivaw #9

Date: Tue Feb 06 17:34:50 1990

is easy to detect... the line voltage drops, just like when you add an 

extension.  The only problem is that the FBI will usually have your voltage 

boosted so you'll never know... hehe... they aren't as stupid as they look.

Daneel Olivaw



55/58: df

Name: Dtmf #2


 ______________________________________________________________________________



                    *** {Phone Co. Computers Sub-Board} ***





< Q-scan Phone Company Computers 5 - 46 msgs >

1/46: This Sub

> Permanent Message

Name: The Mentor #1

Date: Sun Jan 07 05:14:56 1990

This is intended for fairly high-level interchange on specific phone company 

computers and the switching systems. If you want to ask "Are 950s safe?", 

please use subboard #2.

Mentor



2/46: Things...

Name: Erik Bloodaxe #2

Date: Tue Jan 09 14:09:54 1990

Recently, people have asked me to do some pretty wild things for them.

One in particular, although not terribly wild, was to put up an

800 number for a bbs.  Very very simple thing.  This is the kind of thing

that should be discussed on here.  

First off, does anyone have access to their local bell computers?  If so, say

so.  I would love to tell you all what to do on these things, but I

really don't want to just pass on theory, I'd rather see it put into use.

I'm planning quite a dandy COSMOS file sometime, which should make anyone

who uses it, "KING" of COSMOS.  

Another point:  The various bell packet networks.  You all should know by now 

about the RBOC's venture into the packet game.  SBDN, Pulse-net, Microlink II, 

et al...in any case, there ARE wonderful things on these systems.  Most of

you probably know about the "lmosfe" on ML2 that goes to a Dallas LMOS 

front end.  However, I doubt that more than a handful of people on here

have ever been on an LMOS (through an IBM or a UNIX based machine).  It seems

to be quite a topic of conversation anyway.  

Well, let's keep that topic alive...but for starters, where are you and what

telco-systems are you in?

->ME



3/46: LMOS

Name: Acid Phreak #8

Date: Tue Jan 09 17:56:23 1990

The most recent LMOS interlude was one in my local area.  Got the host 

processor (an IBM 3270) off Predictor.  Overall, a very handy tool to add to

your telco 'collectables'.  The FE's of course were PDP 11/70s using MLT for 

reference.

Aw thit.. lookit all dem Hicaps.

--ap

  (advanced phreaking)



4/46: Humm...

Name: Phase Jitter #3

Date: Wed Jan 10 07:23:31 1990

Cris,

  Why ANOTHER COSMOS file?  Too many allready, and it has to be about the

lamest PC computer there is...

As to LMOS and LCAMOS(Predictor) they are old news, anybod been playing with 

CRIS (Customer Record Information SYstem).  It seems to be a neet little 

system, although the info is pulled through SMART.  

Phase

LOD!



5/46: Silly Boy...

Name: Erik Bloodaxe #2

Date: Wed Jan 10 14:46:40 1990

COSMOS is pretty cool.

When you aren't in the sccs, COSMOS is the next best thing.  ENtering in

things into RCP...hell, I didn't really even know that until Phiber

told me, and sure as shit, the order went through the next day.  

Also, SIR is fantastic for finding ALL phone company computers.  SIR is good

for finding pbx lines...SIR is just plain cool.

Maybe it's just a database, and nowhere near as interactive as LMOS, and maybe

you can't really change or find out personal shit, like you can through

CRIS (that is what that's all about right?) but it's terrible easy to

get into, to get root, to do all kinds of cool things to lines without

having to be on a switch.  So nyah nyah nyah...

Besides, if you don't want to see "another" COSMOS file, then don't read

mine.  I've only seen two...Lex's TOTALLY shitty one, and some other

lame-ass thing.  

->ME



6/46: ICRIS

Name: Phiber Optik #6

Date: Wed Jan 10 16:37:27 1990

Not to nitpick, but an LMOS CP is an IBM S370 (3270 is an SNA, used to get to 

BANCS through LOMS for instance).

CRIS, as mentioned, the Customer Record Information System is a dandy little 

IBM system whose main purpose is to house customer records. There are a small 

handful of "CRIS" systems, like LCRIS (Local), and ICRIS (Integrated, which 

should be noted is used by the Residential Service Center). Here in NYNEX, the 

only way to reach these systems  (we obviously aren't hardwired hackers) is 

through BANCS, a bisync network. BANCS is not direct dialable, but IS 

available through a 3270 link on the LOMS system, used by LDMC (LAC or FACS, 

depending where you live). And LOMS IS accessible. A host of systems are also 

available through FACS (which can be reached through LOMS on BANCS) such as 

CIMAP, LMOS, SOP, TIRKS, the COSMOS-PREMISE interface, etc. So as you can see, 

rather than going after any specific system, going after the RIGHT system will 

pay off greatly (LOMS in this example). Oh, waitta-minnit, those mentioned 

systems are off of BANCS, sorry. You can reach FACS on BANCS, and access a 

couple 'o things like some of those mentioned, COSMOS (certain wire centers 

only), etc. OK, enough rambling. Let's hear someone else's input.

Phiber Optik

Legion Of Doom!

$LOD$



7/46: Huh?

Name: Erik Bloodaxe #2

Date: Wed Jan 10 17:15:25 1990

I'm confused...that rambling kinda threw me....

lessee...You are saying you can get to these CRIS (LCRIS & ICRIS) from

LOMS?  Hell, I've got a ton'o'LOMS on the NYNEX packet net...

Specifically in the NewEngland side (3110:622)  SO:  now

tell me, oh ye telco gods, how are they intertwined?  On the

LOMS I have, which are Unix based, (and hung on the network, so you

could just enter the nua and drop into shell) I didn't see any

applications to conenct to some other system...well, I didn't

really look at the ttys either.  

Is the 3270 connection hooked into the thing as a device?  Do you cu to

the tty it's on there to connect?  What do you do?  I'm interested now.

->ME



8/46: 3270

Name: One Assembler #11

Date: Wed Jan 10 17:35:41 1990

hmmm... always thought a 3270 was a terminal (At least, thats what all those

little labels that say "3270" and underneath the screwed logo... are you 

interchanging 3270 with sna?



9/46: Datalink2

Name: Grey Owl #10

Date: Wed Jan 10 19:03:45 1990

    What is it about getting into LMOS from DL2?  How do I tell what areas 

LMOS I'm into, or can I get to any of them?  I call the local Datalink2 dialup 

and login with lmosfe and then I get lost.  I guess I need a good file in 

learning LMOS...can you help...anyone???

grey owl



10/46: blah blah blah

Name: Phiber Optik #6

Date: Thu Jan 11 13:41:31 1990

First of all, that's MicroLink II, not "datalink". And 3270 IS SNA. 3270 is 

the Synchronous Network Adapter to connect an async terminal to a sync or 

bisync mainframe...

OK... On LOMS, you run the command "3270dsp" which is I believe in /usr/bin. 

Before doing that, you have to run an environment profile (and also READ it in 

order to get the BANCS logon and FACS name).

I believe the proper one is /loms/profiles/BANCSloms.env, or something 

similar. Once the 3270dsp is run, you will be connected to BANCS. Enter "%log 

xxx" where xxx is the logon from the env file. Then, connect to FACS. This is 

also in the env file. Just type what the variable points to. You will then be 

on FACS. I think FACS is easy enough to use without an explanation. 

Now aren't we elyte?

Uh, Erik, what were you doing on LOMS if not using BANCS??? Reading "HOT RMA" 

reports? Hehehe.

PHIBER OPTIK!

$LOD$



11/46: I I may...

Name: Daneel Olivaw #9

Date: Thu Jan 11 16:40:01 1990

may a minor correction to Phiber's post:

3270 is underlying protocol on the 3274 terminal multiplexers that all IBM 

mainframes use (or some other model like a 3276 that does other things nice 

to).  3270 is aterminal implementation that will only run syncronous (for some 

assenine reason), and is wide spread. The 3101 is a comparable async 

implementation of that standard. 

SNA is System Network Archetecture and was developed and used within IBM. It 

is influential elsewhere, both in layering and in specific protocols, such as 

SDLC (the link data prto.) which have influenced CCITT and ISO.

BTW, 3270 and SDLC are intertwined, and one usually can be associated with the 

other.

     >> Daneel Olivaw 



12/46: Daneel...

Name: Phiber Optik #6

Date: Fri Jan 12 09:22:03 1990

Thanks for the lesson in something I do for a living. What I was trying to 

briefly mention without going into techno-details was that it is 3270 that 

makes it possible for an ASYNC system like LOMS (unix) to connect to an IBM 

host (BANCS). Without SNA, this isn't possible.





13/46: No problem...

Name: Daneel Olivaw #9

Date: Fri Jan 12 22:33:12 1990

just wanted to make sure nobody was confused (or wasn't confused?)..

Daneel



14/46: Confused..

Name: Silencer #31

Date: Sat Jan 13 02:33:40 1990

heheh...anyway...Erik:

Will your file contain a CMD list or something?  I have heard that once in 

LMOS you can go to a service dept and tap lines.....like  you can monitor or 

talk....

when you try and do it...it asks you for the number,...then the callback 

number.  it then hangs you up and calls back the number you entered...anbd 

hooks you into the number you plan to monitor.   Loops would be useful in this 

case for callbacks..  This sounds like a load of fun to me  (also a good way 

to get info and stuff....like....tap some office of a LD carrier that you use 

most often and get the latest scoop on whats going on).  Do you know anything 

more about this part of LMOS?  Sounds cool as fuck to me...

