SlideShare a Scribd company logo
1 of 24
Download to read offline
Attention Readers!
2600 is always looking for information that we can pass on
to you. Whether it is an article, data, or an Interesting news
item-if you have something to offer, send it to us!
Remember, much of 2600
is written by YOU, our readers.
NO IE: WE WILL ONLY PRINT A BY·UNE IF SPECIFICALLY REQ'JESTED.
Call our office or 88S to arrange an upload. Send U.S. mail
2600 Editorial Dept.
Box 99
to
Middle Island, NY 11953-0099
(516) 751-2600
OSUNY
2600 BBS#l
Available 24 hours a day with a wide
range of information on computers,
telephones, and hacking.
CALL TODAY!
914-725-4060
We now have several ways of staying
in touch with the rest of the world. As
promised, the first official bulletin
boards of 2600 ,llagazine are now online
with more on the way.
We 're quite happy with what we've
started out with. The two boards are
both in area code 914, just north of,Vew
York City. Board #1 is the legendary
O...,'UVY, a BBS that has been talking
about phone phreaking and computer
hacking for longer than any other board
that we can remember. In fact, OSUVY
is mentioned on the very first page of
our very first issue. And it's also been
referred to in Newsweek, although not
very accurate/yo Board #2 is the (entral
Office, anotner well known bulletin
board for hackers and phreaks. We're
proud to be affiliated with these boards
and we'd like to ask anyone else
interested in running a 2600 board to log
onto these first so you can see what a
2600 board is all about.
As we've stated previously, these
boards are completely open to whoever
calls in. ,Yo area is off limits or for
"elite" users only. There are no areas of
(continued on page 10)
STAFFBOX
Editor and Publisher
Eric Corley 110
Office Manager
Bobby Arwatt
Cover Art
Ken Capel
Tish VaIter Koch
Writers: John Drake, Paul Estev, Mr. French, Emmanuel
Goldstein, Chester Holmes, Lex Luthor, Bill from RNOC, David
Ruderman, Bernie S., Mike Salerno, Silent Switchman, Mike
Yuhas, and the usual anonymous bunch.
Production: Mike DeVoursney.
Cartoonists: Dan Holder, Mike Marshall.
Reader: John Kew.
Editor Emeritus: TSH.
2600 (IS.)". 074Y·JIi51) is puhli.lhed monthh hI" 1600 Enterprises Inc.. 7 Slr<mg:- Lane. Setauket. NY II!JJ.
Sl'wn" clal.1 !i()I/aKI'l'ermitl'l'ndinK at Setauket, ,veil" York.
I'OSI"MASTER: Send address changes to 1600. P.O. Box 752. Middle Island. NY II953-D752.
Copyright' II)X7. 2600 Enterprises Inc.
 early SUbscription: L .S. and Canada $15 individual. $40 corporate.
Overseas $25 individual. $55 corporate.
Back i"ues available fllr I'IX4. 19X5, 19X6 at $25 per year. $30 per year overseas.
ADDRESS ALL SllBSCRIPTION CORRESPONDENCE TO: 16l)() Subscription Dept., P.O. Box 752,
Middle hland, 'Y 11'I53-D752.
FOR LETTERS AND ARTICLE SlIBMISSIONS, WRI I"E TO: 1600 Editorial Dept., P.O. Box '19, Middle
bland. �Y 11'153-(01)'1.
lM/O Otilcc Line: 516-751-2600
BBS III (OSlI;Y): '114-725-4060
BilS 112 (C1; IRAL ()'I'ICE) '114-234-3260
lJSF;FI ADDRESS: 2600@dasysl.UUCP
ARPA;E I ADDRESS: phri!dasysl '26OO@nyu
2600 November. 1987 Pal!e3
HACKING IBM'S
by Lex luthor
and The Legion 01 Hackers
Introduction
IBM mainframe computers make up over 50
percent of the mainframes used today in the
United States These systems are traditionally
used In Industries such as insurance, banking,
universities, and so on. For some reason, IBM
systems as a whole have not been very popular
""Ith hackers. This may be due to the complexity
of the operating systems run on IBM systems
compared to others such as UNIX or VMS.
Another (eClSOn may be that there is much varlety
;rurn shop to shop. IBM systems are more
commonly llIodlfled and customized to fit an
incllviduill corporalion's Ileeds ilnd the lack of
lml'v'ersailty" for commands, files. programs ,
and oHler procedures makes it difficult to attempt
to use wltilout any type of speclf! c
documentation The lack of detailed orHlne help
also hinders the hacker. I believe tilat Hle
/M/CMS Operating System is by far the best ar1d
easily leamed of the IBM systems. But cOll1pared
to other Operatlllg Systems like UNIX or VMS.
fMICMS is cumbersome and harder to leall1,
Acronyms
Before I even attell1pt to start this Jrtlcle, I
wili list the iBM specific acronyms we Will he
USiilg and sorne others thJt you may find on
various IBM systems, Ilist tllern here so I Will not
'lave to do it tilrougilOut the artiCle. If you need to
kno,y wl1at one of them means later, just refer
back to tllis list
'JM/SP: Virtual Machine/System Product
CP: Control Program
eMS: Conversational Monitoring System
HPO: High Performance Option
VSE: Virtual Storage Extended
MVS: Multiple Virtual Storage
TSO: Time Sharing Option
JES: Job Enlry System
CICS: Customer Information Control System
IJSAM: Virtual Storage Access Method
VTAM: Virtual Telecommunications Access Method
IX: Interactive Executive
IPL: Initial Program Load
IVP: Installation Verification Program
RSCS: R�mote Spooling Communications Subsystem
DASD: Direct Access Storage Device
Page 4 Nm'ember, 1987 26()()
EREP: Environmental Recording Editing and Printing
SNA: Systems Network Architecture
NCCF: Network Communications Control Facility
REXX: Restructured Extended Executer language
VTDC: Volume Table Of Contents
DOCS: Display Operator Console System
JCL: Job Control language
ACF: Advanced Communications Functions
SQL/DS: Structured Query language/Data System
DBA: Data Base Administrator
GCS: Group Control System
SCP: System Control Program
FOP: Field Development Program
CNA: Communications Network Application
POF: Programmable Operator Facility
PSW: Program Status Word
SSCP: Subsystem Services Control Point
IPCS: Interactive Problem Control System
[JCSS: Discontiguous Shared Segments
IIMCF: Virtual Machine Communicalians Facility
FIFO: First In First Out
LIFO: last In First Out
AP: Attached Processor
MP: Multi-Processor
R/D: Read/Only
R/W: Read/Write
Logging In
TYPically, wilen you cOllle across a systen1
11I1lIlillg an older version (If CMS. it will respond
wltl1
VM/370 ONLINE
I
ThiS message IS somewhat of a contradiction .
The majority of VM/CMS systems are rarely run
011 actual 370 systems but on other processors,
such as the 43XX series and the 30XX series
file penod ' . ' prompt is ttle surest way of
vellfYlllg that you Ilave indeed cOllnec ted to a
VM/CMS system, aside lrorn the "VMi370
ONliNE' message which IS usually printed. fhis
prompt should not be confused with DEC's
TOPS-10 system, Wilich also has !Ilf) prompt of a
penod. Newer versions will giv::) you this menu
Enter one of the following commands:
LOGON userid (Example: LOGON VMUSER11
DIAL userid (Example: DIAL VMUSER21
VM/CMSMSG userid message (Example: MSG VMUSER3
GOOO MORNING)
LOGOFF
This menu may vary from system to system,
s i n ce system managers may opt to om i t
commands from the menu o r add others. When
hacking a system , this menu will appear before
you can attempt to login, thus becoming very
tedious and time consuming especially at 300
baud as you have to wait an etemity for each
logon attempt .
"Compa r ed to other
operati ng systems ...
VM/CMS is cumbersome
and harder to learn."
Other responses after connecting are "Ready
to Host", "Press break key to begin session" and
"Invalid Switch Characters". The last response is
commonly found on Telenet and other packet
switched networks, in which you may have to
specify "VM " for a VM/CMS system, or "TSO" for
an MVSITSO system . There may be other IBM
sysleills to select from, or "VM" may not be a
'lalla system. You may also have to specify
lOeON VM' or just 'LOGON" before the port
,:,elector connects you to the host system.
L D(JON Cdn be abbreviated as just'L' j:"
US0fi(j Cdi1 bt irornl-8 cliaracters in length. �)ut
':1st ct13racter must be a letter (in illl"
�j!er)b you corne across ihis wiil be trUt;, Out
clue to l.d:,loITIlza'iull of systems, it's
�r:IS i1i1(J even the 8 cllaldctel password lililit may
De extended) A tYPical logon olay look like:
.l COMOSOU.l StSGUtSS HOlPl
. ,
IS tile system prompt, L IS the LOCDN
command, COMOS [0 ; .; tile u:;elili.
SYSGUrSS is tlie anc N01PL is t(1(:
crdy
cor:cept f usel call bilO! (or tileir pan UI
the syster!) not the whole system (in Inosl
cases ) . NOI'L would be used when a system
dumps you into a program which allows you l ittle
or no mobility such as a restricted menu of
options ( i . e., a system backup utility) and logs
you off without gaining access to CMS. N O I PL
will prevent this program from running if it is
listed in your automatic I PL entry within the CP
directory. This should al low you access to the
system. Otherwise the program was specified to
nJn within your PROF I L E EXEC which l ists things
to be done upon logon . N O I PL is somewhat
simi lar but not identical to the login qualifier
"/ NOCOMMAND" for DEC's VAXIVMS systems.
I f t h e Password S u pp res s i o n Facility i s
installed o n the system, you wil l receive an
i nval id format message whenever the userid and
password are entered on the same line. This is
obviously a security measure to prevent users
from entering their password in full view of
anyone who may be watch ing as the password is
not "masked". Thus, you will have to enter your
password on a separate l ine when the system
prompts you for i t. The advantage of entering the
userid and password on one line (especially at
300 baud ) is that you can try more userids and
passwords in a shorter period of time while stili
availing yourself (1f the system's generosity of
infofTIling you whefl an rnvalid userid has been
entered.
Error messages
There are various error messages one may
encounter while logging into a VM !eMS system.
Tile ones you should be most concerned about
are'
Ilserid nol ill CP dir6clnry, Wilen an invalid
userid has been e: :r",(,(1, you will receive this
messa�je This rnCIC::t1 ion gives the hacker a
dic;trnct ::rJvailtage for [Jaining entry to the
system. t�le largest security hole in any
:,ystern COi;iC'; (ron' tel ling the user when a valid
user:<j';'�; ha�� been entered. After all. obtaining a
,;>iid iU I:) hall the battle. The olher half is
nr;ta:r,'q a valid password. Even the weakest
c,ocratiil'J systems PO ionqer give an Indication of
.;!"�n a v31id iD tw bee" p:rtered. Why leM haJj
[11't H',;s is 3. ;llt=}t8ry to :;-�(.�c
When a valid u:,o'id I:' enteredyp,.1 Wlii �e -
:1 :,I:;·�d t�) en� .�i :� �t �/ou LCd �ld; a!rp::ldy �>
dG SC i� thu COrr"?C1, the SyStt1li vvdl
'';:
';0 H nui you will (f�e�in one
or TWO messages'
2600 "�ijvemher, 1<)87 Pag� 5
US Social Security Prefixes
from The Disk Jockey
001-003 Ne¥l Hampshire 440-448 Oklahoma
004-007 Maine 449-467 Texas
008-009 Vermont 468-477 Minnesota
010-034 Massachusetts 478-485 IO¥la
035-039 Rhode Island 486-500 Missouri
040-049 Connecticut 501-502 North Dakota
050-134 Ne¥l York 503-504 South Dakota
135-158 Ne¥l Jersey 505-508 Nebraska
159-211 Pennsylvania 509-515 Kansas
212-220 Maryland 516-517 Montana
221-222 Dela¥lare 518-519 Idaho
223-231 Virginia 520- Wyoming
232-236 West Virgina �21-'524 Co lot- ado
232-232 North Carolina 525 Ne¥l Mexico
237-246 North Carolina 585 Ne", Mexico
247-251 South Carolina 526-527 Arizona
252-260 Georgia 600-601 Arizona
261-267 Florida 528-529 Utah
589-595 Florida 530 Nevada
268-302 Ohio 531-539 Washington
303-317 Indiana 540-544 Oregon
318-361 Illinois 545-573 California
362-386 Michigan 602-626 California
387-399 Wisconsin 574 Alaska
400-407 Kentucky 575-576 Ha",aii
408-415 Tennessee 577-579 Washington DC
416-424 Alabama 580-584 Puerto Rico
425-428 Mississippi 596-599 Virgin Islands
587-588 Mississippi 586 Guam, Samoa
429-432 Arkansas 700-728 Railroad
433-439 Louisiana
Some numbers are sho",n more than once because they have been
transferred from one state to another or have been divided
for use among certain geographical locations. No ne", 700-
series railroad numbers have been issued since July 1, 1963.
These are used by credit agencies and other services ",hen
verifing birthplace, tracking do",n individials, or for use
in creating ne", identification.
Page 6 November, 1987 2600
listening in: catch me ifyou can!
by The LNA Master
Are you tired of watching scrambled video
from HBO and the Movie Channel, etc.? And you
don't want to watch Dr. Gene Scott or Jerry
Falwell or any of the other TV preachers? Do you
feel your satell ite dish is going to waste? Wel l,
here's something fun you can do with it.
In addition to receiving video and audio
signals, your satellite dish can be used as a
wiretapping device. Yes, some of you can
actually wiretap from your own living room-a
fact you probably didn't know. Wiretapping is
il legal, but as the title of this article says, catch
me if you can. I t's virtually impossible to detect
this particular brand of listening in.
All you need for this project is your basic home
satellite dish antenna, also known as TVRO or
televison receive only. What you need to do is
tum to the AT&T satellite known as Telstar 301.
You'll notice between Channel 20 and 23 (that is,
Channel 21 and 22) you'll see a blank screen as if
there were a station there. You won't hear
anything except maybe an occasional garbled
sound.
This is what you do to listen in on phone cal ls.
Take a general' coverage shortwave receiver
(covering between AM broadcast band and 30
megacycles). Connect the antenna input of your
shortwave to the video out terminal on your
satellite receiver. Tune the shortwave receiver on
lower side band ( LSB) anywhere between the
broadcast band (1.6 megahertz) and 7.5
megahertz. Make sure your satel lite receiver is
either on Channel 21 or 22. You wil l pick up more
cal ls to Hawaii, Puerto Rico, Alaska, and the
Caribbean than you ever thought possible. Who
would have dreamed there would have been that
many phone cal ls to l isten to? About every 31f2
ki lohertz there is a phone conversation. If you do
not hear a phone conversation, you will hear a
cont inuous tone of 2600 hertz. Tune your
receiver to where you bel ieve 2600 is coming in
perfectly, then listen for a click followed by MF
(blue box) tones followed by a ring. You will then
be able to Iisten in on AT&T calls to area code
808, 809, and 907.
For frequencies above 4.1 megahertz, switch
to upper side band ( U SB). Also, you can tune in
Channel 8 of Telstar 301. It appears that Channel
8 on your standard satellite receiver box switches
to the US Sprint service from the mainland to
Hawaii. Sprint codes can be (and have been)
gotten successfully by l istening to the calls.
Interesting conversations are all over the place,
such as the man from Long Island who has two
wives and was promising the second wife over
the phone that she could stay in his house in
Hawaii until he "got rid of" wife number one.
Telstar 301 can be found at 96 W on the
satel lite dish. Spacenet 2, which is located at 69
W is all US Sprint. Domestic cal ls as wel l as
overseas calls can be monitored.
Other i nteresting satellites are ASC1 at
128 W, Westar 2 at 79 W, and Comstar 04 at
76 W. On these, simply tune across until you hit a
blank channel that looks like it's carrying a
si gna l . Then tune the shortwave recei ver
anywhere between 1.6 and 7.5 megahertz. If the
conversation doesn't straighten up, switch to
LSB or U S B on the shortwave.
THE 'TOP SECRET'
REGISTRY OF
U.S. GOVERNMENT
RADIO FREQUENCIES
%5 TO �70 IIIIZ
8Y TOil Kl'IEITEL. KUES
A Review of "The 'Top Secret' Registry
01 U.S. Gov8rnl1llnt Radio Freqlll/lCies"
by Mr.lcom
Scanner listening seems to have a certain
mystique amoung phreaks and hackers,
p a r t i c u l a r l y i n r e g ard s t o li s t e n i n g t o
mobi le / cord less/ ce l l u lar phones, and certain
government agencies. However, unlike mobile
phones, whose frequencies are wel l known, the
feds' frequencies appear to be hidden away from
(continued on page 22)
26()() November,1987 Page 7
the telecom informer
BY STAFF
r-[hey've done it again. This time,
after repeatedly and aggressively
promoting their 550 talk line
numbers (phone numbers beginning with
550 that connect callers to total
strangel)), New England Telephone has
devised a plan to block access to these
numbers from your home for a
monthly charge. This is supposed to
benefit those people who listened the
first time and called all those numbers in
the advertisements, winding up with an
incredible bill. Now that they've been
given a taste of what kind of "accidents"
their phones can have, a dollar or two
for "insurance" isn't so unreasonable.
Where have we seen this before? ...New
Jersey may soon have talking yellow
pages. Using a touch tone phone,
subscribers will be able to call a
computerized system, enter a four-digit
number, and listen to a recorded
message containing theater events, stock
market reports, and anything else you
could possibly want. The service will be
free to customers. To advertise on it will
cost about $!m a month....In Annapolis,
Maryland, a man pleaded guilty to
stealing long distance telephone service
using his home computer, which the
550 Blocking Service
Q: Wh.t 'I !150 Btocklng Service?
A:. It" , new HfVIce for ,,"Iclence customerl whO would ttb to .I!!!!!!! clll"
'rom Ihelr home telephone. 10 ,.k lines. TheM '"k Nne• .now cUllom.rs to N
connecled 10 gmuP cOIWersatlon•. New �IMd ntt.phone ptOricIet the connection
lind billing lor IhI cal" but I!'HI vwtou. 'Ilk 1M ..moe. .. GpefIIIed, monttor.d
Mel pmmoted b¥ DlMr oomp.,.d...