    - Silencer/DFKN



15/46: LMOS

Name: Phase Jitter #3

Date: Sat Jan 13 09:51:55 1990

  You can monitor lines via LMOS, but it dosn't hang you up.. You enter the 

IBM via the hicap (High Capacity Front End Processor) or various UNIX front 

ends (ex. ARSB).  It is possible to get to LMOS from other systems, but that 

is for later discussion.  Once in the IBM you enter a special mask (which I 

will not mention) and then you enter an Employee code, Printer, Call Back 

Number, TN You want to verify, and a few other things.  Then you type the

monitor command.  LMOS will respond with "Request In Progress" the number

you gave as a callback will ring, you pick up the phone and dial "0".  Now

the conversation on the busy line is on your call back too.. You can rase or

lower the volume using "+" and "-".

Phase Jitter

Legion uh Doom!



16/46: Bell Atlantic

Name: Hotshot #52

Date: Thu Jan 18 10:30:38 1990

Does anyone have any information on Bell Atlantics Strategies Computer?

The # is 1-800-468-7546  and can connect at no higher that 12oo...



17/46: I didn't think...

Name: Daneel Olivaw #9

Date: Sun Jan 21 22:29:11 1990

you were supposed to post that....

Daneel Olivaw



18/46: ARG!!!

Name: Erik Bloodaxe #2

Date: Mon Jan 22 02:45:01 1990

He wasn't...Mr. Warf, if you post another fucking code on this bbs, you will 

be deleted, and I will personally see to it that you are fucked over pretty 

hard.  Hell, the feds are due here any day now, so maybe you will be named as 

my fucking accomplice on EVERYTHING...

Nah, you're too fucking stupid, they'd never buy it...just don't let it happen 

again.  This bbs has VERY few rules, so you should be able to understand them.

Keep the fucking codes to your own "K-rad" bbs.

->ME



19/46: Ok..

Name: Warf #81

Date: Mon Jan 22 07:45:57 1990

    Sorry dudes.  Well, I didn't know that this bbs is just for ANYONE to log 

on and have ANYONE read ANY of the messages.  You should get some security.  

Oh well... Hasta and sorry again!

                                   <=[Warf]=>



20/46: no

Name: Phoenix #17

Date: Mon Jan 22 09:23:39 1990

security is not the problem... you are the problem <or were..>

the board is not designed tohave any security..

it is not called a public access board or nothing..

but then again.. who am i to say anything..

Phoenix



21/46: It was...

Name: Daneel Olivaw #9

Date: Mon Jan 22 22:32:27 1990

also stated in the logon that EVERYBODY (i.e. SS (like the Nazis), CIA, FBI 

all get access on first logon.  Are you to ignorant to read, or just don't 

give a damn about the rules.

Daneel Olivaw



22/46: blah

Name: Phelix The Hack #89

Date: Mon Jan 22 23:35:44 1990

no more to be said.



23/46: I

Name: Gary Seven #38

Date: Tue Jan 23 12:30:17 1990

Found a Carrier and when it is CNA'

CNA it is MBT Michigan Bell Telephone.  I wonder what it is.  I will try to 

narrow down the o/s but im not familliar with the telco computers.  

Cosmos,Lmos,Switches or anything like that.   Later



24/46: if you don't mind everyone knowing...

Name: Grey Owl #10

Date: Wed Jan 24 19:11:52 1990

If you don't care who gets the number you might post it here.  I'm sure 

someone will be able to call it up and identify it for you...

grey owl



25/46: can anyone translate

Name: Grey Owl #10

Date: Sun Jan 28 00:22:26 1990

This is off a work order (from I don't know what)

Condensed for space:

SAS7200128                  SAS720128 E    50BM  40     ABS/ABS/LALA COMPUTERS

DD     12/11/89      SMC       12/11/89

                        FB1/D3/RMVL          SMC    SMC

                                                                     AUT

  001   31/LGGS/811427         /SW                         P W       C36

   AUSTTXGRWAC  AUSTXFI     

                      SEF6RM9

   FA01 AUSTTXFI       SPE       W   P  AUT

   02   AUSTTXFI       SPE           P  AUT

[END OF WORK ORDER]

Any ideas on what all of this is... i know that the 31/LGGS/811427 tells 

circuit and feature information, but I have never seen the 'LGGS' codes 

before... any ideas what this could possibly be?  Also, does anyone know how 

to decode all of the work information, I even have the Bell Line maps if that 

will help...

grey owl



26/46: 911 upgrades

Name: The Data Wizard #16

Date: Sun Jan 28 23:50:20 1990

Im am in ess1a and recently heard on the news that the local telephone company 

is going to charge extra to advance 911 features.  Now, I have a question 

concerning this.  Is it possible to upgrade 911 services without upgrading the 

switch to ess5?  I hope yes.  It dread to think of me being in 5.  oh well..

Later,

TDW



27/46: I would think

Name: The Dictator #43

Date: Mon Jan 29 01:18:50 1990

I would think Yes, that they could upgrade the 911 to E911 without upgrading 

the switch.  Phoenix is mostly comprised of 1AESS switchs and I just cant see 

them re-doing that many switches...

 

The Dictator



28/46: That report is from....

Name: Psychedelic Ranger #80

Date: Mon Jan 29 04:59:38 1990

 

 That work order you posted looks like it is from TIRKS. I assume it is

 the order for some sort of activity about the circuit...I have a TIRKS

 manual so I could probably define the terms for you if you wish, let

 me know.

 

 Psychedelic Ranger



29/46: Yes...

Name: Daneel Olivaw #9

Date: Mon Jan 29 21:04:43 1990

actually if you could write a quick little file for acronyms that would be 

handy, as I have roughly 1000 work orders for lines in my area, and some are 

VERY interesting, like PBX outdials (dedicated PBX outs) and WATS lines..

Daneel Olivaw



30/46: there it is again!

Name: Grey Owl #10

Date: Tue Jan 30 17:44:16 1990

The same concept as pad2pad.  If we could get the numbers to the outlines on a 

PBX, we could intercept all calls made.  He he heh..hahaha AHAHAHAHAHAH!!!

The mind mereley boggles at the possibilities.  Daneel--wanna have a 

translation party when we get the acronyms?  Heh.

Psy:  Type up those TIRKS terms, p?r f?vor.  (that's por favor if you don't 

have IBM graphics characters..)

grey owl



31/46: Port

Name: The Dictator #43

Date: Thu Feb 01 02:39:01 1990

Theoredically speaking:

 

It has been my experience that Cosmos systems are netting in one form or 

another.  Does any know of a way to port commands from one Cosmos site to 

another?  Could you possibly facilitate the CU command?  

 

The Dictator

Having trouble



32/46: PBX and AT&T 3B2

Name: Pain Hertz #84

Date: Thu Feb 01 20:48:19 1990

I have some info on a PBX in my area, mostly circuit numbers...  some one care 

to help me decipher this stuff as im not quite up on this...

 

I have the circuit numbers, which are labled as follows:

 

DOD IDD, DOD SELECTIVE CALL SCREENING, 2 WAY REMOTE, DID WINK START nnn & nnn 

NXXs, FX CIRCUITS (major LD co.).

 

On the 2 way remote number I get dial tone, through that I can dial any number 

served by the PBX.  But it won't let me dial out once in the PBX.  Also, I 

have some test numbers, 1000 Hz, and another one used for checking static.

 

I posted this in this sig cause the 3B2 which this site uses happens to be on 

the Internet, which means, line orders could be entered via Telnet.

 

I guess my lack of phreak experience is showing...  I tend to stay behind a 

CRT.  Any information would be appreciated.

                                             -PHz



33/46: TIRKS 

Name: Psychedelic Ranger #80

Date: Fri Feb 02 04:19:35 1990



 Shit- I cannot post the whole thing, as the manual is quite thick, and

there are so many....it would be better if you would post or mail me

with a list of the ones you need the most, then I can give you those

rather than make a huge, huge file with all the TIRKS abbreviations. 

TIRKS printouts are very hard to decipher without a manual! I mean,

you can guess at some of them, but after a while they get so specific

with things involving special services equipment setups that you get

a whole lot of shit thrown in there. I have found many nice things from

TIRKS printouts (WORD documents actually, Work Order Records and Details)

including dialups to systems, translations to 800 numbers, etc. etc.

And if you xlate the PL (private line) feature code included on the

WORD, you can learn more about the circuit which can lead you to something

you are looking for, perhaps. If anyone has any PL codes they want

xlated, I can do this..but other people can too, it is no big deal.



34/46: WORD

Name: Signal Raider #78

Date: Fri Feb 02 15:17:55 1990

RE: TIRKS 

A WORD expert!  Great.  Maybe you can clear something up for me.

A typical PL circuit ID is of the form  nnXXXXnnnnnn, such as 27LGGX123456.

What is the signifcance of the LGGX in the above?  I'm guessing it is related

to the class-of-service of the PL (two-wire, four-wire, voice-grade, 

hi-cap...), but I really don't know how.  Can you help?

-SR



35/46: WORD

Name: Psychedelic Ranger #80

Date: Mon Feb 05 03:43:48 1990



You are correct in your guess that the LGGX code is related to the

class of service of the PL. The different positions mean different

things....I don't have my translation of PL codes in front of me

(but I will find out what LGGX is and let you know), but I do have

some old output from something else that has PL's. Here are a few

samples:

TP HIDF-0117  ST WK

SE CLR  ST WK

TP HIDF-0234  ST WK

CP 7-0123 ST WK

PL 7.TLNC.104496..LB  ST WK

(just including the PL field now)

PL 5.OPNC.501.232.4545. ST WK

PL 7.OSNZ.99944..LB  ST WK

PL 3.TTDZ.151434..LB  ST WK

As if you couldn't tell, these came from a COSMOS system that I

have obtained printouts from. The TLNC, OPNC, OSNZ, and TTDZ are

the codes you are referring to..I am not sure about COSMOS

formatting of PL's since TIRKS carries most of the data on PL

circuits, but you can fish some from COSMOS. But these 4 char

codes are the same as on the WORD documents.

Psychedelic Ranger



36/46: COIN

Name: Psychedelic Ranger #80

Date: Mon Feb 05 03:47:55 1990



Anyone know a way around COIN's detection of red-boxing??

PR



37/46: COIN

Name: Phelix The Hack #89

Date: Mon Feb 05 11:29:52 1990

well if the "quality" of your wink is good enough the SCP should never know 

the difference...read my file in PHUN #4 on TSPS...also ask if you need to 

know how to obtain a good recording ..for your area..as they have a tendency 

to differ.

pth



38/46: good recording

Name: Grey Owl #10

Date: Mon Feb 05 16:49:31 1990

I'm not sure where I read this, but you can follow the wire that comes out of 

the payphone and tap it.  Then you put about 50 quarters in it.  This is cheap 

since you will always have enough recording time to call anywhere in the 

world...you have to think about the long-term:  50 quarters is not that big a 

price to pay for free calls until you get busted!

Does this mean that you can't build an electronic red box that will work in 

any area in the US?  I thought that the tones used in once city would be the 

same as another.  Please correct me if I'm wrong.

grey owl



39/46: that wouldn't

Name: Alter Ego #110

Date: Mon Feb 05 17:56:31 1990

RE: good recording

be to hard... the trick would be getting into the silver coil that holds the 

wires, but you probably could do that with hack saw... just make sure you 

don't cut the wires... I also thought the tones were the same no matter where 

you were...

??



40/46: Just do this

Name: Psychedelic Ranger #80

Date: Tue Feb 06 03:39:56 1990

If you need to get a recording of the coins, just dial a silent termination 

test number and insert quarters while holding a suction cup thingie to the 

mouthpeice of the phone. We did this and it worked great, clean recording.

Other times I have gotten really shitty recordings though and they

only partially work, or not at all, and probably are noticeable due to the 

abnormal call processing. But the other times I was trying to do this, there 

were other factors involved the changed the recording quality.

Then just hit the coin return slot and you get all your $ back..and have your 

pretty musical recording that you can bring to your music class

and play as a representation of such-and-such Milliseconds of such and such 

and so on.

PR



41/46: why not...

Name: Ravage #19

Date: Tue Feb 06 11:00:46 1990

call your answering machine and record it that way?



42/46: good recording..

Name: Phelix The Hack #89

Date: Tue Feb 06 12:08:06 1990

Well I have found the best recording comes from a combination of the two above 

suggestions...

 

Call up a friends house (who knows what the deal is) from a coin station ..AND 

MAKE SURE THAT THE CALL IS INITAITED WIT HA QUARTER!...then have yuor friend 

unscrew his mouthpiece (to eliminate any backbround noise) and press a key to 

signal that he is ready to record (using your handy 1.99 Radio Shack 

induction/suction mic)...and then start plinking quarters in...hit coin 

release to get'em back (all but the first quarter that is)...



pth



43/46: Sheeeeeit

Name: Captain Crook #36

Date: Tue Feb 06 20:38:56 1990

  On eproblem with all these recording coin tones.  Like Scan Man has said 

before what happens if you are using new or weak batteries to record and then 

you put new or weak batteries in to replay?  The sound/speed will be off 

enough that the phone will not accept it.



44/46: Red Boxing...

Name: Nemesis #122

Date: Wed Feb 07 01:20:58 1990

   Well here are a few of my experiences with redboxing... First, some phones 

dont let YOU hear the tones.. They usually let the CALLED person hear them (I 

have never found one that doesnt), so call home, and have your bro record 

them..you can get a VERY good recording that way..

     My main problem with red boxing is that MANY fones in my area MUTE the 

mouthpiece untill the call goes through!  It is VERY stupid because I cant 

even use my pocket dialer (which is a necessity for all payfone 

hackers.heheh)..So you almost always end up putting in a quarter..However, yet 

get it back.. no big deal...

     there are nice ways to "synthesize" the coin tones, but I have had a lot 

of problems with those.. I found that the BEST way to do it was to make a 

small Digitizer with playback..I then digitize it, and just push a button and 

play back into the mouthpiece.. It works very well, and is VERY small..I could 

use SMT to make it even smaller.  I could even dump the ram, and burn an EPROM 

and sell it..hey.. now theres an idea..hehehe



45/46: i've always.

Name: Guc #97

Date: Wed Feb 07 08:45:46 1990

spliced into the line BEFORE the payphone when red boxing.  that way, you 

bypass the muting in the fone.



.s



46/46: Sharper Image

Name: Daneel Olivaw #9

Date: Wed Feb 07 16:04:24 1990

sells a little digitizer for I think $49, and it stores 45 seconds of 

whatever.  That could be handy, and it is about the size of a pack of 

cigarettes... when I get the cash, I'll probobaly get one.

Daneel Olivaw



< Phone Company Computers Q-Scan Done >





 _____________________________________________________________________________



                   *** {Telenet (now SprintNet) Sub-Board} ***







< Q-scan Telenet 6 - 80 msgs >

1/80: This Sub

> Permanent Message

Name: The Mentor #1

Date: Sun Jan 07 05:15:46 1990

This subboard is specifically for discussion of GTE's packet network Telenet. 

Of course, since you can get to damn near any network in the world off of it, 

discussion may stray a bit...

Mentor



2/80: Yeeeeeeeeeee

Name: Erik Bloodaxe #2

Date: Tue Jan 09 14:16:49 1990

I've been scanning the fuck out of Telenet.

(Want proof?  Look in the file section.)

It's kind of interesting.  Systems seem to live exclusively in the

0-1000 range, and a few others lie scattered through the 50000-70000 range.

The systems that hide WAY up there have proven to be QUITE virgin territory.

You have NO idea how virgin.  

I have also come to some kind of conclusion about the ENHANCED NETWORK 

SERVICES NOT AVAILABLE message...  It seems that WAY up there I've found a

ton of systems that connect and ask USER ID, and then PASSWORD, and then 

respond with the identical error message givn when you enter a bad NUI.

It's my guess that the "ENHANCED" services are some kind of closed user group

application, but one that allows a user to connect from any terminal, rather]

than from just one that had been specified, and possibly with an ID not

specifically designed for that CUG.  Dunno about that last part though, as I

don't have any more damn NUI's.

Anyone want to check out a load of rejectings?  I've got ton's of them.

->ME



3/80: Debug Ports

Name: Phiber Optik #6

Date: Thu Jan 11 13:46:34 1990

I am requesting assistance in utilizing a TP3325 (preferrably) debug port. 

Erik? I need to know how to use it MANUALLY, *NOT* through TDT2 (well 

gooooolly!)

.

.

Phiber Optik

($LOD$)



4/80: Interesting...

Name: Erik Bloodaxe #2

Date: Fri Jan 12 03:08:11 1990

Um...what have you gotten yourself into boy?

Lemme guess...you've snagged a debug port on your NYNEX-land PSN

and want to grab ASCII, right?

Uh, I'm kinda used to menu-drivethings when doing stuff like that.

Also, the basic info I've gleened from Telenet Techs on TDT2 applications

help for that too, although I guess that won;t help you.

What I'd do if I were you is call 1-800-Tel-enet and talk to one of 

their techs.  They'll love to talk to someone about something like

that.  As a matter of fact, I was just talking to them today about

a command I never figured out what it did.  (TAPE & DTAPE)  He'd

never heard of them either, so he had to bring in a bunch of the

other techs to discuss it...turns out they are for some archaic

use to append a textfile you want to u/l to the end of a message

you want to send when in Telemail...

(I don't know either...sounded like a dumb command to me too)

They will probably even be able to send you some kind of manual or some

documentation on your specific needs...They have TONS of things

lying around they LOVE to ship all over the world for fun.

(I only wish TYMNET was more friendly like that...bastards wouldn't send me

a TMCS or PROBE manual...)

->ME



5/80: Ah.

Name: Phiber Optik #6

Date: Fri Jan 12 09:27:36 1990

I see. I attempted to order docs for telenet before, and they sent me 

"pamphlets" on how great telenet was. I suppose I'll try again.

I have limited success using TDT2, but not much (like connecting and 

x25screen'ing). The only real commands I kno of on debug ports are "Lxxxx", 

where you specify a 16 bit hex base address, and "Rxxxx" where you specify how 

many bytes from the base address to do a hex dump.

Other than that, I PAD-to-PAD to get accounts.

PO

LOD



6/80: debug

Name: Grey Owl #10

Date: Fri Jan 12 22:58:04 1990

What's up with debug ports?  Erik--can you make a command summary for me on 

the debug tools?  

grey owl



7/80: Well...

Name: Erik Bloodaxe #2

Date: Fri Jan 12 23:56:16 1990

Not really...I'm far from competent using them...

I'm going to try again to order a tdt2 manual next week, 

and if that falls through, I will forever be

stumped...Prime Suspect is the "expert" on the subject

and I don't even want to try to explain, on the

basis that I might give out shabby information.

Hopefully he will call here someday.

->ME



8/80: scnas

Name: Silencer #31

Date: Sat Jan 13 02:44:47 1990

fuck...I meant Scans.... umm...I was just scanning on 00-99 of a few area 

codes...

I got a few that I am having trouble identifiing....seem interesting...

in 30520, 30522, 30563, 30573 all seem to be indenticle.  When I type '?' it 

says somthing like:"expected HELLO: ,JOB: ,DATA"  Or something like 

that.....souunds intersting,,,,maybe some sort of Credit institution or info 

beaureu  or the likes...I have no idea.  Also...

20150 - something called Interet...not internet...interet....weird

20145 - Newsnet....??  anyone know anything about this system?

I found a couple others that I'd never seen or heard of before..but these 

seemed the most interesting.... 

    - SIlencer/DFKN



9/80: ok..

Name: Phoenix #17

Date: Sat Jan 13 03:35:08 1990

whatever asks for hello job or data is usually a hp series machine.

the system prompt is a ":", and the logoncommend is HELLO 

Phoenix



10/80: ...