Q: Why 'I !1!50 Stocking Servtce being offentd7
A:. In orchtf to tIdd,.•• campl.nta from �t. who.. children ...,.,..ed unnpec:1ed
bill' by ceiling tllll!: line.. the o.p.rtment of PubUc utili'," Inllruet.. New Engt..s
n.lephone 10 «tfMttop ••erv!CI ttl" would lltow moM � ID fMlrtot .,...
to the.. MtYfcM 'ram theer home phonM.
0: How doe, S!5O Blocking Sel'¥lel wor1l7
A:. When CUltome,. lubscrlt. to 5!10 Blocking 8er¥� etIIl' "*'- from their home
'e'ephon•• 10 telephone numbers 1,...lng wllh "5ISO" (the exc:h� lINd aclueev.rr
tor 'alk I'MII) will not til; compte'ed. The r:a.... .... be InIormed .... MtCh ...
cannot be oompItIled from thlll telephone.
Q: ',MO Blocilino SeMCI .,,1I1Ib1e to ..,.ryone1
It.:. No. It. 1111 of the PChlnG" whlNl Ihlt ..Mel I, � pt'eHnlly 1l'IIIIIbIe
iIpge'" on IhI b-=k 0' thl. IhNt. 550 Blocking Is avalillbll to � .............
In "' olher IXchllflgn who IUblcftbllD unltrntted ,.. ,... .moe
• tMir Ioc.. MMca.
Q: What III do not .ubeoftbl to unlimited ftII: .. IeIvIoI buI woutd II" to ...rtot
lICe." to talk 11M.?
A: You eM e'ect 10 chen.,. your toe.. MI'YtcI to unllmn.ct ft.. rate ..rvtca
No come�1on eh.-ge appH.. II you CURWItly ,ublcrtbl to In optlonll c.tRnt INn
luch .. a.r 8t... c.lllnq. Circle c.lllna, Melropoiltln CIIHng.
eto. .. )'Our lac.. Mrvlee. Howevet', you wi. 10M 1M beMftta or __ ,... IIr
comertlng to unltrnlted net rate Mt'VIOe.
0: How much doe. MO Blocking Service COlt?
A: Thefe 'I • monthly Ctlarge 0' one doI'ar ror MO Blocktng 8ervlD& TNI .... II In
mdnlon to • monthty' cherge tor n.. rate ..... In )'OUt ...
II you woukt like to order S50 Blocking ServIce or .Impty leem moN IIbout n. pi.... OIl
1 800 555-MOO, hom within Meine, MIIIUChUHtt.. N.. Hempehl", Rhode ISiend or
'lennon!. From other Iac..lon.. pie... cal, your New EngIw1d � ServIce
""pntaent•..,. • the IeIeJIhOM number bted on the IIemIaIIon .. ADcounI: PIlle 01
IfIt. biN.
Page 8 November, 1987 261JO
judge ordered destroyed. An intelligent
man....While MCI and US Sprint are
trying to grow and recover from their
losses, AT&T is trying their best to
knock them out. AT&T has started a
new program for COCOT (Customer
Owned Coin Operated Telephone)
companies. The contract for this
program insists that payphone
companies route all their long distance
traffic through AT&T. The companies
receive between 3 and 17 percent
commission depending on how much
long distance usage there is. The
contract also states that the phones
cannot process Visa or Mastercard calls
(many COCOTs now have a magnetic
card reader installed), and goes on to say
950 and IOxxx calls are not allowed
unless the payphone tariff re4uires them
in that state. An interesting note: in New
York State the only rules governing
COCOTs are I) they must give free 911
service; 2) they must give free local
directory assistance or have a phone
book nearby (a book in the same
building counts!); and finally 3) either
on or around the phones there must be a
number for service or complaints....MCl
is expanding International Direct
Dialing. As of September 15, Israel was
MCI's 5gth direct dial country. They will
lease e4uipment from A 1&1' to facilitate
long distance service to another 140
countries....US Sprint now provides
access to over 60 countries, while only
about 20 are dialable with a fON card
(Sprint's calling card service). The rest of
the countries are only dialable with 1+
service. Among the countries not
dialable by calling card are Argentina,
Chile, Dominican RepUblic, Hong
Kong, and Taiwan. (As of November 7,
US Sprint suspended international calls
to the Dominican Republic from area
codes 212 and 305.) US Sprint says by
the end of the year they should handle
over gO countries....MCI will offer
operator service in 1999 so that
customers can use calling cards from a
rotary phone. Once that is established
they will also offer collect calls, trouble
assistance, and other operator services.
US Sprint has provided operator service
for a good while now. Just dial �00-332-
0777 or for you equal access nuts 103330
(107770 is now extinct)....While both
MCI and US Sprint are offering800
service neither provides 800 directory
assistance. Take 800-444-9999, an MCI
800 number owned by Mrs. Fields
Cookies�we called MCI and asked
them if they had the 800 number for
Mrs. Fields. They told us rather matter
of factly that the number for800
directory assistance is800-555-1212. We
tried to explain that that number was for
AT&T 800 numbers, but were silenced
with a click. When we called800-555-
1212, we asked the woman who
answered "AT&r 800 information," if
she had the number for Mrs. Fields
Cookies. She said there was no listing. It
just goes to show if you're going to get
an MCI 800 number, you have to
advertise or else no one will ever call
you....With US Sprint's ongoing
advertising nonsense about hearing a pin
drop over the world's only fiber optic
network they neglect to mention that
you can also hear one drop on every
long distance company -AT&T, MCI,
Allnet, lIT, RCI, Western Union (oh
well, almost every company). In its
continuing quest to cut over to
soon when yl'u call your access number
(for the 7 digit home codes) you will
hear a recording giving you a new
number. This day has already come.
There goes the last bit of GTE Sprint
left in US Sprint. And soon they11 be
selling their old network (see
illustration)....Southern Bell has a new
service for Florida residents who travel.
Called "The Right Touch Service", this
program allows customers to disconnect
and reconnect their telephone service via
a touch tone phone. From anywhere in
the country you can call800-826-6290 to
receive a series of interactive recordings.
Callers are asked to enter their telephone
number which must be in area codes
305, 813, or 904. They are then
prompted for a personal access code.
This 4-digit PIN number (not the calling
card PIN) was mailed to customers
recently. When this service was
(continued on next page)
.....................................................................................
Now's your chance
US Sprint is
selling a9,670 mile
communication network.
Some dUngs you doo't need two of. Especially two complete communications netWorks.
But when GTEt'Sprim aoo us Telecom merged to form US Sprint.Iha!:'sexactly what we
ended up wnh..
US Sprint is selling aD analogand digital mi.crowave network � �ces ov� 150 ma�
metropolitan areas t!Jrougbouttheen� Uruted StaleS. So 11you re Jl1�ted 111 something
from San Fr:mcisco to New York, CK from Bayoo Blue to Boutte, we mlgbtbeable to help.
Because now thal we've moved to an aU-fiber netWork, we simplydon·t need our micro-
wave network.
"Network 3" (originally scheduled to be �oo:i';�=��::::::;:'���::;t::.:;!..��:r,.
completed by June 27, 1987), US Sprint
pwcl>a>od:::::.:::tyhas sent out notices to old GTE Sprint
(950-0777) customers. The 9 digit codes ....�"':,."::�.:"�=��n:.';'::...200 feet in height. The DwJdings'm:fullycon.nected to local
(which started out as 7 digits plus a 2 power.fully�.and.va>gelOO"III""f....
digit travel code) were replaced by a 7 ':"=;;,xp�'���or�lChosthal""'be'i"'"
digit code which can only be used from
....�'::.'::ru,,"!:�.:���AnJ:':.,�""your home town. Even these new codes mostodvoncedin<he....uileind..tty.
were only given out to customers
....����.;z�=f=O�.::=��=;'without equal access. Until now when
....OwnedoDdlea>ed=l,,""'property""""""�Ih<he_orl<.
you traveled you could still dial 950-
....::= =";'v:I
=..!i�.:!�=i:=on
0777 and place a call without a fllW>C>olonays�.
surcharge. Now when you leave your Uyou""m_t.,Jin""""infonnanonobounheen... "'lWorl<,portlonsofit.ormany
-ON d d
of its components. gtve us a call at
city you must use your F car an
1-800-548-4825.
pay a 55 cent surcharge with each call. .................................................................................... .
The letter continued stating that one day
2600 November, 1987 Page 9
the telecom informer
introduced a few months ago, cu�tomers
had 3-digit PINS. It's quite possible that
those first PIN's were actually the
"account codes", those three numbers
that follow the telephone number on the
phone bill. With this service, there is no
fee to turn off your phone line, but there
is a $20.50 charge to turn it back on.
Right Touch is available 24 hours a day
and has the capacity to handle 26 callers
simultaneously. While it may be a handy
convenience, we wouldn't be surprised if
the service got more abuse than use.
Considering the amount of lines in
Florida, Southern Bell may have used
some sort of formula to assign the
1'11:, thereby avoiding the trouble of
entering millions of 1'1: lor their
customers. It anyone finds this to be
true, give us a call. Sanlord Bingham 01
CO .laKa::illl' reported that when the
service first started, he gave 305-555-
1212 as his number. "I gave 999 as my
code. Astoundingly it worked. The voice
thanked me and began to ask
questions." Since then, the system has
been programmed not to accept 555,
950,976,and others as valid exchanges.
On a similar note, customers of South
Central Bell can dial 1-557-7777,a toll­
free number accessible only to local
callers, to get billing information,
disconnect or reconnect service, arrange
for payment, order a duplicate copy of
their phone bill or custom calling
services, all without having to deal with
the business office. (What is left for the
business office to handle'? Most likely,
complaints about this new servict:.)
South Central Bell started this service on
a trial basis in early September with
40,000 customers in Kentucky....And
finally, we've discovered a marvelous
little game you can play with Sprint
representatives. If you call HOO-52 I4949,
they'll answer with the following
greeting: "Thank you for calling US
Sprint. By placing your order today, you
will enjoy the clearest sounding long
distance calls ever. My name is [name].
Page 10 November, 1987 2600
(colltinued/rolllpre,iouspaKe)
How may I help you?" I his is one of the
longest greetings we've ever heard and
we've made an amazing discovery
concerning it. If you hit a touch tont: in
the middle of the greeting, the
representative on the other end
automatically jumps to the word
"Hello'?" It just like an interactive
computer! Iry it today.
(('(Jiltilluedfrolll !JaKe 3)
the systems where credit card numbers,
,11( I codes, or passwords are being
pmted. But we refuse to put restrictions
on users' private mail. Above all else,
private mail must remain private. Fven
the system operator has no idea what is
in each user's private mailbox-that's
the only fair way to run a system. Of
course, it's quite possible that someone
will send a Sprint code to someone else
through the mail. Or an obscene word.
Or a poem. We do not take
responsibility for the contents of private
mail. And neither does the post office.
Both boards are similar in format.
There are a series of room:Oi to "(,'0TO ".
Some of them are obvious, some may
take a little guesswork. You can choose
the rooms you want to be a part of or
even create rooms. Fntry is not
restricted or monitored, but you do have
to know the name of the room you're
entering. (This is not hard information
to come by, either through guessing or
asking around.) Files are also stored in
some of the rooms. These are easy to
look at and download.
There is plenty of online help
available for users. And should you run
into a problem of any sort, simply leave
feedback or call us at (516) 751-2600.
Fvery 2600 board will have an area for
users to leave us public feedback. Both
of these boards have a 2600 room. You
can use this feature to communicate with
other subscribers, offer criticism, praise,
and suggestions. Of course, you can also
do this privately by sending us mail.
These systems are completely free to
use and full of information and
(collliflued Ofl page 21)
r-
MCI
MCIT'*""'..........._
Coroor.uon
Nortl'lust OIIlI"CIt' MtlOQl.llrtet'1
(: 'I, Im�lllo"al On",.
j::l'l' orOOIi "i•• Vanl. laS7J
9,.a�J7.sooo
Date: November 12, 1987
IE: Account��__________
A recent review of your .ccount indic.te• • po•• ibl. bre.ch in the
•• curity of the .uthoriz.tion cod••
Du. to chi. f.ct, w. h.v. ch.nl.d your .uthoriz.tion cod. a. follows:
Old Cod. N.w Cod.
!hi. ch.nl. h•• b••n ..d. for your prot.ction .nd i. eff.ctiv. imm.diately.
If you .r. bill.d for .ny un.uthoriz.d c.ll., pl•••• circl. th••• and deduct
froa your ch.rl... 'or furth.r inv••til.tion, th. entire invoice Ihould be
returned with p.,..nt to, Met Northe••t Divi.ion lnve.til.tion. Dep.rtment
.t the above .ddr•••.
If you h.ve .ny qu••tion. about your Mel .ccount, plea.e call:
Sincerely,
Coa.aric.l 800-444-5555
Re.identi.l 800-444-3333
MCI Northe..t
Inveltil.tion. Department
WHY DO THESE LETTERS ALWAYS LOOK SO SLOPPILY WRITTEN? In
addition to their inability to spell "commercial", MCI doesn't seem to be able to make
our new code work. When we called to find out why, the friendly representative told us
that "effective imml.'diately" means 5 to 7 days in most cases. In addition to providing
long distance alternatives, MCI now provides logic alternatives. Meanwhile, lJS Sprint
still hasn't gotten around to taking away that $1200 outstanding balance that someone
racked up on our account. "Just ignore it," they keep saying. That ought to be their
corporate slogan. On our last conversation, they told us that we actually had a $12,000
biII a few months ago which they never sent us since it seemed unusual. And so it goes.
26()() November, 1987 Page 1 1
WHY NOT
Double Beepers
Dear 2600:
Rec e n t l y you m e n t i o n e d beeper
compan ies not yet being ra ided by the
pol ice for phone n umbers. They don 't
have to ra id them! Accord ing to a friend
who runs a l a rge beeper compa ny, the
authorities ca n, with a warrant. leg a l ly
obta i n dupl icate beeper numbers. Any
access to the mon itored number a lso
beeps the dupl icate n u mber in the
pol ice station.
Bob from Los Angeles
How clever. So now we have beeper
tapping. But willthe beeper companies
be as cooperative with the authorities
as the phone companies?
Why No Boxing?
Dear 2600:
Apple Hacking
Dear 2600:
I thought some of you r readers m i g h t
be interested i n the fol lowing:
Does you r school have a bunch of
Apples hooked up to a Corvis? Wel l , if
they do, th is is for you .
I f you wa nt a l l the accounts and
passwords all you have to do is fol low
these simple i nstructions. Fi rst when it
prompts you for you r 10, simply hit ctrl­
reset a few times. You should now
have an Applesoft Basic prompt. Now
type in th is one l i ne program :
10 FOR 1=62 8 1 T O 7252 :PR I NT
CHR$(PEEK(I));:NEXT I
Nowtha t you have that typed i n,RUN
it. The program should dump a l l of the
pa sswo r d s o n to t h e scree n . Use r
n a m e s a r e u s u a l l y t w o t o f o u r
characters long. Passwords are two
characters long . Also, d isregard a ny
pu nctuation fol lowing a password .
Let's say you h a d some output that
looked l i ke th is: ... . . P1 P2 TYIPXX P3. . . ..
The "P 1" a nd "P2" wou ld be user 10's
t h a t r e q u i r e n o p a s s w o r d s . T h e
"TYIPXX" would be user i d "TYIP",
password "XX". "P3" wou ld be the
same as "P1.. and "P2".
In the cou rse of two yea rs of telecom,
I 've r e a d co u n tl e ss G-f i l e s w h i c h
desc r i be t h e ( v i r tu a l ) spectr u m of
"boxes". Yetfew fi les I've encountered
g ive a clear expla nation as to why
box i n g is i m poss i b l e i n e l ectro n i c
sw i tc h i n g off i ces. Wo u l d y o u m i n d
e x p l a i n i n g C o m m o n C h a n n e l
I nteroffice Signa l i ng (CCIS), and just
how an electronic office "prevents"
boxing? Thanks.
That's the basics of Hacking Corvis
Franken Gibe
C o n ste l l a t i o n . Un ti l next t i m e h a ve
Texas
Put quite simply, it's impossible to
us e a blue box in an electronic
switching office under CCIS because
the equivalent of the blue box tones
that a phone phreak would send are
transmitted over a completely different
line. Since you don't have access to
these lines, blue boxing no longer
works. This is also called out-of-band
signaling. For a more thorough
discussion. refer to page 2-7 of the
2600 1985 collection. available from
us for $25.
Page 12 November, 1987 2600
phun a nd hack on .
The Rifter
More How- To Articles
Dear 2600:
It's been awh i le since I 've seen a n
a rticle on boxing . W h y don 't you run a
h ow - to a rt i c l e-o n e th a t a d d resses
i nternationa l ca l l ing procedu res? I'm
sure you have the capab i l i ty of com ing
up with a very i nformative article on
this subject, a nd many readers wou ld
appreciate it.
Tabula Rasa
WRITE US A LETTER?
While we have a number of how-to
articles that we've published in the
past, we'll be happy to print any new
information, including new boxes,
calling techniques, etc. International
calling and red boxes are at the top of
our "wanted" list.
A New Source
Dear 2600:
I just fo u n d a g re a t s o u rce for
i nformation on news about security
a nd such l i ke. It's in a quarterly journa l
ca l led ACM SIGSOFT, which is the
"speci a l i nterest/software" group of
t h e A s s o c i a t i o n f o r C o m p u t i n g
Mach i nery. The a rticles with i n conta i n
a l o t of i n te resti n g i s s u e s a b o u t
security and 50 on , a n d many are a lso
amusing.
Read i ng these a rticles makes me
rea l i ze how m uch I m i ss the news
col u m n of yo u r ma g a zi n e . T h o u g h