Name: Frame Error #5

Date: Sat Jan 13 12:01:46 1990

 Norm - Seattle Telenet Technician - 206/382-0xxx.  

 If you have something pertinent to ask him, go ahead.  Please do not harass

 the guy.  I'm not even sure if the number is good anymore.  It should be.

 FRAME ERROR



11/80: Pad to Pad is lame..

Name: Phase Jitter #3

Date: Sun Jan 14 01:05:33 1990

as ERIC said tdt2 is much better, the output is in HEX, but a simple program

converts the data to ascii. 

Phase

LOD/h!



12/80: Pad to Pad

Name: Erik Bloodaxe #2

Date: Sun Jan 14 02:04:20 1990

is fan-fucking-tastic.

If you know what the plebes are connecting to, and can emulate it, you

have them by their balls.

Pad-to-pad is still possible in most areas...It seems that

only Telenet has done anything to stop it, thanks to the loose

lips of Mr. RNOC & Mr. Lex Luthor.  Oh well, no use flogging

a dead horse...

I have gotten more things from pad-to-pad than I EVER expect to

from using tdt2 to monitor ports...but it is kinda useful, and it IS

real easy to convert hex to ascii...hell, I think there's even

an option to get it to DISPLAY ascii anyway.

Just don't try to gleen info from a Russian pad...the feds here will

think you're sending secret cyphers to your Russian spy buddies...

Right Par?  hehe...you fucking traitor!

Will the Secret Service ever require more than a 3 week computer literacy

course to fulfill the Special Agents assigned to computer crime?  I hope

so...

->ME



13/80: Only 3 weeks for computer crime in the SS?!

Name: Grey Owl #10

Date: Sun Jan 14 11:50:58 1990

That's ridiculous!  If I owned a mainframe that was a target for hackers, I 

would be raising hell that the people protecting haven't even had enough 

training to learn DOS.

But since I'm on the other side I'm glad they are so stoopid.

grey owl



14/80: .

Name: Frame Error #5

Date: Sun Jan 14 12:51:39 1990

 Who gives a fuck?  The less education they have, the more we will be able

 to do.  

 Which other networks are still vulnerable to PAD/PAD connections?  I'd like

 to play with them a bit.

 Oh, are the addresses mnemonics or numerical?

15/80: pad-to-pad

Name: Grey Owl #10

Date: Sun Jan 14 21:39:56 1990

How does this aid hacking besides making the connection untraceable?

I know that you just connect to one pad, then to another, but why is this such 

a big deal?

grey owl



16/80: owl

Name: The Mentor #1

Date: Mon Jan 15 01:34:29 1990

Ok, what you do is connect to another person's pad as they attach to the 

network. When they think they are typing to the network, they are actually 

typing to you. When they attempt a connect, you consult your directory and 

give them a prompt appropriate to the system they're trying to connect to - if 

you don't know what type of system, just give them a login: prompt - as The 

Leftist always says, people are like sheep!

They then type their account name to you. You give them a Password: prompt and 

they type that. You then give them a "INVALID ENTRY, RETRY" and disconnect. 

They assume that they typed the pw in wrong and try again. You should have 

logins for a half-dozen or so systems on hotkeys so that you just hit alt-v 

for vax (or whatever).  Simplest way in the world to snag stuff.

Mentor



17/80: and

Name: Phoenix #17

Date: Mon Jan 15 02:16:54 1990

I personally love it..



18/80: tdt2 in 813

Name: The Electron #32

Date: Mon Jan 15 06:42:50 1990

who managed to fuck up the tdt2 prime in 813?

dont bother answering...i KNOW who fucked it up...8)



19/80: Stuff

Name: Gary Seven #38

Date: Mon Jan 15 11:02:17 1990

Does anybody have a list of Outdials for all areas Global and the like.  That 

would be cool to have handy.  Erik did you ever release your Datapac Scan 

file.  Datapac being Canada of course 3020 is the DNIC.

later.



20/80: tdt2

Name: Konica #47

Date: Mon Jan 15 16:36:43 1990

Can someone please explaine this in full detail? I am having problems with 

understanding what you experienced people are talking about.

So when you say tdt2 please start from the bottem....



21/80: tdt2

Name: Grey Owl #10

Date: Mon Jan 15 18:06:11 1990

Those are the debug tools for Telenet.  tdt2 is all the commands that you use 

to set up and alter the parameters of a PAD.

So with pad-to-pad, I can find some way to get the NUA for the PAD I get when 

I connect to Telenet, or do I find the one for a certain system?  Is this 

clear as mud?

grey owl



22/80: ummm

Name: The Mentor #1

Date: Mon Jan 15 21:35:10 1990

When you log on to telenet, (from 512, for instance) it will say

512 014A (or 512 014B, or so on).  These are PAD addresses.

Mentor



23/80: hmm

Name: Phoenix #17

Date: Tue Jan 16 07:35:24 1990

I do sympathise with electron..



24/80: Pad addresses.

Name: Grey Owl #10

Date: Tue Jan 16 08:48:57 1990

    I see, Mentor.  That's what I thought.  I'll just have to call Pac*it 

through an outdial sometime and get lots of those addresses  |-)

Does pad-to-pad still work with Telenet?

grey owl



25/80: What is 

Name: Phase Jitter #3

Date: Tue Jan 16 09:46:03 1990

Pac*it just the other day I found a ton of Pac*it dialups scanning..



26/80: owl

Name: The Mentor #1

Date: Tue Jan 16 17:06:49 1990

Well, there are a few telenet pads around the nation that will still connect, 

but the general answer is no, you can't do pad-to-pad off of telenet anymore.

Mentor



27/80: I tried

Name: Gary Seven #38

Date: Tue Jan 16 18:24:53 1990

    I tried fooling with the pad-pad method also yesterday on Telenet.  

Entering like 5173a or something and it just sat there until i sent a break 

signal as usual.  Again anybody have something to connect 3106 NUAS?

late

   +r



28/80: Pac*It +

Name: Erik Bloodaxe #2

Date: Tue Jan 16 19:35:23 1990

Pac*It is GM's packet network...no wonder you found them...scanning Detroit?

In any case...don't use them.  Maybe their local dialups are still ok, 

but the 800's are dumping everyone calling location to GM thanks to MCI.

Um...Phase:  try this on the local ports...find one of 200 or less, 

then place a call to a Telenet address that RCC's, like a pcp dialer

and see if it goes through.  The ports used to have some kind of

fucked up software that would allow you to connect to RCC addresses

without an NUI.  (But only on ports 200-something or less)

But remember:  That's part of what got Doc Cypher nailed, et al.

->ME



29/80: pac*it

Name: Grey Owl #10

Date: Wed Jan 17 08:49:54 1990

Pac*it is still up and working wonders for me.  Of course, I'm using a 

lightning fast outdial to call the already slow pac*it.  (The outdial won't 

let me do 1+dialing except for 800s)  You just have to find a port less than 

400.  399 works...(experience)



grey owl

PS:  can I connect to the Telenet pads for pad-to-pad via pac*it?



30/80: telenet pads

Name: The Mentor #1

Date: Wed Jan 17 12:20:12 1990

If you're going to play pad-to-pad, the *first* thing you should do is either 

find a pad other than your local one, or use some X.25 software that has your 

address disguised. They *will* eventually notice something strange, and you 

don't want your local port address in the header of every connect. 

No, you aren't going to be able to connect to a Telenet pad via Pac*It. I 

don't think there's more than 6 pads in the nation on Telenet that still let 

you go pad-to-pad.

Mentor



31/80: pac*it to Telenet

Name: Grey Owl #10

Date: Wed Jan 17 16:59:02 1990

Why woulnd't I be able to connect from Pac*it to Telenet?  I can connect to 

the Telenet PCP dialers via Pac*it, so why not the pads?

Do you have any X.25 software for an IBM/AT?

grey owl



32/80: Telenet Pads...

Name: Erik Bloodaxe #2

Date: Wed Jan 17 18:58:21 1990

Telenet pads are access barred from ALL addresses, save a few internal 910

and 909 addresses.  

That's why you can't pad-to-pad on Telenet anymore.  

->ME



33/80: hmm

Name: Phoenix #17

Date: Thu Jan 18 02:02:01 1990

This is just theory... and it may be the biggest load of shit there is... or 

possibly even coincidental but..

here goes

so ar the only networks which }ipad to pad has ever worked on have been 

tremendously slow networks. all the aster networks <austpac, datex-p etc> have 

never had pad to pad working on them. rom experiene i can tell you that the 

problem has been present on more than one type of software, so although 

possible, it is unlikely that software was problem. Thereore that leaves us 

with hardware and its setup. If it means anything, tha is where i believe that 

pad to pad problem lies, in the hardware/setup o hardware. I assume though, 

that it would be very easy to patch with software modiications..

Phoenix

<The Flatline>

That f key is still broken

Jacking Out..



34/80: Pud to Pudding

Name: The Operator #42

Date: Thu Jan 18 22:32:42 1990

Yeah...It was intentional.

Anyway, PtP'ing was a blessing in it's time...These days, it has gotten 

tougher but if you get (usually) a prime, one IS able to as long as it's out 

of the 3110 DNIC...Ahh...The days of baggin' them Telenet Security 

NUI's...Ahhh...I think I've ought to go look through my scrapbook...

             The Operator



35/80: x.29

Name: Konica #47

Date: Thu Jan 18 23:17:16 1990

On Telenet I was scanning and come across a connection that said the following

X.29 Password:

And if you entered the wrong password it would disconnect you back to Telenet.

I am a begginer on Telenet so I would like to ask a few questions.

1. What is x.29?

2. What might be some common defaults (if any)

3. Is this just a waste of time?



36/80: Hope this helps ...

Name: Wiz #25

Date: Sat Jan 20 06:30:59 1990

RE: Stuff

I'm sure this is old news by now, but there seems to be a PC-Persuit modem 

which is totally un-restricted (I frequently dial South African BBS's to 

disguise my origin using this PCP modem) - the NUA that I type in to get to it 

is ...

03110202001230X, where X is from 1 to 8, but usually only 1-5 work.

MPE Wiz



37/80: outdials

Name: Grey Owl #10

Date: Sun Jan 21 11:27:33 1990

Daneel Olivaw told me that there are outdials in every city that Telenet has 

set up for rental.  Is this true?  This would be *extremely* handy for some 

hacking that needs to go on local to me.

grey owl



38/80: Outdials...

Name: Erik Bloodaxe #2

Date: Mon Jan 22 02:49:38 1990

I don't think that Telenet has THAT many outdials...

Official Telenet OD's and PCP outdials are one in the same...

However, many companies have outdials placed all over the place...for the most 

part the are stuck on subaddresses...

For instance, I have one in 202 that is on sub-address a, and says illegal 

address unless you specify that sub address...most of these types of outdials, 

(and I've found a bunch exactly like it) are ventel types, and you also have 

to go back to command mode and change to half duplex to use it well.

Hell, TYmnet has a million outdials...

->ME



39/80: Internet

Name: Sicilumm Thorne #28

Date: Mon Jan 22 07:02:51 1990

    Internet.  The image of Cyberspace.  That's all that name does for me.  

Somebody with a lucid view of telecom, please explain exactly, physically, 

what Internet is, does.  [This may sound stupid, but hey].

 

    In the future, when posting, with all the acronym's, why don't we also put 

in parenthesis what each acronym means.  I mean, I know most of them, some I 

don't, but because this is a place of learning, hence "Phoenix Project", why 

not educate everyone, right?  Hearing a bunch of acronyms is a lot less useful 

than knowing what they are and mean and recognizing them.

 

    If I were to have an Internet Gateway address.  Just how would I go about 

using it?

 

    Sic.



40/80: actually..

Name: Phoenix #17

Date: Mon Jan 22 09:40:02 1990

there are heaps o outdoials on telent..

you just gotta know where to look or them..!

Phoenix



41/80: internet

Name: Phiber Cut #34

Date: Mon Jan 22 18:56:07 1990

You've got to be kidding!  INTER (as in InterLATA?)  NET (as in Network?).

Put them togeather and what do you get?  (tough one, eh?)

Bascially, the Internet is a result of the Defense Advanced Research Project

Agency (DARPA) which created ARPA net in the late 60's (I believe it was

1969).  This network was used by researchers doing government/military

work.  Eventually, the idea caught on and it expanded.  Onwards came

MILNET (Military Network), BITNET, etc. etc. etc......

Put them all togeather and you get InterNET (Ethernet based communications,

primarily TCP/IP using high speed T1 links).

I know that this is a brief explaination, but I'm really tired.  It seems

as though someone here called me with a shitload of bad news and I don't

think I'll get any rest for a week.  But when I do, and if I remember, I'll

post a more descriptive article on the Internet.



42/80: dodnet

Name: The Mentor #1

Date: Tue Jan 23 01:08:05 1990

ARPAnet is supposed to be phased out in the next year or two - it's bandwidth 

is pathetic. It'll be replaced with the fiber-optic DODnet. Wheeeee!

Mentor



43/80: maybe

Name: Phoenix #17

Date: Tue Jan 23 06:51:46 1990

a seperate board or internet ?

it could <one day> get pretty involved..

well... or rather ull ino on internet read the tcp/ip manual..i got it in red 

paper back... dont know where it is now.. or d give you specs on it..

Phoenix



44/80: speaking of phiber optic nets...

Name: Ravage #19

Date: Tue Jan 23 13:27:55 1990

did you know that with a laser and a good optical sensor you can crack 

fiber optic security. seems when the laser interacts with the beam in

the cable you get interference patterns that look like shadows and 

bright spots, kinda like a twin split interferometry, that can be 

detected and decoded.



45/80: DODnet?

Name: Phiber Cut #34

Date: Wed Jan 24 04:45:39 1990

Maybe there should be a D00Dnet?



46/80: fiber optic splicing..

Name: Phelix The Hack #89

Date: Wed Jan 24 12:15:05 1990

Wheras you may indeed be able to theoretically do it..splicing into a MUXed FO 

trunk/feeder not only takes the above mentioned equipment ; but some erios 

serious splicing equipment, the correct knowledge of what to do with that 

equipment; and a Digital to Anolog converter (unless YOU happen to have 

digital ready recvrs)...

 

I think that it is beyond my feeble powers..

pth



47/80: well....

Name: Ravage #19

Date: Wed Jan 24 14:37:35 1990

i have done it in a test situation. most computers have a analog joystick

port or paddle port, at least my ammy and my 64 do, that is more than capable

of doing it. but the ideal way would be to run it to a tape deck for later

decoding. while you do have to cut the outer sheath no splicing is done,

this would interrupt the cable and set off security. the sheath incision

can be done in a black bag like those used for fiels film changes. total

cost besides the laser is a hundred bucks. a lot of the stuff can be gotten

surplus so the price can be almost free.



48/80: DODnet

Name: Grey Owl #10

Date: Wed Jan 24 19:14:45 1990

What are the specs for this one?   

If it ain't faster than the current Internet it will turn out to be DUDnet...

grey owl



49/80: DoD

Name: Dark Sun #11

Date: Wed Jan 24 20:25:35 1990

Has been around for some time now....

                                  DS



50/80: hmmm.

Name: Konica #47

Date: Wed Jan 24 23:51:27 1990

No one seemed to answer my question about X.29 before....

On Telenet I got a NUA that responded with X.29 Password:

My questions were...

What is X.29?

And what would e the likly password that would allow me to access the system, 

for information purposes of course.



51/80: ll

Name: Dtmf #27

Date: Thu Jan 25 03:30:10 1990

Maybe this is common knowledge, but no one evr told me so I figgure I'll pass 

it on...When you are on altgers, and the 'from'has an address, try connecting 

to it on telenet..I have found some interesting things that way...

By the way, does anyone know the full command set for the Internet servers?  

With the set pri=g command, and the proper password, you get global privs 

which let you do some things that arent even listed in the global help 

screens...ANy ideas?  Anyone know what I can do with one of the besides wreak 

havoc on all the ports(booooorrrring d00d) ?

DTMF



52/80: od's

Name: Silencer #31

Date: Thu Jan 25 23:44:40 1990

Well... could someone compile a list of all the od's they know of or something 

to that effect and u/l it....or send it via email to users requesting it. This 

of course would be purely for informatiopnal purposes..heh.. when you log onto 

an NUA that asks for a cmd and the only thing it accepts is dialout what is 

this?  I couldnt get the thing to connect either..hmm

.s



53/80: Hey...

Name: Sicilumm Thorne #28

Date: Fri Jan 26 08:09:11 1990

    Could someone who fully understands debug and such (tdt2) and pad@pad on 

Tymnet and Telenet please explain it to me, either mail, or, if you can 

explain it in "information" terms, here.

 

    Preferably mail, but I'm sure I'm not the only person in the dark.

 

    Sic.



54/80: well...

Name: Ravage #19

Date: Fri Jan 26 12:25:37 1990

i would like to learn it as well. maybe we could compile the various notes

of individuals and put out an issue devoted to it? maybe even put in some

code for differnt machines?



55/80: pad2pad

Name: Grey Owl #10

Date: Sun Jan 28 00:01:22 1990

From what I know, it's no longer possible (except in VERY few and far between 

systems anyway) on Telenet and I don't know about Tymnet.  Here goes my 

attempt at describing it...

When you call Telenet you type @D^M and get a prompt looking like

512 011B

TERMINAL = 

and you just hit enter for the terminal prompt.  Above the TERMINAL = line 

there is an NUA of your pad.  It's not a private pad that accepts reverse 

charging, but it is a packet-assembler/disassembler.  Pad2pad is when you 

connect to one of these public pads and immitate Telenet.  

Say a user calls up Telenet in NYC and Telenet decides to put him on the next 

available pad...BUT you are already connected to it so what he types goes to 

you.  When he types "ID blahblah..." and his password, you give him the proper 

response.  You also have his NUI.  When he types "C 51359" you have to look in 

your handy-dandy scan directory and then find that it's a VAX and give him the 

right prompts.  You now have his login/password.  Isn't this fun??

Too bad it doesn't work anymore.  Try to apply this concept to other things 

such as phone interception and stuff like that.  THAT'S hacking.

grey owl



56/80: Pad 2 Pad, the concept

Name: Pain Hertz #84

Date: Sun Jan 28 02:48:48 1990

Actually, I read somewheres, on another board I think.  About some guy who 

applied this to an ATM (Automated Teller Machine ;-) ).  Supposedly, got his 

PC between the ATM and the bank mainframe.  Had the PC tell the ATM what it 

wanted to hear, responses to the customers actions, and had the PC tell the 

mainframe, waiting for customer.  I wasn't there... but sounds quite 

plausible.                          -PHz



57/80: it was

Name: Grey Owl #10

Date: Sun Jan 28 11:59:19 1990

Telenet has secured up pad-2-pad possibilities.  They REALLY don't want people 

doing that anymore.

grey owl



58/80: Pad to Pad

Name: The Parmaster #21

Date: Sun Jan 28 18:17:02 1990

    The most awesome gift god has given to hackers..

Many thanks to the boys that discovered it..

You know who u are! :-)

Later,

Par  

Jason



59/80: was I right?

Name: Grey Owl #10

Date: Sun Jan 28 18:37:03 1990

Is pad to pad totally dead?

grey owl



60/80: atm

Name: The Mentor #1

Date: Mon Jan 29 02:31:40 1990

I don't believe that will work. From everything I've surmised, data is 

encrypted inside the ATM and not decrypted until the bank. If someone has 

direct experience to the contrary, please let me know...