some ph reaks a nd hackers feel th is
stuff is just fl uff and wou ld rather see
techn ica l d iagrams in its place, I felt it
was the best part of the jou rna l . I enjoy
r e a d i n g a b o u t V M S t r i c k s to g ra b
passwords, but I a lso want t o know
about what's happen i ng i n the world
out there (other tha n the latest phreak
arrest). Vanda l-phreaks ca use some
damage, but I a lso find it e n l ig hte n i ng
to read items l i ke "The F B I estimates
the average theft loss from computer
fra uds at $600,000 [per fraud]," as on
page 13 of th is J u ly's ACM SIGSOFT.
Yo u m i g h t w a nt to m e n t i o n t h e
existence of th is resource as I suspect
there a re q u ite a few of us w i l d and
wei rd news ju nkies sti l l out there in
subscriberla nd.
E.H.
We still have a news column. It's
called The Telecom Informer and it
combines all kinds of newsworthy
items into one long, rambling article.
We'll try to cover as many Interesting
occurrences as we can for future
editions. For readers interested in
subscflbing to ACM SIGSOFT, write to
t h e Ass oc ia t io n for Computing
Machinery Inc. (ACM), Post Office Box
12 1 14, Church Street Station. New
York, NY 10249. Let us know what you
find out.
Pen Registers
Dear 2600:
As I stated i n a previous letter, my
Ra d i o S h a c k pen reg i st e r doesn't
record numbers when I use a cordless
phone (Phonemate).
It wou ld be i nteresting to know the
m a ke of the pen reg ister a nd cordless
p h o n e t h a t "Wo r r i ed a n d Upset i n
Arizona" uses that does reg ister phone
n u m be r s (Septe m b e r 1987 l ette r s
page).
Samuel Rubin
Unique Projects
Dear 2600:
No one makes the fol lowing for the
Apple:
1. A combination speech generator,
clock, printer buffer, and copy card.
Maybe even some ROM memory.
2. A 110, 300, 1200, 2400 baud
modem with Europea n a nd American
tones for 110 and 300 baud, a uto dial.
3. A card for i nterfacing a n Apple to
a lmost any h a rd disk. Also needed is a
way a ro u nd the ProDos l i m it of 2 32-
meg disks per slot.
4. A coprocessor/accelerator card
that has a l l three major processors on
one card: FAST 6502, Z-80, and 6800
plus 64K ram.
Any takers?
John Nix
(continued on page 22)
2600 November. 1987 Page 13
Page 14 November, 1987
GRAPH
DEFEATS-S2o
���o�O�a�
l
Yafe
a
��hf:� �
v
:�9tt��iy:
r
�
��!� ra1luie��,';:a�
even your llterm
.rv:: If � are totallY
innocent! Describes In Shocking detan
what pqlygraphs are, their various uses,
types of tests and questions, procedures,
scoring methods validity and reliability,
and technical aesign factors. Heavy
emphasis on every known countermeasure
f���c��ti
to
��T��fJk�r!}f�
o
C:i��i�r�;�
and speCiOc lIinnocen�" and "guiltyll res­
ponses to typicalquestIO ns.
*.******.*****'"
*.******.******
AND WIN-S20/Yr .....The October 1987 Stock Market Pl�e
proves that ECONOMIC COLLAPSE ISlikely and soon! Are you prepared fOf. it?
Or for War, Terrorlst Acts. RebelllOn,
¥iVk�S6��r,
b
�i�ti��
r
i�cr !hOa���'a�Jc���:
Ma.de and Natural Disasters? For two
years, we published the popular, ultimate
technolo� survival newsletter. REBEL.
SURV.lVEA:ND W.l:N!­
sizzling and rock-fisted - includes com­
puter, communication, electronic, Phone
d��g�i s�Z�i�' A'i,
n
d
e
�w t���Z�� :gd
win Now and '!be Day After in urban,
suburban, rural and wilderness areas.
Chock full of hard-ta-find survival info.
Includes no-holds-barred editorials and
articles. We need many more subscribers,
feature writers, information �ontributors
��ti������r:�c�:Jl�
i
�u���I��n��
l
�rsi:
Published monthly. S20/yr lridividuals,
$SO/yr Corporations. S3/back issue.
;'Nl-l'H7J!J'fjfAlJIJs�RfAWJ"
VORTEX
GENERATOR-SB
Heat/cool with Simple, Amazing 3-Port
po�lfeiu��es
lro
u�O vd�g&:���, 6�a
c
rt,:'A���d
sctentlficall.y�ound. Practical. Plans.
*.*••••*•••••••
STOPPING
POW ER
METERS"'l0
Our all-time best seller! Describes how
electric meters work
a
wh are
��lsith,eB'g�J�gwE� �INO INTERNAL LOAD MET Y.
IRON GONADS-Slo
most controversial and e)(Jllicit elec-
�����ti���rge���l
u
�����f�
i
�:a��
m
!s�
e
d
toslow down-evenstop -powermeters!
...............
LIBERATE
GAS & WATER-sIO
Describes a simple method using a com-
r:�rlg����g�;��We"(:�t
t
r[g����g� r
cgis-
*********."'*••*
SECRET &
ALTERNATE
IDENTITIES-sa
rs�
t
e�C:-t��
a
:gth'e
t
�i�arr:�'ftp��Os
k
�t ��
taining secretandalternate IDs. �ou have
the legal right to have as many IDs that
Y��v:�an�
s
Jg�g :�
n
in
i
¥:f:� ��c,:�k��
�OO% phony (and rOO� legal)passports!
*****.*********
FREE-sa
,
t Om�i1/
r
i; �h�n(!lin��tis'r��fn���t�'
supermarket food, medical and hosQitai
����[t��2!���S
,
;��f��,n�O:;ke;���n��:.:azines, air/bus!trainlship first class fares,
software andvideo tapes - more!
"'*"'**"'*"'**"'****
CONSUMERTRONICS •
2011 CRESCENT DR. P.O. DRAWER 537
ALAMOGORDO. NM 88310
2600
RINTER &
PLOTTER
MANUAL-S15
Types, Descriptions. Specs. and 100+ In­
terfaces (Parftllel, Serial). Detallpq Plnns
of X-5wltchers, Buffers, ft1!d Serlal-Tb-­
Parallel and Pal'llllel--'Ib--..<;;erJai Breakout
Devices. Repair, Maintain. Many Ally,
Use and Service TIPS, Figures.
SUPER
RE-INKING
METHOD-ss
Rc-Ink Cloth Ribbons for about 50 ('enb
and 10 1!1l�lUtes each. PlaTL'; for El (,ht>apo
Motor-Driven Re-Inker. Com [!lOnly used
Ink (5 Colors) and Carrier described.
***************
MASS TRANSIT
TERROR-S7
Worried about Air Piracy? Bombings?
Hostage Situations? Ra�h 'fraugott,
F�ht #847 host!�J�tated: tlnotice that
�;; �}i��;:rrt'te�����?,b�
��r7�; ��
i
�a:l�t�
e
�w�
e
�1{f<it���
age) of their weapons pas� all airport
security. This manual descrIbes terrorist
l�g�U?os�.
t
�;i��l
a
�?�fri���!· t(��:�e�
TECHNICAL
RESEARCH
SERVICES
�Pe�ine��1;:����e��!����t���1u7)j�'�t
�fl���Pp��vfg:�
g
k��t�e��r��l
r
rfsr�
W'f�;�:;:;
r
��ti��2�o�
e
����Js:rfJ���
e
�)6
cents per page. Saves you a b mdle on
R&D time, money! EducatlOnal tuol.
************** ,.
1'/(,1I5e Order 'It)(lay - Tell Your Friends About Our Ad - Keep Our Ad For Future Orders
THE CENTRAL OFFICE
A full range of telephone,
radio, computer, and satellite
info plus a whole lot morer
2600 DDS #2
914-234-3260
2600 November, 1987 Page 15
AN I NTI MATE LOO K AT
;� logon unsuccessful-incorrBct password. As has
� just been stated, a valid userid has been entered
2.. but the password was incorrect. Passwords can
� be from 1-8 characters long , but in many cases
� the minimum length is changed to be at least
� three characters, There is no difference between
§ upper and lower case letters for either the userid
'� or password as they are converted to upper case
� by the system , This is another security flaw as it
reduces password possiblities,
Password incorrect-rBinitiata logon procedure.
This is the message received on the older
versions of VM/CMS, which means the same
thing as the above message,
Maximum password allBmpts Bxceeded, try again
latBr. The threshold has been reached for userid
and/or password attempts, You will receive this
message every time you attempt to logon after
exceeding the threshold until a variable period of
time (probably from one to five minutes) has
elapsed , This locks out all users who attempt to
login to the system from that particular l ine, I am
not sure whether this is recorded anywhere or
whether it is sent to the system console, It's a
good idea to determine how many attempts
normally trigger this and keep just short of it.
AlrBady 10ggBd on. This message will appear
when you attempt to logon with a valid userid
and password and that userid is already online,
Unl ike other systems, VM /CM S will not al low
the same userid to be logged on more than once,
Userid missing or invalid. As it impl ies , nothing
was typed after entering the LOGON command ,
or the format for the userid was not correct , i , e ,
using a number as the first character o r a control
character used somewhere in the userid field ,
Error in CP dirBctory. The C P directory is the
main user directory for the system , Entries in the
directory contain the userid and password, VM
I /O configuration, disk usage values, associated
virtual and real addresses, privi lege classes,
virtual processor size, and other options for each
user, Without the proper directory entry, a user
cannot logon to the system and wi II therefore
receive this error message,
Command not valid before logon. This occurs
when you enter anyth ing other than the
commands l isted in the menu, i ,e, entering
B O N E H E A D w i l l ret urn t h i s message even
though "BONEHEAD" isn't a val id command ,
Why this is I don't know, So don't get all excited
Paee 16 November, 1 987 2600
thinking you found a val id command but couldn't
execute it since you weren't logged on,
Accounts
By constantly compi ling userids from various
systems you should be able to collect a nice l ist
of accounts which may enable you to gain access
to a system , The fol lowing are a few which I have
found :
OPERATOR
CMSBATCH
AUTOLOG1
OPERATNS
VMTEST
VMUTIL
MAINT
SMART
VTAM
EREP
RSCS
CMS
SNA
As usual , use the usemame as the password ,
Things sti l l haven't changed from the Hacking
VAXIVMS series " , people are just as stupid as
they were a few years ago ,
There are many default accounts which have
the passwords l isted in some I BM system
manuals, These are hard to obtain and are very
powerf u l s i nce some passwords are rare l y
changed , If you can get access t o the defaults, it
will greatly expand your collection of systems- I
guarantee it.
Dial
D IAL is used to logical ly connect l ines,
whether they be switched (regular dial-up phone
lines). leased (dedicated) , or logically attached
(directly connected ) , to a previously logged on
multiple-access system , The D IAL command is
the only substitute for the logon command , On
systems running more than one operating
system , D IAL is used to connect the user to one
of those systems, It is rather common to find two
or more operating systems running parallel or
"under" one another, This is quite different from
most other systems, which run alone on the
machine, One machine, one operating system ,
but not I BM , The abi l ity to have multiple systems
running simultaneously and still provide the user
with the i l l usion of it being a single system (the
whole idea behind multi-tasking computers is to
provide each user with the full resources of the
machine so quickly that it appears that he or she
is the only one using the system ) sets I BM apart
from most other computer manufacturers, Some
of the systems which run on I BM's are : VM/CMS,
MVS/TSO , DOSIVSE, OS IVS1, Some others
I BM 'S VM /CM S
are : M U S I C , J ES , and IX/370 which is I BM 's
version of U N I X that runs under VM/SP.
I t is always good to know what other systems
are running , and if you are unable to gain access
to the "primary" system , you may be able to gain
access to one of the "secondary" systems by use
of DIAL. Some systems wi l l require you to
specify a line number for certain systems . Others
will find a line for you if one is not specified ,
assuming there are some allocated to that
resource. Userids are also dialable. In some
cases you have to dial through a particular userid
in order to gain access to certain systems or
perform certain commands. A typical logon to a
D IALed system may look like:
.DlAL MUSICH
DIALED TO MUSICH 040
*Miscellaneous Computer Services MUSIC/SP 1 . 1
SIGN ON.
.RESET
DROP FROM MUSICH 040
VM/370
I
When it comes to finding a valid line number
for systems that can be reached via DIAL, you
could be in for some trouble. If the system
requires a line number to be entered (unlike the
above example , where l ine 040 was found
automatical ly) , you will not only have to come up
with a defined line number, but one that is
associated with the system you are attempting to
access. Usually you can find this information
after logging onto the VM/CMS system in
various fi les, but if you cannot get in, you will
have to sequential ly enter l ine numbers. Some
that I have seen are 001 , 01 B, 41 A, 040.
The VM/CMS system does not appear to l imit
the number of D IAL attempts a user can make,
u n l ike L O G O N attempts . Programm i n g your
micro to search for a val id l ine number to a
system should work with no problem .
To drop the dialed connection just type
RESET.
Error Messages
linels) not available on 'sysname'. Either there
are no I ines allocated to the system , or you must
enter a correct line number.
Invalid device type 'sysname' 'lina#'. You have
entered a valid system or userid and l ine number,
but the device you are on ( the terminal ) is
invalid. In this case, a GRAF (Graphics) device,
system console, or 3270 terminal may be the
only valid device.
'usarid' not loggad on. The D IAL command
cannot be executed unless the user (or system)
specified is logged on .
'lina#' does not exist. A valid userid/system has
been entered but the l ine number for that
userid/system is not valid.
Massage
M SG is used to send messages to users who
are currently logged on. This command can be
issued before ( if specified by the logon menu) and
after logging in.
MSG OPERATOR Helpl I lost my passwordI My usarid
is COMOSOLO.
This will send a message to the primary
system operator of the system. If there is only
one CLASS A user online, the message will be
sent to his terminal .
MSG *
This will send a message to yourself . This is
useful for identifying the current userid of an
abandoned terminal .
Logoff
The LOGOFF command can be abbreviated as
LOG. After logging off you wil l receive the
following :
CONNECT= 00:33:54 VIRTCPU= 000:00.28
TOTCPU= 000:01 .76
lOGOFF AT 1 7:05:44 EST THURSDAY
04/1 6/87
CON N ECT is the actual clock time you spent
whi le on the system . V I RTCPU is the virtual CPU
time that was used . TOTCPU is the total CPU
time, both virtual and overhead, that was used.
The HOLD command will hold the connection
(continued on next page)
2600 November. 1987 Pale 17
PLAYI NG WITH I BM 'S VM /CMS
-;; allowing you to re-Iogon again without having to Shows usershowmany invalid password allBmpts have
� re-dial the system . occurred on their userid
� Increased file security
;:I
.2 .LOG HOLD
;.
'"
..
0.. Security Softwan
§ There are various weaknesses w i t h i n
� VM /CMS both intemally and extemal ly which
1 can be exp l o i ted . For t h i s reason , various
.� software security packages have been written .
=: There would not be a need for these in most cases
o
� if the people in charge of system security knew
what they were doing . Anyhow, these packages
do p ro v i de added sec u r i t y when p roperly
implemented . The most commonly found are
VM S EC U R E and ACF2 . TO P SECRET and RACF
are o t hers wh ich are less commo n . These
Logged On
After logging on you may receive something
similar to the following :
OASD 1 90 LINKED R/O; RIW BY MAl NT; R/O BY
030 USERS
LDGMSG 1 0:40:25 EST FRIDAY 05122/87
WELCOME TO MISCELLANEOUS COMPUTER
SERVICES
VM l
SYSTEM WILL B E DOWN FROM 1 0:00 TO 1 0:30
EST SUNDAY MAY 24, 1 987
packages are easily identified . Logon at 1 3:22:59 EST FRIDAY 05122187
After entering a val id userid VM SEC U R E VM/SP REL 4 04120/86 1 1 :33
responds with :
VMXACI I D4R Enter logon password:
* * * * * * * * * * * * * * * * * * * * * * * * * *
HHHHHHHHHHHHHHHHHHHHHHHHHH
SSSSSSSSSSSSSSSSSSSSSSSSSS
One way to positively identify the use of
V M S EC U R E is by using it as a userid . If it is
running it will be a val id userid, and who knows,
you may even hack the password .
After entering a bad password , ACF2 (Access
Control Facility 2) responds with :
ACFV1 0 1 2 PASSWORD NOT MATCHED
ACFV0044 ACF2, ENTER PASSWORD
* * * * * * * * * * * * * * * * * * * * * * * * * *
HHHHHHHHHHHHHHHHHHHHHHHHHH
SSSSSSSSSSSSSSSSSSSSSSSSSS
These packages provide information which
should be inherent within the operating system
itself . Perhaps newer versions of C M S will
contain them . Some of these features are:
Last logon date/time
Password expiration
Rules for password selection
Invalidating userids for invalid password allBmpts
Invalidating terminals lor invalid password allBmpts
Page 1 8 November, 1 987 1600
R; T=0.01 l0.01 1 3:23:1 0
Line #1 : This line shows that the disk at virtual
address 1 90 is l inked with RIO access by you ,
R/W by userid MAl NT and RIO by another 30
users.
Line #2 : This shows that the logon message
was created at 1 0 :40 on Friday . Line #3-7: This
is the message that is shown to all users of the
system upon logging on . Some systems may not
have one .
Line #8 : The actual time of logon is printed .
Line #9 : The current RELEA S E of V M / S P and
the time and date it was i nstal led is shown .
Line #1 0 : This is the ready message and it is
printed after every command is performed where:
R= Ready-this indicates that the system is
ready for inpu t . T=Time-the first series of
numbers tells how long it took the system to
perform the last task . The second set of numbers
gives the time of day. I f you do not recei ve the
ready message you are in CP and must I PL CMS
in order to issue CMS commands .
Line #1 1 : The system prompt-you can now
enter commands.
Privilege Classes
As with most other operating systems, a user
must have sufficient privileges in order to
execute certain commands . Every CP command
belongs to one of eight I BM defined privi lege
classes . The CP directory defi nes which users
(continued on page 20)
2600 marketplace
WANTED : Any hacker a nd phreaker
software for IBM compatible a nd Hayes
compatible modem . If you are sel l ing or