Mentor



61/80: hmm

Name: Phoenix #17

Date: Mon Jan 29 02:52:45 1990

i have direct experience to the contrary..

there was a bank which was continuously dialling its host whenever an atm 

would be used..

from memory the nua it would call was 8181 or 8184 i cant remember..

i dont know the name of the bank... but what i did as as follows..

pad to pad.. intercept atm connection to host..

capture data..

disconnect from remote atm..

connect to host and send data to it..

the reply was not encrypted.. in raw text ormat..

we then found all sorts of uses for that thing.. :-)

and i still dont know the name of the bank 8-)

ahh, the good old days...

phoenix



62/80: hmmm

Name: The Mentor #1

Date: Mon Jan 29 17:37:31 1990

How long ago was this? Android Pope & I found an ATM that had a standard 

4-prong phone jack next to it. Just for fun, we checked it out. We couldn't 

get anything but garbage (we tried many different paritys) - and yes, we did 

establish that data only flowed when the machine was in use.

me



63/80: ...

Name: Erik Bloodaxe #2

Date: Mon Jan 29 19:17:26 1990

You can still connect to public pads on several networks around the world.

Find out which ones yourself...

ATM's...I don't see why they would be encrypted...especially those that are 

hooked up with dedicated lines to their institution.  The ideal ones to mess 

with are those at remote locations where they only update once a night 

(usually 12 or 1) and grab everything as it spills out.

This intrigues me greatly...never can have too much cash laying around.  Neat 

how we are already talking about data taps too, huh?  Can the feds put 2 and 2 

together and get 4?  Hehe...

->ME



64/80: ATMs

Name: The Dictator #43

Date: Tue Jan 30 01:22:02 1990

This should really go on "Electronic Banking", but since we are discussing it 

here.....  The example Grey Owl is refering to was on "America's Most Wanted", 

or somthing like that...about a guy who worked at a bank, learned the system 

and whatnot.  He went home, and programed a "duplicate" (extensive trojoan, if 

you will)...on his PC.

 

He then placed his PC between the ATM and the host...When the host would send 

or request commands, those commands would be intercepted by the PC first...the 

programmer would then send his OWN commands to the ATM.  Etc, etc..  The show 

did not say whether or not the data was encrypted.  It would seem to me, that 

since this guy worked at the bank, that it wouldnt matter...cus he would know 

the encryption process anyway...

 

The Dictator



65/80: ok..

Name: Phoenix #17

Date: Tue Jan 30 07:21:13 1990

well.. this all happened in the setting stages of pad to pad on telenet

basically i noticed that a whole lot o ports would continuously try to connect 

to a certain constant nua. upon intercepting this call.. i recieved no input 

<ahem i mean response> visible on screen, but noticed my modem RX lights 

blinking. turn controlchars on,and notice cntrl-e flooding in, constant breaks 

between each. this was same on any connection made to this nua. what the 

system was waiting for was a control character as a response to start session, 

and upon recieving it transmitted data to the host. after several attempts, i 

managed to figure out pretty much how todo most transactions.. what i did use 

it for was to sprint various numbers <ie left some mainfrme connecting to it 

day and night trying various numbers and seeing what worked>.

had i known the name of the bank, and domeone who lived in the area, could 

have had a lot of fun! actually it may still work.. havent checked it for many 

a moon..

phoenix



66/80: atm's

Name: Ravage #19

Date: Tue Jan 30 10:57:19 1990

well the basic technology is available in any engineering library. the one

here at ut has several good books on them. a lot of them are connected by

secure dedicated land lines to the banks and s&l's. some of the newer ones

use a coding scheme based on the trap door algorithm which was broken by

the isreali's. but it takes a big machine a long time. nothing even 

approaching real time.



67/80: btw:  I never saw

Name: Grey Owl #10

Date: Tue Jan 30 17:48:03 1990

I never saw that episode of America's Most wanted, but that does sound cool.

It's scary to think that I have the same mind-set as one of the top-10 

criminals in the US.

grey owl



68/80: Hey, does

Name: Alter Ego #110

Date: Tue Jan 30 19:03:09 1990

anyone have any idea on how to aquire an NUI?? Leave me e-mail... Thanx...

Alter Ego



69/80: call

Name: The Mentor #1

Date: Tue Jan 30 22:51:02 1990

Call telenet engineering and b.s. them out of it...  

Mentor



70/80: Saudi

Name: The Parmaster #21

Date: Wed Jan 31 14:14:38 1990

    Then there is the old Saudi citicorp system i connected to...

(same concept as pad to pad)

when it got it's little <ctrl-L> 

it fed me :-)

it fed me good.

Every fucking card issued by citicorp to Saudi Arabia..

several different Multi-Bank authorizations reports acutally...

with ALL the detailing information.

all the damn thing wanted was a control-L

and to think...

I just did it to clear the fucking screen.

Later,

The ParMaster

<Jason>



71/80: heh

Name: The Mentor #1

Date: Wed Jan 31 16:28:56 1990

There are several systems that respond in a very positive manner to a 

control-E. 

Mentor



72/80: par

Name: Silencer #31

Date: Wed Jan 31 21:34:55 1990

you ever use at&t calling cards or the like? my grand mother recently recieved 

a $7500+ phone bill from at&t. seems someone got her calling card....lots of 

calls to saudi arabia.... i would kill to have her fucking phone bill....god 

damn..but the bitch wont gimme it. 

    - me2



73/80: Stuff

Name: The Dictator #43

Date: Thu Feb 01 02:43:24 1990

Hahaha... Thats funny...AT&T calls to Saudi Arabia...ahem..I mean, my 

condolences to your Grandmother..heehh

 

Par, Control-L huh?  Damn...Kinda nice when live those in those little 

"extras" huh?  hehe..

 

Grey Owl :  If you think about it...the best criminal minds in the country are 

those guys who write those murder mystery shows.  Now THATS some creative 

stuff.

 

The Dictator



74/80: memories..

Name: Phoenix #17

Date: Thu Feb 01 10:09:02 1990

par.. remember that one which had the 7 digit limit..

ahh.. never even used the damn thing.. <sighs.

phoenix



75/80: X.29

Name: Mr. Slippery #72

Date: Fri Feb 02 23:41:20 1990

Someone about 25 posts ago asked about X.29. Its part of the X.25 protocol,

I think along with X.3 and some other numbers. X.25 is what Tymnet and

Telenet and the RBOC equivalents use as the protocol.



76/80: Ctrl-L?

Name: Phelix The Hack #89

Date: Mon Feb 05 11:31:08 1990

as in TRW?



pth



77/80: Pheenster...

Name: The Parmaster #21

Date: Mon Feb 05 20:08:58 1990

    Yes i do remember that 7 dig bad boy...ah memories are forever someone 

once said.  also a Mister "f" i think (like the letter thats phucked on your 

keyboard).  and Phelix... ctrl-L on TRW?  Well we'll have to talk about that 

sometime.



Later,

(still <AMAZINGLY> Alive!!)

Par

Jason

.



78/80: ..

Name: Tak/Scan #44

Date: Mon Feb 05 23:21:29 1990

Well On some system "..." also activates a certain OP system.

 so try ... or %%% or something like that. but always use ctrl characters when 

nuth else works that usually activates it.

NO SYSTEM is100% Secure!



The 4th Dimension! 619-745-1xxx. Login PW-SPECTRUM. Newuser PW-Gunship.



79/80: SDS and Packet/74

Name: Sventek #137

Date: Tue Feb 06 07:32:44 1990

I ran into a SDS gateway type of sytem on TElenet.  If anyone have any 

correspondants to it other than TSS could ya post em.  Allso if ya know any 

other type of info on it post it as well.



I also ran into a Packet/74.  Ctrl-M a few times and a message concerning port 

00 being busy.  As well as some other info like MHP 1232 swa etc.  If anyone 

can enlighten me on this system, please do so....  all ears.(eyes).



Sventek



80/80: hmm

Name: Phoenix #17

Date: Tue Feb 06 13:24:06 1990

the thing about people like us is that we never give up <hehe>

just when they thought it was safe to start usingcommon/no passwords again..

that mr "f"<key works now> has done some major developments in that area 8)

phoenix





 ______________________________________________________________________________



                     *** {BT Tymnet Packet Net Sub-Board} ***



< Q-scan Tymnet 7 - 49 msgs >

1/49: This Sub

Name: The Mentor #1

Date: Sun Jan 07 20:44:33 1990

This sub is for the discussion of British Telcom's Tymnet packet network.

Mentor



2/49: ...

Name: Erik Bloodaxe #2

Date: Tue Jan 09 14:29:25 1990

Hehe...I bet a lot of you didn't know that.

Um...things:

On many tymnet hosts, you can specify different routings, and different

sub-addresses by adding a number after the username.

IE:  username:200 will connect to the host connected to that username at 200.

(if one exists)  This is VERY cool on usernames that go into a subnet.  

For instance, the Veteran's Administration has a subnetwork on Tymnet (Which

I should still be heavily entrenched, if anyone knows a few wounded Vietnam

vets who need extra money in the Disability check) and you can connect

to literally hundreds of different systems by specifying the nubmer after

the colon.  Waycool, eh?

In the case that many of you are familiar with, adding the g and dnic after

the username, ala username:g2624, etc...  That is telling tymnet to rout

the packet connections through whatever gateway needed to complete the call...

SO, when you call france through fradec, you get ftcc, when you call germany, 

you get sf.  Neat.

Also:  the standard for tymnet "Nui's" is a t.  followed by a username, incase

any of you want to hack away.  I'm eventually going to scan ALL usernames

from a to 99999999 when I get around to writing the damn program.  NUA scans

of Tymnet have been done, and a ver recent one should be floating around, 

as Phoenix has just finished it.  The problem I have with NUA's is that

I can only get to them from Canada!  (Or other places) Which is a bitch, 

since I need to figure out a way to do it from Tymnet.  Anyone

know an nui on tymnet that will allow for connections back into 3106?