know anyone who is, send repl ies to
Mark H . , P.O. Box 7052, Port H u ron, M I
48301-7052.
F O R SA L E : O k i da t a M i c ro l i n e 92
personal pri nter. Incl udes m a n u a l for
i n st r u ct i o n s . H a rd l y u s e d . M a ke a n
offer a nd i f it's reasonable, I wi l l pay
postage. Matt Ke l ly, 310 Isbe l l , Howell,
M 1 48843.
SUMMERCON '88-com ing to NYC .
Watch this space for more i nfo.
TAP BACK ISSUES. Complete set,
vo l . # 1 to a n d i n c l u d i n g vo l . # 9 1,
i n c l u d i n g sc h e m a t i cs a n d spec i a l
reports. Copies i n good to excel lent
cond ition. $50. 00, no checks, i ncl udes
postage. T. Genese, 219 N. 7th Ave. ,
Mt. Vernon, N.Y. 10550.
DOCUMENTATION on electronic and
dig ita l switc h i ng systems and PBX's.
W i l l i n g to p u r c h a s e / t r a d e . A l s o
look i ng for other paraphern a l i a such as
Bel l System Practices. Write to B i l l, c/o
2600, P.O. Box 752C, M iddle Isla nd,
NY 11953.
BLUE BOXING? Let's exchange i nfo
on phone n u m bers, parts, and etc.
Write to : B l u e Box, P.O. Box 117003,
B u r l i ngame, CA 94011, Attention D . C .
FOR SALE: 8038 m u lti-purpose tone
generator c h i ps, prime q u a l ity $7. 50
e a c h ppd . I n c l u des com p r e h e n s ive
a pp l i ca t i o n s d a t a . Two c h i ps w i l l
generate a ny dual tone format. These
are no longer in production. Get 'em
wh i le they last. Bruce, P.O. Box 888,
Sti nson Beach, CA 94970.
FOR SALE : Radio Shack CPA-1ooo
Pen Reg ister. Just l i ke new. $70.00.
J . C . D eve n d o rf, 29261 B u c k h a ve n ,
Laguna N iguel, CA 92677- 1618.
FOR SALE : Ex-Be l l blue boxes, old and
styl ish, may even work ! Also a wide
range of old Bel l comms equ ipment.
Ca l l (514) 288-6731 and ask for Rick
for deta i ls.
DO YOU HAVE old outdated computer
eq u i p m e n t l y i n g a ro u nd g a t h e r i n g
dust? Why not donate i t to 2600's
g r o w i n g b u l l e t i n b o a r d n e two r k ?
Support freedom of speech i n you r
t i m e ! Contact 2600 at (516) 751-2600
or write 2600, PO Box 752, M iddle
Island, NY 11953.
F O R SALE: SWTPC M o d e l CT-82
i ntel l igent video term i na l . Completely
p r o g r a m m a b l e ( 1 5 0 s e p a r a t e
fu nctions), RS- 232C & para l lel printer
ports, f u l l ASCI I keyboard w/cursor
control pad, 9" P- 31 CRT w17x12 dot
matrix-up to 92 column capabil ity, 32
baud rates to 38,400-much more.
E x c e l l e n t c o n d i t i o n w i t h f u l l
documentation. Orig i n a l ly $800, sel l
for $125 o r best offer. Bern ie Spindel,
144 W. Eag le Rd., Su ite 108, Haverton,
PA 19083.
2600 M E ETINGS . Fridays from 5-8
pm at the Citicorp Center in the Market
(lobby where the tables a re)-153 East
53rd Street, New York C ity. Come by,
drop off articles, ask questions. Ca l l
516-751-2600 for more i nfo.
GOT SOMETH I NG TO SELl? Looking
for someth i ng to buy? Or trade? This is
the place ! The 2600 Marketplace is
free to s u bs c r i be rs ! J u st send us
whatever you want to say (without
making it too long) and we' l l print it!
O n ly people please, no businesses.
Address : 2600 Marketplace, P.O. Box
99, M iddle Island, NY 11953. Include
your address labe l .
Deadline for December issue : 1 2/5.
2600 November, 1987 Page 19
HACKI N G I NTO I BM 'S
� can use which classes of commands. Each user
:::- has one or more privi lege classes, as does each
� C P command . If you try to issue a command that
--.,
::: does not match the assigned privi lege class of the
2 userid you are using , the system will not process
:; the command . As far as I know , no records of
� attempts to use privileged commands are kept .
.� Here is a rundown of classes A through H .
:s Primary System Operator: The class A user has
� the abi lity to control the system . Any user who
uses the VM/ SP system console possesses this
pri v i lege c l ass . Th i s user can broadcast
messages , control system accounting , and issue
commands which affect the overall performance
of the system .
System Resource Operator: The class B user has
the abi l ity to control all the "real" resources of the
system , except those controlled by the spool ing
and primary system operators.
System Programmer: Class C users can modify
real storage as opposed to virt ual storage.
Spooling Operator: The class D user controls
spool ing data fi les .
System Analyst: ( C l ass E ) M o n i tors and
interprets system performance data
Service Representative: (Class F) This class IS
llSually given to accounts that I BM Field Service
personnel use for updates and also for diagnosing
system problems
General User: Class G usels are Hle most
plominent on the system . ThiS pr ivilege allows
the user to control functions ;lssocialed With
' l it;;' Dwn vlrtual , llachine
AllY: The Any classificat ion IS given to cer tain
C P cOlllrnamis which are ;wadable to any user
TIle commands are usually l imi ted to LOj11l and
Logoff
Class H IS reserve{j for IBM use
Due to the individual needs of a Site, privi lege
classes can be tailored to suit the facility. A total
qf up to 32 classes can be nlade . They would he
sllown in the CP di rectory as A- Z and 1 -6
Some typical privilege classes for a few
r;ommon IIscnds are Class A for OPERATO R ,
Class F tor E R E P , C l asses B , C E. G fOI
()PE RA TN S anIi C!asses A , B . C [) E , F , G fo�
M A l f H
Commands
f'.Ullllrk1l1ds drc ' , 13(;e up of COlll; lland naliiC:,
;}IId ophcns .
Command Name: A cOl nrnan!i [ lai "I' h : ', ; 1
I'ag<> 20 "m emher, 1 9N7 2601!
alphanumeric symbol of up to 8 characters .
Operands: These specify the information on
which the system operates when it performs a
command function .
Options: These keywords are used to control
the execution of a command. When used , they
must be preceded by a left parentheses, but a
closing one is not necessary
D ifferent commands are used within different
environments. To see which environment you are
in , simply hit retum at the period prompt . You w i l l
receive one o f the fol lowing C M S , CP, XED IT.
There are many commands that are useful to
both regular system users and hackers , H ELP is
avai lable on some systems, particularly on
university systems. I t is extensive but not as
clear as U N I X or VMS. Th is is typical of I B M .
Nevertheless , H ELP is useful and you should get
hardcopies of as many commands as you can .
AI D is another foml Of H ELP which may be usefu l
t o YOll in leaming more about the system .
One n ice feature of C M S H ELP is that when
you receive an error message, you can :
. HELP OMSOOOOOO or OMKOOOOOO
Where DM SOOOOOO or DM KOOOJOO is the error
message you have received . The system wi l l then
explain wllat it I S , wily it happened , and how you
can correct i t
! elm gOing to hold off on explaining any and a l :
�ommands related t o mlnidisks u n t i l tile next
Sf�c:t I(Ii The others which I have found to be
usetui dre as fol lows .
You C:111 Issue any C P command while in eMS
by precluding tile command wi th CP
Ouery
Ouery al lows you to obtain various bits oj
I IlfOinlat !on about the system . A full l ist can be
found by using H ELP.
One of the most important Q U ERY commands
for the Ilacker is
.0 NAMES
OPERATOR-O l F, SMART-[JSC CMSfl349-
B27, LOGOO I 80--B3 1
lSM - · IjMVS I
5COTT· _·TP l l WfMZ, CMS 1 2 ! l · TP ! i WHi4,
IJPH1ATNS,- TP l l WFY l
II: T·O.GI /0,0] 1 1 :34:28
There can be many users online; usual ly this
l ist w i l l contain from 30 to 1 00 users . The last
user onl ine was OPERATN S , since it was last in
the list. The SMART userid is DSC, or in a
disconnected state . Usual ly a tenminal will
remain disconnected for 15 to 30 minutes and
then is totally logged off the system . I f you logon
to an already disconnected tenminal , the system
will reply with "RECO N N ECTED AT time" . The
other 2 userids on the same line as SMART are
probably connected tenminals which are in a pre­
logged in or pend ing logon state . VSM-VMVS1
IS another system r·unning paral lel to (or under)
CMS
The QU ERY NAMES command allows you to
gain a l i t tle more security for yourself on the
systelTl . I t al lows you to gain more valid
usemamcs to attempt passwords for in the
unfortunate event that your current uselld dies.
.Inotller use IS tilat you can start to compi le your
. cornrnon accounts" l ist of userrds wtlich are
found orl VM /CMS systems. This l ist should get
larger and larger as you gain access to more and
more systems and will allow you to gain access
to more systems as it gets larger.
If you can't count how lTlany users are online
from the 0 NAM ES l ist
.Q USERS
0007 USERS, 0000 DIALED. 0000 NET
If YOLI didn' t catch the logon message you can
view It aqain by
.Q LOGMSG
10 see wrlat release oj CMS tllc system IS.
.Q CMSLEVEl
VM/SP REL. 4, SERVICE LEVEL 4 1 7
I I you al e wOfl(lennQ Wilich IBM II liilnfrarne
eMS IS i U: lil l l ilj ,HI . YOl! can ISSLIe
.0 CPU!!]
no 1 4"f23438 1 0000
Til lS can be intt;IT'ret(�d as follows
CPUI!J�' aabbbbbbccccdddd
ad ;-" " F F '" w'i"j8fl runn!n� Viv1 / S, P bbbbbt-F�the
piOC8%lil i [) i illmber. cccc=,llle mooel i iulnber of
the I ;] tl 8 ctbIJVC case . U,,1S
an ! i.Hl 438 1 ddcid:�-" GOOO" TI�i:
used f0;- ::� r,
SEN DF!LL a!!:iW" YO:I to s0nd fijr3S W: t:l!1I dny
rnrnid l�;k ttl;] t IS cu rrently accessed VOd to
anotiler use! . Any time you send a f i le an entry IS
made in �he t i le U S E R I D N ETLOG (where
U S E R I D iS t . .e user you are sending the f i le to) .
This command i s also used for sending NOTE
files which can be created with an editor and sent
to whomever as E-MA I L .
I f you are tired o f seeing a text l i sting , o r have
attempted to read a compi led program and wish
to exi t or break out of i t , simply hit a hard-break ,
and then type H X H X i s for Halt eXecution . It
wi II halt whatever you are doing and put you back
into the C M S environment. It may take a few
l i nes of text after entering it for the system to
stop the process
This article will be concluded in the December
Issue of 2600.
(continued/rolll page j{))
interesting user.,. The number for
mws l', 2MJO Board #/ l 9/4-725-4060.
The ( entraI O.fjice, 2600 Board tt2 is
reachable at 914-234-3260. If you get a
busy signal, just keep trying.
Unfortunately, the 9/4 area code is flO/
yet reachable on P( PUr.<iuit, the service
offered by US "';'print that allows
unlimited computer time across the
country for $25 a month. Let them know
you want the 9J.1 area code added-their
number ;.5 800---835-3638-so we can all
save on phone bi/k /1 nd keep check.ing
for future 26(}() bulletin boards ill other
areas,
While we 're Ofl the .mbj£·ct of bulletin
hoards, W(' should paid out thai the old
Private Sectorphone number in .Vew
.Ieney is 110 longer ill use. It's ponible
we may have sent mIf HJme information
to new subscribi n with that number. If
yOIJ recei.ni mell propaganda, I'lea.e
disregard it.
* * *
Ttl Nldifiou to all of this, we flOW have
an ilddrn.' rm the infamous "worldnet "
Ji.�n.t.,sed in the ." eptember 1 987 issue of
2MJO. lf yoll know how to manellver
Four way arow!, ! the networks, you can
send mail to us tit ow· UHmet addf('5S (�f'
;;61){}@da�y,l , l!U( P ar our A rpanet
address ojphri!dosysl!26()O(TlJnyu. Ifyou
IIm'e dijficll!ly �endiflK to liS at these
addre.ues, let U5 k,WlJ,
260{) November, 1 987 Page 21
LETTERS(COlllilllledji-olll lJ(Jgl' IJ)
TAP is Dead!
Dear 2600:
C a n you te l l me i f a news l ette r
sim i lar toyou rs ca l led TAP is sti l l being
p u b l i s hed a n d i f so, wh a t i s the i r
address?
D . l.
New York
TAP no longer exists, although back
issues are being sold b y differen t
people (check the 2600 Marketplace).
A s far as we know, 2600 is unique in
subject matter and approach, although
t h e r e a r e s o m e o th e r h a c k in g
publications-some good, some bad.
Look for reviews in future issues.
In last month 's letters column, a
reader told us that the 8038 chip
used in our 1 985 blue box schematic
was no longer available. Several
readers have notified us to claim
otherwise. We understand the chip is
obtainable through Janeco Elec­
tronics in California (a sk a n y
electronics store for their number) at
a cost of around $3. 95.
listening in
� prying ears. probably for reasons of security. The
%:: truth is that fed frequencies are as wel l known as
2.. "regular" frequencies. A company cal led CRB
::.: Research , known for publ ications on surveil lance
� and electronics, has a book called "The Top
> Secret' Registry of U . S . Govemment Radio
� Frequencies" by Tom Kneitei . This book contains
� the frequencies, cal lsigns , and radio codes of
2 every U . S . Govemment Agency in existence,
'- including such agencies as the FBI , C I A , D EA ,
and of particular interest t o phreaks, the Secret
Service. Earlier edi tions of this guide were bound
computer hardcopy w i t h everything l umped
together and sorted by frequency. This made for
something which was difficult to read , and
difficult to use. However, it sti l l remained the
de-facto scanner guide to the feds , and was very
popular.
Page 22 November, 1 987 2600
The recently published ( 1 987) sixth edition
has eliminated the readabi l ity problems, and has
added more non-frequency information which
makes for an excel lent publ ication . Inside the
8 11z x 1 1 " , 1 92-page book , there is an
alphabetical l isting of the various agencies
Further delving into the book we find that each
agency listing is divided into sections containing
f re q u e n c y / f re q u e n c y u s e , t ra n s m i t t e r
locations/cal lsigns, and , when avai lable, the
various codes and slang used by the particular
agency. ( Rawhide will arrive at Curbside rather
than Pivot . ) A particularly interesting section
contai ned the l i stings for the U . S . Secret
Serv i ce . Among the frequency / f requency
codename / f requency use data was a l i st
c o n t a i n i n g the codenames used for the
presidential staff , first famil ies, and other related
information. Did you know that Amy Carter's
codename was "Dynamo"?
The Top Secret Registry is an excellent book
and is highly recommended reading for those
interested in listening to those who are l istening
to you . It's avai lable for $1 6.95 from CRB
Research , P O . Box 56, Commack , NY 1 1 725.
And by the way. . . . here are some rather active
federal frequencies (In megahertz)
Secret Service:
1 65.375: "Charlie" nationwide primary channel
1 66 . 462 5 . "X - Ray" common channel for
Treasury Dept .
State Department:
409.625
Justice Department:
36. 07
41 1 .025
General Services Administration:
(protection of federal buildings)
4 1 5 . 2
41 7.2
Drug Enforcement Administration:
4 1 6 . 05, 41 6 325 , 41 8 .75, 4 1 6 . 2
CORRECTION :
In last month 's l i st of mass a nnou ncement
n u m bers, we neg lected to mention that they
cou ld a lso be reached from a rea code 7 1 8.
PHONE N UMBERS OF INTER EST:
2 1 2-222-81 08 . . . . . . . . . . Parents U l 1 ited
7 1 8-343-01 30 . . . . . . . . . . . . ScrambleFax
800-223-333 1 . . . . . . . . . . . . . . . . A Bank
01 1 -6 1 -3-692- 2982 . . Recording, wild tone
N OTI C E
Does yo u r add ress l a be l say "Ti rn e to Renew " ? Don 't rn i ss a n
i s s u e . R e n ew yo u r s u bsc r i p t i o n today a nd e njoy peace o f rn i nd .
S i rn p l y i nd i cate t h e a rn o u nt e n c l osed a nd wh i c h , i f a ny, back
i ss u e s yo u wa nt. Yo u r add ress l a be l s h o u ld be on the back of t h i s
forrn .
$ 1 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 yea r of 2600
$ 28 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 yea rs of 2600
S 4 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 yea rs of 2600
$40 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 yea r co rpo rat e s u bscr i pt i o n
$ 7 5 . . . . . . . . . . . . . . . . . ' . 2 yea r corporate s u bsc r i ption
$ 1 '1 0 . . . . . . . . . . . . . . . . 3 yea r corporate s u bscr i pt i on
$ 2 5 . . . . . . . . . . . . . . ove rseas s u bsc r i pt i o n ( 1 yeCi r on ly)
$ 5 5 . . . . . . . . . . . . . . . ove rsea s corporate s u bsc r i pt i o n (1 yea r o n ly)
$ 2 60 . . . . I ifetl rne s u bsc r i p t i o n (never aga i n w i l l we bot h e r you )
Back i s s u e s a re a va i l a b l e . P r i ces a re :
$ 2 5 . . "
"
. . . . . . . . . . 1 984, 1 985, o r 1 986 i ss u e s ( 1 2 pe r yea r )
$ 50 . . . .
"
: . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . Any two yea rs
$ 7 5 . . . . . . . . . . . . . . . . . . . . . . . . . . A l l th ree yea rs (36 Issues )
(Overseas orders add $ 5 for each yea r ordered )
A l l ow 4 to 6 weeks for de l i v e ry .
Send a l l o r ders to :
2600
PO Box 752
M idd l e I s l a nd , NY 1 1 953 U . S . A .
( 5 1 6 ) 7 5 1 2600
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
AM O U NT E N C LO S E D F O R S U B S C R I PTI O N : __
AM O U NT E N C LO S E D F O R BAC K I S S U ES : ___
1 984 1 9 85 1 98 6 (circle years ordered)
TOTA L AM O U NT E N C LOS E D : ___
(clip and send to us- your address is on the back)
CONTENTS I
2600 BULLETIN BOARDS . . 3
IBM'S VM/CMS SVSTEM. . . 4 : II
S.5. PREFiXES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
LISTENING IN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
TELECOM INFORMER..... . 8 I
LElTERS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2
2600 MARKETPLACE. . . . :.... 1 9
2600 MaQazlne
P0 8ox 7S2
MIddle Island. NY 1 1953 USA
WARNING:
MISSING LABEL

More Related Content

Similar to 2600 v04 n11 (november 1987)

Bit_Bucket_x31_Final
Bit_Bucket_x31_FinalBit_Bucket_x31_Final
Bit_Bucket_x31_Final
Sam Knutson
 
Of the variedtypes of IPC, sockets arout and awaythe foremostcommon..pdf
Of the variedtypes of IPC, sockets arout and awaythe foremostcommon..pdfOf the variedtypes of IPC, sockets arout and awaythe foremostcommon..pdf
Of the variedtypes of IPC, sockets arout and awaythe foremostcommon..pdf
anuradhasilks
 
Basics of tcp ip
Basics of tcp ipBasics of tcp ip
Basics of tcp ip
Kumar
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy steps
Lee Toulouse
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy steps
faouzib
 

Similar to 2600 v04 n11 (november 1987) (20)

2600 v03 n07 (july 1986)
2600 v03 n07 (july 1986)2600 v03 n07 (july 1986)
2600 v03 n07 (july 1986)
 
2600 v02 n11 (november 1985)
2600 v02 n11 (november 1985)2600 v02 n11 (november 1985)
2600 v02 n11 (november 1985)
 
2600 v10 n2 (summer 1993)
2600 v10 n2 (summer 1993)2600 v10 n2 (summer 1993)
2600 v10 n2 (summer 1993)
 
Bit_Bucket_x31_Final
Bit_Bucket_x31_FinalBit_Bucket_x31_Final
Bit_Bucket_x31_Final
 
2600 v09 n3 (autumn 1992)
2600 v09 n3 (autumn 1992)2600 v09 n3 (autumn 1992)
2600 v09 n3 (autumn 1992)
 
Of the variedtypes of IPC, sockets arout and awaythe foremostcommon..pdf
Of the variedtypes of IPC, sockets arout and awaythe foremostcommon..pdfOf the variedtypes of IPC, sockets arout and awaythe foremostcommon..pdf
Of the variedtypes of IPC, sockets arout and awaythe foremostcommon..pdf
 
2600 v03 n04 (april 1986)
2600 v03 n04 (april 1986)2600 v03 n04 (april 1986)
2600 v03 n04 (april 1986)
 
A basic unix overview(2)
A basic unix overview(2)A basic unix overview(2)
A basic unix overview(2)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
2600 v01 n02 (february 1984)
2600 v01 n02 (february 1984)2600 v01 n02 (february 1984)
2600 v01 n02 (february 1984)
 
Presentación1
Presentación1Presentación1
Presentación1
 
Routing_Article
Routing_ArticleRouting_Article
Routing_Article
 
Basics of tcp ip
Basics of tcp ipBasics of tcp ip
Basics of tcp ip
 
Freeswitch
FreeswitchFreeswitch
Freeswitch
 
Hacking
HackingHacking
Hacking
 
Cit121lec03
Cit121lec03Cit121lec03
Cit121lec03
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy steps
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy steps
 
Interview Questions
Interview QuestionsInterview Questions
Interview Questions
 
BOOTABLE OPERATING SYSTEM PPT
BOOTABLE OPERATING SYSTEM PPTBOOTABLE OPERATING SYSTEM PPT
BOOTABLE OPERATING SYSTEM PPT
 

More from Felipe Prado

More from Felipe Prado (20)

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

2600 v04 n11 (november 1987)