->ME



3/49: ok.. ill put my tymnet scan up here

Name: Phoenix #17

Date: Thu Jan 11 03:56:52 1990

but its not quite finished yet..

Phoenix

/e



4/49: anyone with a Scanner..

Name: Grey Owl #10

Date: Thu Jan 11 18:02:33 1990

Right now, I'm just a spare CPU.  In other words, I can run a scanner for you 

to help speed up scan.  NUA's, Tymnet etc. is ok.

grey owl



5/49: tymnet to tymnet

Name: The Electron #32

Date: Mon Jan 15 06:30:33 1990

dunno about nui's but the only nuas hosts on tymnet can call on tymnet are 3106

and 31069 as far as i can tell....

and i guess nui's would be the same...btw tymnet is one of the few nets that 

doesnt

send the calling address to the remote host (lets the pad software do it)

so u could probably patch stuff like psipad.exe to send a fake calling 

address....

nice for hacking govt stuff i guess



6/49: Tymnet

Name: Gary Seven #38

Date: Mon Jan 15 11:06:32 1990

    You have a way to reach 3106 DNIC's Erik.  Hmm if ya could relay that 

information to me someway via mail or post it.  I have a NICE outdial from 

Tymnet 300/1200/2400 + they convert.  Say you call at 2400 and want to call a 

300 baud system they convert the baud rates.  If its still up that OD is NICE 

it calls everywhere in the U.S i know not sure about GLOBAL possibility's



7/49: Well....

Name: Konica #47

Date: Mon Jan 15 16:43:29 1990

Instead of doing a :g2080 I made a mistake and did a ; instead. Now after I 

did that what was it I might have gotten? I ot something that promted me with 

a bunch of things.

8/49: Tymnet...

Name: Erik Bloodaxe #2

Date: Mon Jan 15 17:30:00 1990

You can reach  3106 addresses from Datapac...

You can also do it from most overseas networks, 

and you can do it from Telenet, provided you have an NUI.

Notice, if you do 031069 it says not responding, but try it with

an NUI.  Real big drag.  It works.  Telenet error messages are

terrible.

->ME



9/49: How do I get to dpac?

Name: Grey Owl #10

Date: Mon Jan 15 18:08:17 1990

Is there a dialup you can give me?  (WATS maybe?!)  I wonder if there's an 

interface like there is for Autonet?

grey owl



10/49: DPAC

Name: Erik Bloodaxe #2

Date: Mon Jan 15 23:48:04 1990

In order for you to call 3106 addresses from DPAC, you will

have to call up one of the Canadian dialups...

I will have to dig around to find the DPAC information computer, so

you can get a listing of the damn dialups...there are no

WATS numbers for DPAC that you can reach from the USA.

->ME



11/49: and

Name: Phoenix #17

Date: Tue Jan 16 07:36:23 1990

when was last time anyone scanned the darn thing... mine is rom beginning 88, 

3 digit scan all areas...

anyone got better/newer ?

phoenix



12/49: dpac info NUA

Name: Grey Owl #10

Date: Tue Jan 16 08:51:14 1990

There are two of them and I'll just post 'em here:

0302092100086

03020760101901

These have lots of dpac NUAs for thier outdials and some other stuff like 

that.  I can find a direct dialup myself.  I was just asking to see if I could 

save myself the trouble and get a WATS.

grey owl



13/49: DPAC

Name: Erik Bloodaxe #2

Date: Tue Jan 16 19:37:46 1990

My DPAC scan was finished last month...it ran from mid Sept. to December.

I haven't checked everything out yet, as the files are HUGE and my time

is limited.  If anyone local wants to help, I'll give them a copy of the 

printouts and they can check them out with me...(if you want)  

That way, maybe it will get finished before NEXT September.  Hehe

->ME



14/49: hmm

Name: Phoenix #17

Date: Thu Jan 18 02:03:48 1990

networks are getting bigger and bigger..

sigh

one o these days ill write something which reads nua list and calls them all...

just to make sure they all still work.

will make updating a hell o a lot quicker..

actually thats really stupid

Phoenix

<tired>



15/49: dpac dialups

Name: Silencer #31

Date: Thu Jan 18 06:07:14 1990

Well...I have quite an extensive list of dialups...I'll u/l it in some section 

of the xfer....herez a few if thats all you need...

               DATAPAC 3101 PUBLIC DIAL ACCESS NUMBERS

                        Y = ACCESS AVAILABLE

                       N = NO ACCESS AVAILABLE



ST CITY            MODEM       AC  PHONE # 300B? 1200B? 2400B?

-- ----            -----       --  ------- ----- ------ ------

AB Airdrie         212        403 234-7440     Y      Y      N

AB Banff           212        403 762-5080     Y      Y      N

AB Calgary         212        403 264-9340     Y      N      N

AB Calgary         212        403 290-0213     N      Y      N

AB Calgary         224        403 265-8292     N      N      Y

AB Edmonton        212        403 420-0185     Y      N      N

AB Edmonton        212        403 423-4463     N      Y      N

AB Edmonton        224        403 429-4368     N      N      Y

AB Ft. McMurray    212        403 743-5207     N      Y      N

AB Ft. McMurray    212        403 791-2884     Y      N      N

AB Ft.Saskatchewan 212        403 421-0221     Y      N      N

AB Grand Prairie   224        403 538-2443     N      N      Y

AB Grande Prairie  212        403 539-0100     Y      N      N

AB Grande Prairie  212        403 539-6434     N      Y      N

AB Leduc           212        403 421-0250     Y      Y      N

AB Lethbridge      212        403 327-2004     N      Y      N

AB Lethbridge      212        403 329-8755     Y      N      N

AB Lethbridge      224        403 320-8822     N      N      Y

AB Lloydminster    212        403 875-4769     Y      Y      N

AB Lloydminster    224        403 875-6295     N      N      Y

AB Medicine Hat    212        403 526-6587     Y      N      N

AB Medicine Hat    212        403 529-5521     N      Y      N

AB Medicine Hat    224        403 528-2742     N      N      Y

AB Peace River     212        403 624-1621     Y      Y      N

AB Peace River     224        403 624-8082     N      N      Y

AB Red Deer        212        403 342-2208     N      Y      N

AB Red Deer        212        403 343-7200     Y      N      N

AB Red Deer        224        403 341-4074     N      N      Y

AB Sherwood Park   212        403 421-0268     Y      Y      N

AB St. Albert      212        403 421-0280     Y      Y      N

AB Stoney Plain    212        403 421-0236     Y      Y      N

therez the majority of the dialups for Alberta.

Anyone interested in lists of Telenet, Tymnet, Datapac, or LATA dialups...call 

this info data line.

800-848-4480,

Host Name: CPS

User ID: 74,74 

Password: Network

l8r on   - SIlencer



16/49: Tymnet

Name: Sicilumm Thorne #28

Date: Fri Jan 19 15:46:53 1990

    Does Tymnet have any InterActive chats like Altos or Hamburg?

Sic.



17/49: ??

Name: Silencer #31

Date: Fri Jan 19 18:11:52 1990

Altos OR Hamburg?  Altos is located in the city Hamburg as far as I know...and 

does Tymnet have any?  Well.. that chat systems QSD and both altos's can be 

reached from just about any network in the world... on tymnet there are 

several ways of reaching them.  I use trt...btw.. CAn someone tell me what 

this is exactly?  What is Trt?

    - SIlencer



18/49: trt

Name: Grey Owl #10

Date: Fri Jan 19 19:17:42 1990

trt is a username.  the :g part indicates that you want billing for the 

following NUA to be sent to the username trt.  And valid username will work 

like that.

grey owl



19/49: trt

Name: Dark Sun #11

Date: Fri Jan 19 19:58:59 1990

Its also an x.25 net (check out the file on dnics in the file section)... I 

guess when u use trt you're actually using a gateway to trt's facilities 

(wherever they are)

                             DS



20/49: Well....

Name: Johnny Hicap #45

Date: Fri Jan 19 22:12:14 1990

Try doing trt; and you will get a menu of things....

What is this menu for?



21/49: trt menu

Name: Grey Owl #10

Date: Fri Jan 19 23:13:44 1990

it's for changing the parms of the gateway if you don't know the Tymnet 

commands.

 

The only command I know for Tymnet is backspace...turns off echo.  trt is a 

username.  The :g<DNIC>;<address> tells it to bill that call.  trt is not the 

name of a network.  

grey owl



22/49: nononono

Name: Dark Sun #11

Date: Sat Jan 20 00:14:54 1990

the trt menu is the same as the fradec04 menu... It lets you select which port 

you want to connect to (ie a pattern testing port)... Selecting port 90 is the 

same as "c 0311611122222.90"... notice that port 99 is an exit command...makes 

you wonder...

                             DS



23/49: Please sahre ...

Name: Wiz #25

Date: Sat Jan 20 06:36:56 1990

RE: Tymnet

I have a NICE outdial from 

Tymnet 300/1200/2400 + they convert."

Gary - please sahre the NUA with us all so that I can use it - the PCP global 

outdial that I have is only a 1200 BUAD outdial, so a 2400 one would be a 

dream come true.

Thanks.

MPE Wiz



24/49: Tymnet outdial

Name: Sicilumm Thorne #28

Date: Sat Jan 20 17:49:16 1990

    I've got an outdial service too.  Its been working for three years, 

believe it or not.  And just recently moved up to 2400 (thank you).  I'll 

share the NUA, but not publicly.  If I lost it, now THAT would suck.

Ciao.



25/49: TRT

Name: The Parmaster #21

Date: Sun Jan 21 10:12:52 1990

    Well aside from all the explanations i've seen so far.