  • 1.
  • 2. Attention Readers! 2600 is always looking for information that we can pass on to you. Whether it is an article, data, or an Interesting news item-if you have something to offer, send it to us! Remember, much of 2600 is written by YOU, our readers. NO IE: WE WILL ONLY PRINT A BY·UNE IF SPECIFICALLY REQ'JESTED. Call our office or 88S to arrange an upload. Send U.S. mail 2600 Editorial Dept. Box 99 to Middle Island, NY 11953-0099 (516) 751-2600 OSUNY 2600 BBS#l Available 24 hours a day with a wide range of information on computers, telephones, and hacking. CALL TODAY! 914-725-4060
  • 3. We now have several ways of staying in touch with the rest of the world. As promised, the first official bulletin boards of 2600 ,llagazine are now online with more on the way. We 're quite happy with what we've started out with. The two boards are both in area code 914, just north of,Vew York City. Board #1 is the legendary O...,'UVY, a BBS that has been talking about phone phreaking and computer hacking for longer than any other board that we can remember. In fact, OSUVY is mentioned on the very first page of our very first issue. And it's also been referred to in Newsweek, although not very accurate/yo Board #2 is the (entral Office, anotner well known bulletin board for hackers and phreaks. We're proud to be affiliated with these boards and we'd like to ask anyone else interested in running a 2600 board to log onto these first so you can see what a 2600 board is all about. As we've stated previously, these boards are completely open to whoever calls in. ,Yo area is off limits or for "elite" users only. There are no areas of (continued on page 10) STAFFBOX Editor and Publisher Eric Corley 110 Office Manager Bobby Arwatt Cover Art Ken Capel Tish VaIter Koch Writers: John Drake, Paul Estev, Mr. French, Emmanuel Goldstein, Chester Holmes, Lex Luthor, Bill from RNOC, David Ruderman, Bernie S., Mike Salerno, Silent Switchman, Mike Yuhas, and the usual anonymous bunch. Production: Mike DeVoursney. Cartoonists: Dan Holder, Mike Marshall. Reader: John Kew. Editor Emeritus: TSH. 2600 (IS.)". 074Y·JIi51) is puhli.lhed monthh hI" 1600 Enterprises Inc.. 7 Slr<mg:- Lane. Setauket. NY II!JJ. Sl'wn" clal.1 !i()I/aKI'l'ermitl'l'ndinK at Setauket, ,veil" York. I'OSI"MASTER: Send address changes to 1600. P.O. Box 752. Middle Island. NY II953-D752. Copyright' II)X7. 2600 Enterprises Inc. early SUbscription: L .S. and Canada $15 individual. $40 corporate. Overseas $25 individual. $55 corporate. Back i"ues available fllr I'IX4. 19X5, 19X6 at $25 per year. $30 per year overseas. ADDRESS ALL SllBSCRIPTION CORRESPONDENCE TO: 16l)() Subscription Dept., P.O. Box 752, Middle hland, 'Y 11'I53-D752. FOR LETTERS AND ARTICLE SlIBMISSIONS, WRI I"E TO: 1600 Editorial Dept., P.O. Box '19, Middle bland. �Y 11'153-(01)'1. lM/O Otilcc Line: 516-751-2600 BBS III (OSlI;Y): '114-725-4060 BilS 112 (C1; IRAL ()'I'ICE) '114-234-3260 lJSF;FI ADDRESS: 2600@dasysl.UUCP ARPA;E I ADDRESS: phri!dasysl '26OO@nyu 2600 November. 1987 Pal!e3
  • 4. HACKING IBM'S by Lex luthor and The Legion 01 Hackers Introduction IBM mainframe computers make up over 50 percent of the mainframes used today in the United States These systems are traditionally used In Industries such as insurance, banking, universities, and so on. For some reason, IBM systems as a whole have not been very popular ""Ith hackers. This may be due to the complexity of the operating systems run on IBM systems compared to others such as UNIX or VMS. Another (eClSOn may be that there is much varlety ;rurn shop to shop. IBM systems are more commonly llIodlfled and customized to fit an incllviduill corporalion's Ileeds ilnd the lack of lml'v'ersailty" for commands, files. programs , and oHler procedures makes it difficult to attempt to use wltilout any type of speclf! c documentation The lack of detailed orHlne help also hinders the hacker. I believe tilat Hle /M/CMS Operating System is by far the best ar1d easily leamed of the IBM systems. But cOll1pared to other Operatlllg Systems like UNIX or VMS. fMICMS is cumbersome and harder to leall1, Acronyms Before I even attell1pt to start this Jrtlcle, I wili list the iBM specific acronyms we Will he USiilg and sorne others thJt you may find on various IBM systems, Ilist tllern here so I Will not 'lave to do it tilrougilOut the artiCle. If you need to kno,y wl1at one of them means later, just refer back to tllis list 'JM/SP: Virtual Machine/System Product CP: Control Program eMS: Conversational Monitoring System HPO: High Performance Option VSE: Virtual Storage Extended MVS: Multiple Virtual Storage TSO: Time Sharing Option JES: Job Enlry System CICS: Customer Information Control System IJSAM: Virtual Storage Access Method VTAM: Virtual Telecommunications Access Method IX: Interactive Executive IPL: Initial Program Load IVP: Installation Verification Program RSCS: R�mote Spooling Communications Subsystem DASD: Direct Access Storage Device Page 4 Nm'ember, 1987 26()() EREP: Environmental Recording Editing and Printing SNA: Systems Network Architecture NCCF: Network Communications Control Facility REXX: Restructured Extended Executer language VTDC: Volume Table Of Contents DOCS: Display Operator Console System JCL: Job Control language ACF: Advanced Communications Functions SQL/DS: Structured Query language/Data System DBA: Data Base Administrator GCS: Group Control System SCP: System Control Program FOP: Field Development Program CNA: Communications Network Application POF: Programmable Operator Facility PSW: Program Status Word SSCP: Subsystem Services Control Point IPCS: Interactive Problem Control System [JCSS: Discontiguous Shared Segments IIMCF: Virtual Machine Communicalians Facility FIFO: First In First Out LIFO: last In First Out AP: Attached Processor MP: Multi-Processor R/D: Read/Only R/W: Read/Write Logging In TYPically, wilen you cOllle across a systen1 11I1lIlillg an older version (If CMS. it will respond wltl1 VM/370 ONLINE I ThiS message IS somewhat of a contradiction . The majority of VM/CMS systems are rarely run 011 actual 370 systems but on other processors, such as the 43XX series and the 30XX series file penod ' . ' prompt is ttle surest way of vellfYlllg that you Ilave indeed cOllnec ted to a VM/CMS system, aside lrorn the "VMi370 ONliNE' message which IS usually printed. fhis prompt should not be confused with DEC's TOPS-10 system, Wilich also has !Ilf) prompt of a penod. Newer versions will giv::) you this menu Enter one of the following commands: LOGON userid (Example: LOGON VMUSER11 DIAL userid (Example: DIAL VMUSER21
  • 5. VM/CMSMSG userid message (Example: MSG VMUSER3 GOOO MORNING) LOGOFF This menu may vary from system to system, s i n ce system managers may opt to om i t commands from the menu o r add others. When hacking a system , this menu will appear before you can attempt to login, thus becoming very tedious and time consuming especially at 300 baud as you have to wait an etemity for each logon attempt . "Compa r ed to other operati ng systems ... VM/CMS is cumbersome and harder to learn." Other responses after connecting are "Ready to Host", "Press break key to begin session" and "Invalid Switch Characters". The last response is commonly found on Telenet and other packet switched networks, in which you may have to specify "VM " for a VM/CMS system, or "TSO" for an MVSITSO system . There may be other IBM sysleills to select from, or "VM" may not be a 'lalla system. You may also have to specify lOeON VM' or just 'LOGON" before the port ,:,elector connects you to the host system. L D(JON Cdn be abbreviated as just'L' j:" US0fi(j Cdi1 bt irornl-8 cliaracters in length. �)ut ':1st ct13racter must be a letter (in illl" �j!er)b you corne across ihis wiil be trUt;, Out clue to l.d:,loITIlza'iull of systems, it's �r:IS i1i1(J even the 8 cllaldctel password lililit may De extended) A tYPical logon olay look like: .l COMOSOU.l StSGUtSS HOlPl . , IS tile system prompt, L IS the LOCDN command, COMOS [0 ; .; tile u:;elili. SYSGUrSS is tlie anc N01PL is t(1(: crdy cor:cept f usel call bilO! (or tileir pan UI the syster!) not the whole system (in Inosl cases ) . NOI'L would be used when a system dumps you into a program which allows you l ittle or no mobility such as a restricted menu of options ( i . e., a system backup utility) and logs you off without gaining access to CMS. N O I PL will prevent this program from running if it is listed in your automatic I PL entry within the CP directory. This should al low you access to the system. Otherwise the program was specified to nJn within your PROF I L E EXEC which l ists things to be done upon logon . N O I PL is somewhat simi lar but not identical to the login qualifier "/ NOCOMMAND" for DEC's VAXIVMS systems. I f t h e Password S u pp res s i o n Facility i s installed o n the system, you wil l receive an i nval id format message whenever the userid and password are entered on the same line. This is obviously a security measure to prevent users from entering their password in full view of anyone who may be watch ing as the password is not "masked". Thus, you will have to enter your password on a separate l ine when the system prompts you for i t. The advantage of entering the userid and password on one line (especially at 300 baud ) is that you can try more userids and passwords in a shorter period of time while stili availing yourself (1f the system's generosity of infofTIling you whefl an rnvalid userid has been entered. Error messages There are various error messages one may encounter while logging into a VM !eMS system. Tile ones you should be most concerned about are' Ilserid nol ill CP dir6clnry, Wilen an invalid userid has been e: :r",(,(1, you will receive this messa�je This rnCIC::t1 ion gives the hacker a dic;trnct ::rJvailtage for [Jaining entry to the system. t�le largest security hole in any :,ystern COi;iC'; (ron' tel ling the user when a valid user:<j';'�; ha�� been entered. After all. obtaining a ,;>iid iU I:) hall the battle. The olher half is nr;ta:r,'q a valid password. Even the weakest c,ocratiil'J systems PO ionqer give an Indication of .;!"�n a v31id iD tw bee" p:rtered. Why leM haJj [11't H',;s is 3. ;llt=}t8ry to :;-�(.�c When a valid u:,o'id I:' enteredyp,.1 Wlii �e - :1 :,I:;·�d t�) en� .�i :� �t �/ou LCd �ld; a!rp::ldy �> dG SC i� thu COrr"?C1, the SyStt1li vvdl '';: ';0 H nui you will (f�e�in one or TWO messages' 2600 "�ijvemher, 1<)87 Pag� 5
  • 6. US Social Security Prefixes from The Disk Jockey 001-003 Ne¥l Hampshire 440-448 Oklahoma 004-007 Maine 449-467 Texas 008-009 Vermont 468-477 Minnesota 010-034 Massachusetts 478-485 IO¥la 035-039 Rhode Island 486-500 Missouri 040-049 Connecticut 501-502 North Dakota 050-134 Ne¥l York 503-504 South Dakota 135-158 Ne¥l Jersey 505-508 Nebraska 159-211 Pennsylvania 509-515 Kansas 212-220 Maryland 516-517 Montana 221-222 Dela¥lare 518-519 Idaho 223-231 Virginia 520- Wyoming 232-236 West Virgina �21-'524 Co lot- ado 232-232 North Carolina 525 Ne¥l Mexico 237-246 North Carolina 585 Ne", Mexico 247-251 South Carolina 526-527 Arizona 252-260 Georgia 600-601 Arizona 261-267 Florida 528-529 Utah 589-595 Florida 530 Nevada 268-302 Ohio 531-539 Washington 303-317 Indiana 540-544 Oregon 318-361 Illinois 545-573 California 362-386 Michigan 602-626 California 387-399 Wisconsin 574 Alaska 400-407 Kentucky 575-576 Ha",aii 408-415 Tennessee 577-579 Washington DC 416-424 Alabama 580-584 Puerto Rico 425-428 Mississippi 596-599 Virgin Islands 587-588 Mississippi 586 Guam, Samoa 429-432 Arkansas 700-728 Railroad 433-439 Louisiana Some numbers are sho",n more than once because they have been transferred from one state to another or have been divided for use among certain geographical locations. No ne", 700- series railroad numbers have been issued since July 1, 1963. These are used by credit agencies and other services ",hen verifing birthplace, tracking do",n individials, or for use in creating ne", identification. Page 6 November, 1987 2600
  • 7. listening in: catch me ifyou can! by The LNA Master Are you tired of watching scrambled video from HBO and the Movie Channel, etc.? And you don't want to watch Dr. Gene Scott or Jerry Falwell or any of the other TV preachers? Do you feel your satell ite dish is going to waste? Wel l, here's something fun you can do with it. In addition to receiving video and audio signals, your satellite dish can be used as a wiretapping device. Yes, some of you can actually wiretap from your own living room-a fact you probably didn't know. Wiretapping is il legal, but as the title of this article says, catch me if you can. I t's virtually impossible to detect this particular brand of listening in. All you need for this project is your basic home satellite dish antenna, also known as TVRO or televison receive only. What you need to do is tum to the AT&T satellite known as Telstar 301. You'll notice between Channel 20 and 23 (that is, Channel 21 and 22) you'll see a blank screen as if there were a station there. You won't hear anything except maybe an occasional garbled sound. This is what you do to listen in on phone cal ls. Take a general' coverage shortwave receiver (covering between AM broadcast band and 30 megacycles). Connect the antenna input of your shortwave to the video out terminal on your satellite receiver. Tune the shortwave receiver on lower side band ( LSB) anywhere between the broadcast band (1.6 megahertz) and 7.5 megahertz. Make sure your satel lite receiver is either on Channel 21 or 22. You wil l pick up more cal ls to Hawaii, Puerto Rico, Alaska, and the Caribbean than you ever thought possible. Who would have dreamed there would have been that many phone cal ls to l isten to? About every 31f2 ki lohertz there is a phone conversation. If you do not hear a phone conversation, you will hear a cont inuous tone of 2600 hertz. Tune your receiver to where you bel ieve 2600 is coming in perfectly, then listen for a click followed by MF (blue box) tones followed by a ring. You will then be able to Iisten in on AT&T calls to area code 808, 809, and 907. For frequencies above 4.1 megahertz, switch to upper side band ( U SB). Also, you can tune in Channel 8 of Telstar 301. It appears that Channel 8 on your standard satellite receiver box switches to the US Sprint service from the mainland to Hawaii. Sprint codes can be (and have been) gotten successfully by l istening to the calls. Interesting conversations are all over the place, such as the man from Long Island who has two wives and was promising the second wife over the phone that she could stay in his house in Hawaii until he "got rid of" wife number one. Telstar 301 can be found at 96 W on the satel lite dish. Spacenet 2, which is located at 69 W is all US Sprint. Domestic cal ls as wel l as overseas calls can be monitored. Other i nteresting satellites are ASC1 at 128 W, Westar 2 at 79 W, and Comstar 04 at 76 W. On these, simply tune across until you hit a blank channel that looks like it's carrying a si gna l . Then tune the shortwave recei ver anywhere between 1.6 and 7.5 megahertz. If the conversation doesn't straighten up, switch to LSB or U S B on the shortwave. THE 'TOP SECRET' REGISTRY OF U.S. GOVERNMENT RADIO FREQUENCIES %5 TO �70 IIIIZ 8Y TOil Kl'IEITEL. KUES A Review of "The 'Top Secret' Registry 01 U.S. Gov8rnl1llnt Radio Freqlll/lCies" by Mr.lcom Scanner listening seems to have a certain mystique amoung phreaks and hackers, p a r t i c u l a r l y i n r e g ard s t o li s t e n i n g t o mobi le / cord less/ ce l l u lar phones, and certain government agencies. However, unlike mobile phones, whose frequencies are wel l known, the feds' frequencies appear to be hidden away from (continued on page 22) 26()() November,1987 Page 7
  • 8. the telecom informer BY STAFF r-[hey've done it again. This time, after repeatedly and aggressively promoting their 550 talk line numbers (phone numbers beginning with 550 that connect callers to total strangel)), New England Telephone has devised a plan to block access to these numbers from your home for a monthly charge. This is supposed to benefit those people who listened the first time and called all those numbers in the advertisements, winding up with an incredible bill. Now that they've been given a taste of what kind of "accidents" their phones can have, a dollar or two for "insurance" isn't so unreasonable. Where have we seen this before? ...New Jersey may soon have talking yellow pages. Using a touch tone phone, subscribers will be able to call a computerized system, enter a four-digit number, and listen to a recorded message containing theater events, stock market reports, and anything else you could possibly want. The service will be free to customers. To advertise on it will cost about $!m a month....In Annapolis, Maryland, a man pleaded guilty to stealing long distance telephone service using his home computer, which the 550 Blocking Service Q: Wh.t 'I !150 Btocklng Service? A:. It" , new HfVIce for ,,"Iclence customerl whO would ttb to .I!!!!!!! clll" 'rom Ihelr home telephone. 10 ,.k lines. TheM '"k Nne• .now cUllom.rs to N connecled 10 gmuP cOIWersatlon•. New �IMd ntt.phone ptOricIet the connection lind billing lor IhI cal" but I!'HI vwtou. 'Ilk 1M ..moe. .. GpefIIIed, monttor.d Mel pmmoted b¥ DlMr oomp.,.d... Q: Why 'I !1!50 Stocking Servtce being offentd7 A:. In orchtf to tIdd,.•• campl.nta from �t. who.. children ...,.,..ed unnpec:1ed bill' by ceiling tllll!: line.. the o.p.rtment of PubUc utili'," Inllruet.. New Engt..s n.lephone 10 «tfMttop ••erv!CI ttl" would lltow moM � ID fMlrtot .,... to the.. MtYfcM 'ram theer home phonM. 0: How doe, S!5O Blocking Sel'¥lel wor1l7 A:. When CUltome,. lubscrlt. to 5!10 Blocking 8er¥� etIIl' "*'- from their home 'e'ephon•• 10 telephone numbers 1,...lng wllh "5ISO" (the exc:h� lINd aclueev.rr tor 'alk I'MII) will not til; compte'ed. The r:a.... .... be InIormed .... MtCh ... cannot be oompItIled from thlll telephone. Q: ',MO Blocilino SeMCI .,,1I1Ib1e to ..,.ryone1 It.:. No. It. 1111 of the PChlnG" whlNl Ihlt ..Mel I, � pt'eHnlly 1l'IIIIIbIe iIpge'" on IhI b-=k 0' thl. IhNt. 550 Blocking Is avalillbll to � ............. In "' olher IXchllflgn who IUblcftbllD unltrntted ,.. ,... .moe • tMir Ioc.. MMca. Q: What III do not .ubeoftbl to unlimited ftII: .. IeIvIoI buI woutd II" to ...rtot lICe." to talk 11M.? A: You eM e'ect 10 chen.,. your toe.. MI'YtcI to unllmn.ct ft.. rate ..rvtca No come�1on eh.-ge appH.. II you CURWItly ,ublcrtbl to In optlonll c.tRnt INn luch .. a.r 8t... c.lllnq. Circle c.lllna, Melropoiltln CIIHng. eto. .. )'Our lac.. Mrvlee. Howevet', you wi. 10M 1M beMftta or __ ,... IIr comertlng to unltrnlted net rate Mt'VIOe. 0: How much doe. MO Blocking Service COlt? A: Thefe 'I • monthly Ctlarge 0' one doI'ar ror MO Blocktng 8ervlD& TNI .... II In mdnlon to • monthty' cherge tor n.. rate ..... In )'OUt ... II you woukt like to order S50 Blocking ServIce or .Impty leem moN IIbout n. pi.... OIl 1 800 555-MOO, hom within Meine, MIIIUChUHtt.. N.. Hempehl", Rhode ISiend or 'lennon!. From other Iac..lon.. pie... cal, your New EngIw1d � ServIce ""pntaent•..,. • the IeIeJIhOM number bted on the IIemIaIIon .. ADcounI: PIlle 01 IfIt. biN. Page 8 November, 1987 261JO judge ordered destroyed. An intelligent man....While MCI and US Sprint are trying to grow and recover from their losses, AT&T is trying their best to knock them out. AT&T has started a new program for COCOT (Customer Owned Coin Operated Telephone) companies. The contract for this program insists that payphone companies route all their long distance traffic through AT&T. The companies receive between 3 and 17 percent commission depending on how much long distance usage there is. The contract also states that the phones cannot process Visa or Mastercard calls (many COCOTs now have a magnetic card reader installed), and goes on to say 950 and IOxxx calls are not allowed unless the payphone tariff re4uires them in that state. An interesting note: in New York State the only rules governing COCOTs are I) they must give free 911 service; 2) they must give free local directory assistance or have a phone book nearby (a book in the same building counts!); and finally 3) either on or around the phones there must be a number for service or complaints....MCl is expanding International Direct Dialing. As of September 15, Israel was MCI's 5gth direct dial country. They will lease e4uipment from A 1&1' to facilitate long distance service to another 140 countries....US Sprint now provides access to over 60 countries, while only about 20 are dialable with a fON card (Sprint's calling card service). The rest of the countries are only dialable with 1+ service. Among the countries not dialable by calling card are Argentina, Chile, Dominican RepUblic, Hong Kong, and Taiwan. (As of November 7, US Sprint suspended international calls to the Dominican Republic from area codes 212 and 305.) US Sprint says by the end of the year they should handle over gO countries....MCI will offer operator service in 1999 so that customers can use calling cards from a