(in my opinion)

it is the username for the barbados (maybe it was bahametel. don't remember)

the username for their test diag s/w

i think it's a little option we can take to our advantage (the :g )

It seems to work on any username that connects specifically intl (as far as 

i've seen)

thought maybe it meant "global" and then looked thru the DNIC HOST tables and 

prompted you for the rest of the address after looking to see if it was 

actualy in the tables.. there by bypassing the actual address it was supposed 

to connect you to and allowing you to specify one.

But dunno.

(not sure about anything anymore the world is fucked up )

but peaceful

<for everyone but us..>

Later,

Par

Jason



26/49: what's the best way to scan Tymnet now?

Name: Grey Owl #10

Date: Sun Jan 21 11:29:39 1990

Since Telenet was shitty enough to ditch the connection between 

Telenet/Tymnet, scanning Tymnet has been hell for me since I live in the US.  

What other networks in the states are linked to Tymnet?

grey owl



27/49: As was said by someone earlier (maybe on this board)

Name: Dark Sun #11

Date: Sun Jan 21 20:55:11 1990

the :g tells the username to route the call thru any gateway it needs to to 

get to its destination (hence, the g).

                                DS



28/49: Telenet/Tymnet

Name: Daneel Olivaw #9

Date: Sun Jan 21 22:30:43 1990

According to the techs at Telenet...

There is still a gateway between, but it is limited access...

Daneel oLivaw

/?

/h

/a





29/49: tymnet

Name: Ravage #19

Date: Sun Jan 21 23:51:30 1990

1-800-336-0149 for information. all i do is tell them what city i am

in and what the numbers are and they give them to me.

far as i know you dont need an account on any of the connected systems

to get this info.



30/49: ???

Name: Erik Bloodaxe #2

Date: Mon Jan 22 02:56:29 1990

What?  You are saying that you can call the techs, give them an nua, and they 

will give you the mnenmonic???  YOu must be talking about something else...god 

I hope so, I can see them being that dumb...

Uh, scanning tymnet, if you won't do it nua-wise through DPAC, try doing all 

the combinations, but on each 3rd time, type a username that does connect to 

something so that the error count resets...like old lovable t.fradec02 or 

something...

For you outdial hungry kids...I suggest you get a job and do this:

On tymnet, STARLINKINFO  it will connect you to starlink's information service 

so you can find out all you need to use this...It's tons better than 

pc-persuit, cheaper, and more locations served...

not bad

->ME

31/49: xray

Name: Phelix The Hack #89

Date: Mon Jan 22 23:50:36 1990

umm...anyone have any notes to compare on xray (hint hint erik?) I have found 

quite a few VERY interesting "things" (for lack of a better non-descript 

word), and any additional help on PDP-10 /ISIS would be helpful as it gets 

real old learnig from online help mans...

 

pth



32/49: ummm

Name: The Mentor #1

Date: Tue Jan 23 01:08:41 1990

What do you want to do on the PDP? I'm sure I've got my old manuals 

someplace...

Mentor



33/49: tymnet...

Name: Ravage #19

Date: Tue Jan 23 13:31:49 1990

no that will just get you the local number to call for access. the rest

is up to you. i read the intro.

 

isis was also used by intel on the intel mdl 800 development system 

so give them a call and get some manuals on it.

 

we have a bunch of manuals for the pdp 11's, but more are appreciated

what will eventually happen in the next year or so is this, we will 

expand to six phone lines, use novel net to network the 3 pdp's and

about 40 other machines with an i-net node and a compuserve feed 

(it is great being non-profit). this will give us at least 600M

disk space, 2 9 trk for offline stores, and two different international

feeds out of the network at local cost.



34/49: XRAY

Name: Erik Bloodaxe #2

Date: Tue Jan 23 23:04:18 1990

Arg...I will send you the whole xray manual if you want...

There is an option to attach to a node and print ascii dataflow...although I 

can't get it to work right, (but I haven't dicked with it seriously at all)

This is good to learn, as I have XRAY access on a ton of TYMNET subnets!  Even 

a bank or two...hehe.

Also, if anyone can get me a TMCS or PROBE or NETVAL manual, or can find 

somewhere where I can get it online...(I know that trw has tem online 

somewhere) I would REALLY appreciate it!

->ME



35/49: everyting

Name: Phelix The Hack #89

Date: Wed Jan 24 12:22:05 1990

Mentor:  ok..on a PDP-10..running RSTS/TOPS...each sub directory is treated as 

a "user" of the system; regardless of whether or not that is the case.  I can 

list out these directories (FILES/DIR) IF and only IF I know the name of the 

directory...how can I get a master "root" listing of ALL avaialble 

directories?  As of right now, I have to keep scrounging around until I find a 

new one (new to me) mentioned in mail or in I/O...

 

EB: yeah..send me everything you have on xray..about the node option are you 

doing it by ex: loginid:XXX..where xxx is the particualr node in 

question?...that is the only way that I know of specifing..as far as 

ASCII..hell, just buffer it in Hex and run it thruogh a connvertor ...

  

pth



36/49: "trt:g"

Name: Sicilumm Thorne #28

Date: Wed Jan 24 13:19:04 1990

    As most of you know by now, Barbados is now off the network.

 

    And the fradecal systems aren't too hot.  They can do some of 2080 

(france) and some of Germany (2624).



37/49: they can do almost anything

Name: Dark Sun #11

Date: Wed Jan 24 16:01:39 1990

the fradec's can do almost anything but telenet by using the :gDNIC parameter

                               DS



38/49: f

Name: Dtmf #27

Date: Thu Jan 25 03:31:23 1990

RE: ??



you ask what is trt?   Well, trt is dead is what it is..Shit...Anyone know 

about the username 'dte' on Tymnet?

DTMF



39/49: trt

Name: Dark Sun #11

Date: Thu Jan 25 15:31:37 1990

was up and down irregularly and now it IS gone... use the :g parameter with 

the 2 other usernames you know (they are common knowledge, but i wont post 'em 

here due to mentors ``rules''

                             DS



40/49: two things

Name: Sicilumm Thorne #28

Date: Thu Jan 25 20:39:41 1990

    Someone was mentioning things they found on Tymnet.

 

    Here's no login's with no passwords:

 

    pcinet

    alascom

    

    And of course, some public information is:

 

    dpac; 3020xxxxxxxxxx

 

    It will do some other DNICs.

 

    I have some other stuff, but I'm not too sure where I put it.  <That's 

safe.>

 

    Sic.



41/49: dpac; 3020xxxxxxxx

Name: Dark Sun #11

Date: Thu Jan 25 22:03:18 1990

that will only work on non-refused-collect pads......

                                 DS



42/49: hmm

Name: Silencer #31

Date: Thu Jan 25 23:49:37 1990

cna is also an acct....needs a pass though..

I find it hard to believe that since trt died ALMOST EVERYONE has stopped 

calling the chat lines (other than QSD)..god...what a bunch of incometent 

fools... shit.  I'm sure ANYONE can use fucking Pac*it plus...right?!?!

.s



43/49: Or.

Name: Sicilumm Thorne #28

Date: Fri Jan 26 08:12:58 1990

    Yes, since "trt" died everyone is gone.  A lot of those people were "MDA" 

(some Phreak groupie band in trhe midwest).

 

    I was online for two minutes last night, thanks to whoever informed me 

that the "fradical" accounts could still do it, even if they were barred from 

DNIC's, by doing the following [in case you missed it]:

 

    fradical:gDNIC;password

 

    Of course fradical is merely a made up name and has nothing to do with 

real life, or my dreams.  And DNIC is, of course, a number, and password, 

silly, that's not real either, but it sure would make life easier.

 

    Sic.



44/49: Outdial

Name: Sicilumm Thorne #28

Date: Fri Jan 26 11:23:47 1990

    Curiousity.

 

    Can an outdial dialup DNIC's?  Like normally, or for instance this is how 

I call Phoenix Project:

 

please log in: dialout:1306;password

                       ^^^^\

                            Tymnet Dialout Port

    (I use 1306 because that way Phoenix is not a long distance call, wah la).

 

    Now, if I were to do something like:

 

    dialout:g2342;password

 

    would that do anything for me.    Is there a text file that explains all 

the Tymnet little keyword/keycharacters?

 

    Sic.



45/49: yes

Name: Silencer #31

Date: Mon Jan 29 20:30:31 1990

yeah...you can type "information" from tymnet logon...it might be of use... 

also... the acct:gdnic method wont work for USA dnic's for some reason..i 

dunno why... it connects THROUGH USA gateways though....hmmm



46/49: :g for USA dnics

Name: Dark Sun #11

Date: Tue Jan 30 11:20:25 1990

There is some kinda "regulated" gateway between tymnet/telenet (and may be for 

the other nets like TRT)... I guess the only way to connect to one of those 

NUAs is to go thru that specific gateway...

                             DS



47/49: arg...

Name: Erik Bloodaxe #2

Date: Mon Feb 05 00:57:33 1990

i was just wondering...

has anyone ever been able to get ftcc to do anything?

ftcc:gdnic; gives you the ; back like a gateway, but always connects you to 

FTCC MACS

which I was never able to evoke ANYTHING from...real fucking annoying.

->ME



48/49: if anyone's interested..

Name: Grey Owl #10

Date: Mon Feb 05 16:50:24 1990

the usernames 'sched' and 'dbsched' work on Tymnet.  I've not gotten passwords 

yet though.

grey owl



49/49: j

Name: Dtmf #27

Date: Tue Feb 06 19:54:52 1990

[CThe only thing I have been able to come up with ?on the MACS is that if you 

hit ctrl-e then it will say FTCC MACS again...It almost looks like an editor 

(Like EMACS)



< Tymnet Q-Scan Done >



 ______________________________________________________________________________



     Copyright (C) 1993  LOD Communications.  No part of this  Work may be

     distributed or reproduced, electronically or otherwise, in part or in

     whole, without  express written  permission  from  LOD Communications

 ______________________________________________________________________________



           *** {End of Phoenix Project BBS Message Base File 2 of 3} ***