  • 9. rotary phone. Once that is established they will also offer collect calls, trouble assistance, and other operator services. US Sprint has provided operator service for a good while now. Just dial �00-332- 0777 or for you equal access nuts 103330 (107770 is now extinct)....While both MCI and US Sprint are offering800 service neither provides 800 directory assistance. Take 800-444-9999, an MCI 800 number owned by Mrs. Fields Cookies�we called MCI and asked them if they had the 800 number for Mrs. Fields. They told us rather matter of factly that the number for800 directory assistance is800-555-1212. We tried to explain that that number was for AT&T 800 numbers, but were silenced with a click. When we called800-555- 1212, we asked the woman who answered "AT&r 800 information," if she had the number for Mrs. Fields Cookies. She said there was no listing. It just goes to show if you're going to get an MCI 800 number, you have to advertise or else no one will ever call you....With US Sprint's ongoing advertising nonsense about hearing a pin drop over the world's only fiber optic network they neglect to mention that you can also hear one drop on every long distance company -AT&T, MCI, Allnet, lIT, RCI, Western Union (oh well, almost every company). In its continuing quest to cut over to soon when yl'u call your access number (for the 7 digit home codes) you will hear a recording giving you a new number. This day has already come. There goes the last bit of GTE Sprint left in US Sprint. And soon they11 be selling their old network (see illustration)....Southern Bell has a new service for Florida residents who travel. Called "The Right Touch Service", this program allows customers to disconnect and reconnect their telephone service via a touch tone phone. From anywhere in the country you can call800-826-6290 to receive a series of interactive recordings. Callers are asked to enter their telephone number which must be in area codes 305, 813, or 904. They are then prompted for a personal access code. This 4-digit PIN number (not the calling card PIN) was mailed to customers recently. When this service was (continued on next page) ..................................................................................... Now's your chance US Sprint is selling a9,670 mile communication network. Some dUngs you doo't need two of. Especially two complete communications netWorks. But when GTEt'Sprim aoo us Telecom merged to form US Sprint.Iha!:'sexactly what we ended up wnh.. US Sprint is selling aD analogand digital mi.crowave network � �ces ov� 150 ma� metropolitan areas t!Jrougbouttheen� Uruted StaleS. So 11you re Jl1�ted 111 something from San Fr:mcisco to New York, CK from Bayoo Blue to Boutte, we mlgbtbeable to help. Because now thal we've moved to an aU-fiber netWork, we simplydon·t need our micro- wave network. "Network 3" (originally scheduled to be �oo:i';�=��::::::;:'���::;t::.:;!..��:r,. completed by June 27, 1987), US Sprint pwcl>a>od:::::.:::tyhas sent out notices to old GTE Sprint (950-0777) customers. The 9 digit codes ....�"':,."::�.:"�=��n:.';'::...200 feet in height. The DwJdings'm:fullycon.nected to local (which started out as 7 digits plus a 2 power.fully�.and.va>gelOO"III""f.... digit travel code) were replaced by a 7 ':"=;;,xp�'���or�lChosthal""'be'i"'" digit code which can only be used from ....�'::.'::ru,,"!:�.:���AnJ:':.,�""your home town. Even these new codes mostodvoncedin<he....uileind..tty. were only given out to customers ....����.;z�=f=O�.::=��=;'without equal access. Until now when ....OwnedoDdlea>ed=l,,""'property""""""�Ih<he_orl<. you traveled you could still dial 950- ....::= =";'v:I =..!i�.:!�=i:=on 0777 and place a call without a fllW>C>olonays�. surcharge. Now when you leave your Uyou""m_t.,Jin""""infonnanonobounheen... "'lWorl<,portlonsofit.ormany -ON d d of its components. gtve us a call at city you must use your F car an 1-800-548-4825. pay a 55 cent surcharge with each call. .................................................................................... . The letter continued stating that one day 2600 November, 1987 Page 9
  • 10. the telecom informer introduced a few months ago, cu�tomers had 3-digit PINS. It's quite possible that those first PIN's were actually the "account codes", those three numbers that follow the telephone number on the phone bill. With this service, there is no fee to turn off your phone line, but there is a $20.50 charge to turn it back on. Right Touch is available 24 hours a day and has the capacity to handle 26 callers simultaneously. While it may be a handy convenience, we wouldn't be surprised if the service got more abuse than use. Considering the amount of lines in Florida, Southern Bell may have used some sort of formula to assign the 1'11:, thereby avoiding the trouble of entering millions of 1'1: lor their customers. It anyone finds this to be true, give us a call. Sanlord Bingham 01 CO .laKa::illl' reported that when the service first started, he gave 305-555- 1212 as his number. "I gave 999 as my code. Astoundingly it worked. The voice thanked me and began to ask questions." Since then, the system has been programmed not to accept 555, 950,976,and others as valid exchanges. On a similar note, customers of South Central Bell can dial 1-557-7777,a toll­ free number accessible only to local callers, to get billing information, disconnect or reconnect service, arrange for payment, order a duplicate copy of their phone bill or custom calling services, all without having to deal with the business office. (What is left for the business office to handle'? Most likely, complaints about this new servict:.) South Central Bell started this service on a trial basis in early September with 40,000 customers in Kentucky....And finally, we've discovered a marvelous little game you can play with Sprint representatives. If you call HOO-52 I4949, they'll answer with the following greeting: "Thank you for calling US Sprint. By placing your order today, you will enjoy the clearest sounding long distance calls ever. My name is [name]. Page 10 November, 1987 2600 (colltinued/rolllpre,iouspaKe) How may I help you?" I his is one of the longest greetings we've ever heard and we've made an amazing discovery concerning it. If you hit a touch tont: in the middle of the greeting, the representative on the other end automatically jumps to the word "Hello'?" It just like an interactive computer! Iry it today. (('(Jiltilluedfrolll !JaKe 3) the systems where credit card numbers, ,11( I codes, or passwords are being pmted. But we refuse to put restrictions on users' private mail. Above all else, private mail must remain private. Fven the system operator has no idea what is in each user's private mailbox-that's the only fair way to run a system. Of course, it's quite possible that someone will send a Sprint code to someone else through the mail. Or an obscene word. Or a poem. We do not take responsibility for the contents of private mail. And neither does the post office. Both boards are similar in format. There are a series of room:Oi to "(,'0TO ". Some of them are obvious, some may take a little guesswork. You can choose the rooms you want to be a part of or even create rooms. Fntry is not restricted or monitored, but you do have to know the name of the room you're entering. (This is not hard information to come by, either through guessing or asking around.) Files are also stored in some of the rooms. These are easy to look at and download. There is plenty of online help available for users. And should you run into a problem of any sort, simply leave feedback or call us at (516) 751-2600. Fvery 2600 board will have an area for users to leave us public feedback. Both of these boards have a 2600 room. You can use this feature to communicate with other subscribers, offer criticism, praise, and suggestions. Of course, you can also do this privately by sending us mail. These systems are completely free to use and full of information and (collliflued Ofl page 21)
  • 11. r- MCI MCIT'*""'..........._ Coroor.uon Nortl'lust OIIlI"CIt' MtlOQl.llrtet'1 (: 'I, Im�lllo"al On",. j::l'l' orOOIi "i•• Vanl. laS7J 9,.a�J7.sooo Date: November 12, 1987 IE: Account��__________ A recent review of your .ccount indic.te• • po•• ibl. bre.ch in the •• curity of the .uthoriz.tion cod•• Du. to chi. f.ct, w. h.v. ch.nl.d your .uthoriz.tion cod. a. follows: Old Cod. N.w Cod. !hi. ch.nl. h•• b••n ..d. for your prot.ction .nd i. eff.ctiv. imm.diately. If you .r. bill.d for .ny un.uthoriz.d c.ll., pl•••• circl. th••• and deduct froa your ch.rl... 'or furth.r inv••til.tion, th. entire invoice Ihould be returned with p.,..nt to, Met Northe••t Divi.ion lnve.til.tion. Dep.rtment .t the above .ddr•••. If you h.ve .ny qu••tion. about your Mel .ccount, plea.e call: Sincerely, Coa.aric.l 800-444-5555 Re.identi.l 800-444-3333 MCI Northe..t Inveltil.tion. Department WHY DO THESE LETTERS ALWAYS LOOK SO SLOPPILY WRITTEN? In addition to their inability to spell "commercial", MCI doesn't seem to be able to make our new code work. When we called to find out why, the friendly representative told us that "effective imml.'diately" means 5 to 7 days in most cases. In addition to providing long distance alternatives, MCI now provides logic alternatives. Meanwhile, lJS Sprint still hasn't gotten around to taking away that $1200 outstanding balance that someone racked up on our account. "Just ignore it," they keep saying. That ought to be their corporate slogan. On our last conversation, they told us that we actually had a $12,000 biII a few months ago which they never sent us since it seemed unusual. And so it goes. 26()() November, 1987 Page 1 1
  • 12. WHY NOT Double Beepers Dear 2600: Rec e n t l y you m e n t i o n e d beeper compan ies not yet being ra ided by the pol ice for phone n umbers. They don 't have to ra id them! Accord ing to a friend who runs a l a rge beeper compa ny, the authorities ca n, with a warrant. leg a l ly obta i n dupl icate beeper numbers. Any access to the mon itored number a lso beeps the dupl icate n u mber in the pol ice station. Bob from Los Angeles How clever. So now we have beeper tapping. But willthe beeper companies be as cooperative with the authorities as the phone companies? Why No Boxing? Dear 2600: Apple Hacking Dear 2600: I thought some of you r readers m i g h t be interested i n the fol lowing: Does you r school have a bunch of Apples hooked up to a Corvis? Wel l , if they do, th is is for you . I f you wa nt a l l the accounts and passwords all you have to do is fol low these simple i nstructions. Fi rst when it prompts you for you r 10, simply hit ctrl­ reset a few times. You should now have an Applesoft Basic prompt. Now type in th is one l i ne program : 10 FOR 1=62 8 1 T O 7252 :PR I NT CHR$(PEEK(I));:NEXT I Nowtha t you have that typed i n,RUN it. The program should dump a l l of the pa sswo r d s o n to t h e scree n . Use r n a m e s a r e u s u a l l y t w o t o f o u r characters long. Passwords are two characters long . Also, d isregard a ny pu nctuation fol lowing a password . Let's say you h a d some output that looked l i ke th is: ... . . P1 P2 TYIPXX P3. . . .. The "P 1" a nd "P2" wou ld be user 10's t h a t r e q u i r e n o p a s s w o r d s . T h e "TYIPXX" would be user i d "TYIP", password "XX". "P3" wou ld be the same as "P1.. and "P2". In the cou rse of two yea rs of telecom, I 've r e a d co u n tl e ss G-f i l e s w h i c h desc r i be t h e ( v i r tu a l ) spectr u m of "boxes". Yetfew fi les I've encountered g ive a clear expla nation as to why box i n g is i m poss i b l e i n e l ectro n i c sw i tc h i n g off i ces. Wo u l d y o u m i n d e x p l a i n i n g C o m m o n C h a n n e l I nteroffice Signa l i ng (CCIS), and just how an electronic office "prevents" boxing? Thanks. That's the basics of Hacking Corvis Franken Gibe C o n ste l l a t i o n . Un ti l next t i m e h a ve Texas Put quite simply, it's impossible to us e a blue box in an electronic switching office under CCIS because the equivalent of the blue box tones that a phone phreak would send are transmitted over a completely different line. Since you don't have access to these lines, blue boxing no longer works. This is also called out-of-band signaling. For a more thorough discussion. refer to page 2-7 of the 2600 1985 collection. available from us for $25. Page 12 November, 1987 2600 phun a nd hack on . The Rifter More How- To Articles Dear 2600: It's been awh i le since I 've seen a n a rticle on boxing . W h y don 't you run a h ow - to a rt i c l e-o n e th a t a d d resses i nternationa l ca l l ing procedu res? I'm sure you have the capab i l i ty of com ing up with a very i nformative article on this subject, a nd many readers wou ld appreciate it. Tabula Rasa
  • 13. WRITE US A LETTER? While we have a number of how-to articles that we've published in the past, we'll be happy to print any new information, including new boxes, calling techniques, etc. International calling and red boxes are at the top of our "wanted" list. A New Source Dear 2600: I just fo u n d a g re a t s o u rce for i nformation on news about security a nd such l i ke. It's in a quarterly journa l ca l led ACM SIGSOFT, which is the "speci a l i nterest/software" group of t h e A s s o c i a t i o n f o r C o m p u t i n g Mach i nery. The a rticles with i n conta i n a l o t of i n te resti n g i s s u e s a b o u t security and 50 on , a n d many are a lso amusing. Read i ng these a rticles makes me rea l i ze how m uch I m i ss the news col u m n of yo u r ma g a zi n e . T h o u g h some ph reaks a nd hackers feel th is stuff is just fl uff and wou ld rather see techn ica l d iagrams in its place, I felt it was the best part of the jou rna l . I enjoy r e a d i n g a b o u t V M S t r i c k s to g ra b passwords, but I a lso want t o know about what's happen i ng i n the world out there (other tha n the latest phreak arrest). Vanda l-phreaks ca use some damage, but I a lso find it e n l ig hte n i ng to read items l i ke "The F B I estimates the average theft loss from computer fra uds at $600,000 [per fraud]," as on page 13 of th is J u ly's ACM SIGSOFT. Yo u m i g h t w a nt to m e n t i o n t h e existence of th is resource as I suspect there a re q u ite a few of us w i l d and wei rd news ju nkies sti l l out there in subscriberla nd. E.H. We still have a news column. It's called The Telecom Informer and it combines all kinds of newsworthy items into one long, rambling article. We'll try to cover as many Interesting occurrences as we can for future editions. For readers interested in subscflbing to ACM SIGSOFT, write to t h e Ass oc ia t io n for Computing Machinery Inc. (ACM), Post Office Box 12 1 14, Church Street Station. New York, NY 10249. Let us know what you find out. Pen Registers Dear 2600: As I stated i n a previous letter, my Ra d i o S h a c k pen reg i st e r doesn't record numbers when I use a cordless phone (Phonemate). It wou ld be i nteresting to know the m a ke of the pen reg ister a nd cordless p h o n e t h a t "Wo r r i ed a n d Upset i n Arizona" uses that does reg ister phone n u m be r s (Septe m b e r 1987 l ette r s page). Samuel Rubin Unique Projects Dear 2600: No one makes the fol lowing for the Apple: 1. A combination speech generator, clock, printer buffer, and copy card. Maybe even some ROM memory. 2. A 110, 300, 1200, 2400 baud modem with Europea n a nd American tones for 110 and 300 baud, a uto dial. 3. A card for i nterfacing a n Apple to a lmost any h a rd disk. Also needed is a way a ro u nd the ProDos l i m it of 2 32- meg disks per slot. 4. A coprocessor/accelerator card that has a l l three major processors on one card: FAST 6502, Z-80, and 6800 plus 64K ram. Any takers? John Nix (continued on page 22) 2600 November. 1987 Page 13
  • 14. Page 14 November, 1987 GRAPH DEFEATS-S2o ���o�O�a� l Yafe a ��hf:� � v :�9tt��iy: r � ��!� ra1luie��,';:a� even your llterm .rv:: If � are totallY innocent! Describes In Shocking detan what pqlygraphs are, their various uses, types of tests and questions, procedures, scoring methods validity and reliability, and technical aesign factors. Heavy emphasis on every known countermeasure f���c��ti to ��T��fJk�r!}f� o C:i��i�r�;� and speCiOc lIinnocen�" and "guiltyll res­ ponses to typicalquestIO ns. *.******.*****'" *.******.****** AND WIN-S20/Yr .....The October 1987 Stock Market Pl�e proves that ECONOMIC COLLAPSE ISlikely and soon! Are you prepared fOf. it? Or for War, Terrorlst Acts. RebelllOn, ¥iVk�S6��r, b �i�ti�� r i�cr !hOa���'a�Jc���: Ma.de and Natural Disasters? For two years, we published the popular, ultimate technolo� survival newsletter. REBEL. SURV.lVEA:ND W.l:N!­ sizzling and rock-fisted - includes com­ puter, communication, electronic, Phone d��g�i s�Z�i�' A'i, n d e �w t���Z�� :gd win Now and '!be Day After in urban, suburban, rural and wilderness areas. Chock full of hard-ta-find survival info. Includes no-holds-barred editorials and articles. We need many more subscribers, feature writers, information �ontributors ��ti������r:�c�:Jl� i �u���I��n�� l �rsi: Published monthly. S20/yr lridividuals, $SO/yr Corporations. S3/back issue. ;'Nl-l'H7J!J'fjfAlJIJs�RfAWJ" VORTEX GENERATOR-SB Heat/cool with Simple, Amazing 3-Port po�lfeiu��es lro u�O vd�g&:���, 6�a c rt,:'A���d sctentlficall.y�ound. Practical. Plans. *.*••••*••••••• STOPPING POW ER METERS"'l0 Our all-time best seller! Describes how electric meters work a wh are ��lsith,eB'g�J�gwE� �INO INTERNAL LOAD MET Y. IRON GONADS-Slo most controversial and e)(Jllicit elec- �����ti���rge���l u �����f� i �:a�� m !s� e d toslow down-evenstop -powermeters! ............... LIBERATE GAS & WATER-sIO Describes a simple method using a com- r:�rlg����g�;��We"(:�t t r[g����g� r cgis- *********."'*••* SECRET & ALTERNATE IDENTITIES-sa rs� t e�C:-t�� a :gth'e t �i�arr:�'ftp��Os k �t �� taining secretandalternate IDs. �ou have the legal right to have as many IDs that Y��v:�an� s Jg�g :� n in i ¥:f:� ��c,:�k�� �OO% phony (and rOO� legal)passports! *****.********* FREE-sa , t Om�i1/ r i; �h�n(!lin��tis'r��fn���t�' supermarket food, medical and hosQitai ����[t��2!���S , ;��f��,n�O:;ke;���n��:.:azines, air/bus!trainlship first class fares, software andvideo tapes - more! "'*"'**"'*"'**"'**** CONSUMERTRONICS • 2011 CRESCENT DR. P.O. DRAWER 537 ALAMOGORDO. NM 88310 2600
  • 15. RINTER & PLOTTER MANUAL-S15 Types, Descriptions. Specs. and 100+ In­ terfaces (Parftllel, Serial). Detallpq Plnns of X-5wltchers, Buffers, ft1!d Serlal-Tb-­ Parallel and Pal'llllel--'Ib--..<;;erJai Breakout Devices. Repair, Maintain. Many Ally, Use and Service TIPS, Figures. SUPER RE-INKING METHOD-ss Rc-Ink Cloth Ribbons for about 50 ('enb and 10 1!1l�lUtes each. PlaTL'; for El (,ht>apo Motor-Driven Re-Inker. Com [!lOnly used Ink (5 Colors) and Carrier described. *************** MASS TRANSIT TERROR-S7 Worried about Air Piracy? Bombings? Hostage Situations? Ra�h 'fraugott, F�ht #847 host!�J�tated: tlnotice that �;; �}i��;:rrt'te�����?,b� ��r7�; �� i �a:l�t� e �w� e �1{f<it��� age) of their weapons pas� all airport security. This manual descrIbes terrorist l�g�U?os�. t �;i��l a �?�fri���!· t(��:�e� TECHNICAL RESEARCH SERVICES �Pe�ine��1;:����e��!����t���1u7)j�'�t �fl���Pp��vfg:� g k��t�e��r��l r rfsr� W'f�;�:;:; r ��ti��2�o� e ����Js:rfJ��� e �)6 cents per page. Saves you a b mdle on R&D time, money! EducatlOnal tuol. ************** ,. 1'/(,1I5e Order 'It)(lay - Tell Your Friends About Our Ad - Keep Our Ad For Future Orders THE CENTRAL OFFICE A full range of telephone, radio, computer, and satellite info plus a whole lot morer 2600 DDS #2 914-234-3260 2600 November, 1987 Page 15
  • 16. AN I NTI MATE LOO K AT ;� logon unsuccessful-incorrBct password. As has � just been stated, a valid userid has been entered 2.. but the password was incorrect. Passwords can � be from 1-8 characters long , but in many cases � the minimum length is changed to be at least � three characters, There is no difference between § upper and lower case letters for either the userid '� or password as they are converted to upper case � by the system , This is another security flaw as it reduces password possiblities, Password incorrect-rBinitiata logon procedure. This is the message received on the older versions of VM/CMS, which means the same thing as the above message, Maximum password allBmpts Bxceeded, try again latBr. The threshold has been reached for userid and/or password attempts, You will receive this message every time you attempt to logon after exceeding the threshold until a variable period of time (probably from one to five minutes) has elapsed , This locks out all users who attempt to login to the system from that particular l ine, I am not sure whether this is recorded anywhere or whether it is sent to the system console, It's a good idea to determine how many attempts normally trigger this and keep just short of it. AlrBady 10ggBd on. This message will appear when you attempt to logon with a valid userid and password and that userid is already online, Unl ike other systems, VM /CM S will not al low the same userid to be logged on more than once, Userid missing or invalid. As it impl ies , nothing was typed after entering the LOGON command , or the format for the userid was not correct , i , e , using a number as the first character o r a control character used somewhere in the userid field , Error in CP dirBctory. The C P directory is the main user directory for the system , Entries in the directory contain the userid and password, VM I /O configuration, disk usage values, associated virtual and real addresses, privi lege classes, virtual processor size, and other options for each user, Without the proper directory entry, a user cannot logon to the system and wi II therefore receive this error message, Command not valid before logon. This occurs when you enter anyth ing other than the commands l isted in the menu, i ,e, entering B O N E H E A D w i l l ret urn t h i s message even though "BONEHEAD" isn't a val id command , Why this is I don't know, So don't get all excited Paee 16 November, 1 987 2600 thinking you found a val id command but couldn't execute it since you weren't logged on, Accounts By constantly compi ling userids from various systems you should be able to collect a nice l ist of accounts which may enable you to gain access to a system , The fol lowing are a few which I have found : OPERATOR CMSBATCH AUTOLOG1 OPERATNS VMTEST VMUTIL MAINT SMART VTAM EREP RSCS CMS SNA As usual , use the usemame as the password , Things sti l l haven't changed from the Hacking VAXIVMS series " , people are just as stupid as they were a few years ago , There are many default accounts which have the passwords l isted in some I BM system manuals, These are hard to obtain and are very powerf u l s i nce some passwords are rare l y changed , If you can get access t o the defaults, it will greatly expand your collection of systems- I guarantee it. Dial D IAL is used to logical ly connect l ines, whether they be switched (regular dial-up phone lines). leased (dedicated) , or logically attached (directly connected ) , to a previously logged on multiple-access system , The D IAL command is the only substitute for the logon command , On systems running more than one operating system , D IAL is used to connect the user to one of those systems, It is rather common to find two or more operating systems running parallel or "under" one another, This is quite different from most other systems, which run alone on the machine, One machine, one operating system , but not I BM , The abi l ity to have multiple systems running simultaneously and still provide the user with the i l l usion of it being a single system (the whole idea behind multi-tasking computers is to provide each user with the full resources of the machine so quickly that it appears that he or she is the only one using the system ) sets I BM apart from most other computer manufacturers, Some of the systems which run on I BM's are : VM/CMS, MVS/TSO , DOSIVSE, OS IVS1, Some others
  • 17. I BM 'S VM /CM S are : M U S I C , J ES , and IX/370 which is I BM 's version of U N I X that runs under VM/SP. I t is always good to know what other systems are running , and if you are unable to gain access to the "primary" system , you may be able to gain access to one of the "secondary" systems by use of DIAL. Some systems wi l l require you to specify a line number for certain systems . Others will find a line for you if one is not specified , assuming there are some allocated to that resource. Userids are also dialable. In some cases you have to dial through a particular userid in order to gain access to certain systems or perform certain commands. A typical logon to a D IALed system may look like: .DlAL MUSICH DIALED TO MUSICH 040 *Miscellaneous Computer Services MUSIC/SP 1 . 1 SIGN ON. .RESET DROP FROM MUSICH 040 VM/370 I When it comes to finding a valid line number for systems that can be reached via DIAL, you could be in for some trouble. If the system requires a line number to be entered (unlike the above example , where l ine 040 was found automatical ly) , you will not only have to come up with a defined line number, but one that is associated with the system you are attempting to access. Usually you can find this information after logging onto the VM/CMS system in various fi les, but if you cannot get in, you will have to sequential ly enter l ine numbers. Some that I have seen are 001 , 01 B, 41 A, 040. The VM/CMS system does not appear to l imit the number of D IAL attempts a user can make, u n l ike L O G O N attempts . Programm i n g your micro to search for a val id l ine number to a system should work with no problem . To drop the dialed connection just type RESET. Error Messages linels) not available on 'sysname'. Either there are no I ines allocated to the system , or you must enter a correct line number. Invalid device type 'sysname' 'lina#'. You have entered a valid system or userid and l ine number, but the device you are on ( the terminal ) is invalid. In this case, a GRAF (Graphics) device, system console, or 3270 terminal may be the only valid device. 'usarid' not loggad on. The D IAL command cannot be executed unless the user (or system) specified is logged on . 'lina#' does not exist. A valid userid/system has been entered but the l ine number for that userid/system is not valid. Massage M SG is used to send messages to users who are currently logged on. This command can be issued before ( if specified by the logon menu) and after logging in. MSG OPERATOR Helpl I lost my passwordI My usarid is COMOSOLO. This will send a message to the primary system operator of the system. If there is only one CLASS A user online, the message will be sent to his terminal . MSG * This will send a message to yourself . This is useful for identifying the current userid of an abandoned terminal . Logoff The LOGOFF command can be abbreviated as LOG. After logging off you wil l receive the following : CONNECT= 00:33:54 VIRTCPU= 000:00.28 TOTCPU= 000:01 .76 lOGOFF AT 1 7:05:44 EST THURSDAY 04/1 6/87 CON N ECT is the actual clock time you spent whi le on the system . V I RTCPU is the virtual CPU time that was used . TOTCPU is the total CPU time, both virtual and overhead, that was used. The HOLD command will hold the connection (continued on next page) 2600 November. 1987 Pale 17
  • 18. PLAYI NG WITH I BM 'S VM /CMS -;; allowing you to re-Iogon again without having to Shows usershowmany invalid password allBmpts have � re-dial the system . occurred on their userid � Increased file security ;:I .2 .LOG HOLD ;. '" .. 0.. Security Softwan § There are various weaknesses w i t h i n � VM /CMS both intemally and extemal ly which 1 can be exp l o i ted . For t h i s reason , various .� software security packages have been written . =: There would not be a need for these in most cases o � if the people in charge of system security knew what they were doing . Anyhow, these packages do p ro v i de added sec u r i t y when p roperly implemented . The most commonly found are VM S EC U R E and ACF2 . TO P SECRET and RACF are o t hers wh ich are less commo n . These Logged On After logging on you may receive something similar to the following : OASD 1 90 LINKED R/O; RIW BY MAl NT; R/O BY 030 USERS LDGMSG 1 0:40:25 EST FRIDAY 05122/87 WELCOME TO MISCELLANEOUS COMPUTER SERVICES VM l SYSTEM WILL B E DOWN FROM 1 0:00 TO 1 0:30 EST SUNDAY MAY 24, 1 987 packages are easily identified . Logon at 1 3:22:59 EST FRIDAY 05122187 After entering a val id userid VM SEC U R E VM/SP REL 4 04120/86 1 1 :33 responds with : VMXACI I D4R Enter logon password: * * * * * * * * * * * * * * * * * * * * * * * * * * HHHHHHHHHHHHHHHHHHHHHHHHHH SSSSSSSSSSSSSSSSSSSSSSSSSS One way to positively identify the use of V M S EC U R E is by using it as a userid . If it is running it will be a val id userid, and who knows, you may even hack the password . After entering a bad password , ACF2 (Access Control Facility 2) responds with : ACFV1 0 1 2 PASSWORD NOT MATCHED ACFV0044 ACF2, ENTER PASSWORD * * * * * * * * * * * * * * * * * * * * * * * * * * HHHHHHHHHHHHHHHHHHHHHHHHHH SSSSSSSSSSSSSSSSSSSSSSSSSS These packages provide information which should be inherent within the operating system itself . Perhaps newer versions of C M S will contain them . Some of these features are: Last logon date/time Password expiration Rules for password selection Invalidating userids for invalid password allBmpts Invalidating terminals lor invalid password allBmpts Page 1 8 November, 1 987 1600 R; T=0.01 l0.01 1 3:23:1 0 Line #1 : This line shows that the disk at virtual address 1 90 is l inked with RIO access by you , R/W by userid MAl NT and RIO by another 30 users. Line #2 : This shows that the logon message was created at 1 0 :40 on Friday . Line #3-7: This is the message that is shown to all users of the system upon logging on . Some systems may not have one . Line #8 : The actual time of logon is printed . Line #9 : The current RELEA S E of V M / S P and the time and date it was i nstal led is shown . Line #1 0 : This is the ready message and it is printed after every command is performed where: R= Ready-this indicates that the system is ready for inpu t . T=Time-the first series of numbers tells how long it took the system to perform the last task . The second set of numbers gives the time of day. I f you do not recei ve the ready message you are in CP and must I PL CMS in order to issue CMS commands . Line #1 1 : The system prompt-you can now enter commands. Privilege Classes As with most other operating systems, a user must have sufficient privileges in order to execute certain commands . Every CP command belongs to one of eight I BM defined privi lege classes . The CP directory defi nes which users (continued on page 20)
  • 19. 2600 marketplace WANTED : Any hacker a nd phreaker software for IBM compatible a nd Hayes compatible modem . If you are sel l ing or know anyone who is, send repl ies to Mark H . , P.O. Box 7052, Port H u ron, M I 48301-7052. F O R SA L E : O k i da t a M i c ro l i n e 92 personal pri nter. Incl udes m a n u a l for i n st r u ct i o n s . H a rd l y u s e d . M a ke a n offer a nd i f it's reasonable, I wi l l pay postage. Matt Ke l ly, 310 Isbe l l , Howell, M 1 48843. SUMMERCON '88-com ing to NYC . Watch this space for more i nfo. TAP BACK ISSUES. Complete set, vo l . # 1 to a n d i n c l u d i n g vo l . # 9 1, i n c l u d i n g sc h e m a t i cs a n d spec i a l reports. Copies i n good to excel lent cond ition. $50. 00, no checks, i ncl udes postage. T. Genese, 219 N. 7th Ave. , Mt. Vernon, N.Y. 10550. DOCUMENTATION on electronic and dig ita l switc h i ng systems and PBX's. W i l l i n g to p u r c h a s e / t r a d e . A l s o look i ng for other paraphern a l i a such as Bel l System Practices. Write to B i l l, c/o 2600, P.O. Box 752C, M iddle Isla nd, NY 11953. BLUE BOXING? Let's exchange i nfo on phone n u m bers, parts, and etc. Write to : B l u e Box, P.O. Box 117003, B u r l i ngame, CA 94011, Attention D . C . FOR SALE: 8038 m u lti-purpose tone generator c h i ps, prime q u a l ity $7. 50 e a c h ppd . I n c l u des com p r e h e n s ive a pp l i ca t i o n s d a t a . Two c h i ps w i l l generate a ny dual tone format. These are no longer in production. Get 'em wh i le they last. Bruce, P.O. Box 888, Sti nson Beach, CA 94970. FOR SALE : Radio Shack CPA-1ooo Pen Reg ister. Just l i ke new. $70.00. J . C . D eve n d o rf, 29261 B u c k h a ve n , Laguna N iguel, CA 92677- 1618. FOR SALE : Ex-Be l l blue boxes, old and styl ish, may even work ! Also a wide range of old Bel l comms equ ipment. Ca l l (514) 288-6731 and ask for Rick for deta i ls. DO YOU HAVE old outdated computer eq u i p m e n t l y i n g a ro u nd g a t h e r i n g dust? Why not donate i t to 2600's g r o w i n g b u l l e t i n b o a r d n e two r k ? Support freedom of speech i n you r t i m e ! Contact 2600 at (516) 751-2600 or write 2600, PO Box 752, M iddle Island, NY 11953. F O R SALE: SWTPC M o d e l CT-82 i ntel l igent video term i na l . Completely p r o g r a m m a b l e ( 1 5 0 s e p a r a t e fu nctions), RS- 232C & para l lel printer ports, f u l l ASCI I keyboard w/cursor control pad, 9" P- 31 CRT w17x12 dot matrix-up to 92 column capabil ity, 32 baud rates to 38,400-much more. E x c e l l e n t c o n d i t i o n w i t h f u l l documentation. Orig i n a l ly $800, sel l for $125 o r best offer. Bern ie Spindel, 144 W. Eag le Rd., Su ite 108, Haverton, PA 19083. 2600 M E ETINGS . Fridays from 5-8 pm at the Citicorp Center in the Market (lobby where the tables a re)-153 East 53rd Street, New York C ity. Come by, drop off articles, ask questions. Ca l l 516-751-2600 for more i nfo. GOT SOMETH I NG TO SELl? Looking for someth i ng to buy? Or trade? This is the place ! The 2600 Marketplace is free to s u bs c r i be rs ! J u st send us whatever you want to say (without making it too long) and we' l l print it! O n ly people please, no businesses. Address : 2600 Marketplace, P.O. Box 99, M iddle Island, NY 11953. Include your address labe l . Deadline for December issue : 1 2/5. 2600 November, 1987 Page 19
  • 20. HACKI N G I NTO I BM 'S � can use which classes of commands. Each user :::- has one or more privi lege classes, as does each � C P command . If you try to issue a command that --., ::: does not match the assigned privi lege class of the 2 userid you are using , the system will not process :; the command . As far as I know , no records of � attempts to use privileged commands are kept . .� Here is a rundown of classes A through H . :s Primary System Operator: The class A user has � the abi lity to control the system . Any user who uses the VM/ SP system console possesses this pri v i lege c l ass . Th i s user can broadcast messages , control system accounting , and issue commands which affect the overall performance of the system . System Resource Operator: The class B user has the abi l ity to control all the "real" resources of the system , except those controlled by the spool ing and primary system operators. System Programmer: Class C users can modify real storage as opposed to virt ual storage. Spooling Operator: The class D user controls spool ing data fi les . System Analyst: ( C l ass E ) M o n i tors and interprets system performance data Service Representative: (Class F) This class IS llSually given to accounts that I BM Field Service personnel use for updates and also for diagnosing system problems General User: Class G usels are Hle most plominent on the system . ThiS pr ivilege allows the user to control functions ;lssocialed With ' l it;;' Dwn vlrtual , llachine AllY: The Any classificat ion IS given to cer tain C P cOlllrnamis which are ;wadable to any user TIle commands are usually l imi ted to LOj11l and Logoff Class H IS reserve{j for IBM use Due to the individual needs of a Site, privi lege classes can be tailored to suit the facility. A total qf up to 32 classes can be nlade . They would he sllown in the CP di rectory as A- Z and 1 -6 Some typical privilege classes for a few r;ommon IIscnds are Class A for OPERATO R , Class F tor E R E P , C l asses B , C E. G fOI ()PE RA TN S anIi C!asses A , B . C [) E , F , G fo� M A l f H Commands f'.Ullllrk1l1ds drc ' , 13(;e up of COlll; lland naliiC:, ;}IId ophcns . Command Name: A cOl nrnan!i [ lai "I' h : ', ; 1 I'ag<> 20 "m emher, 1 9N7 2601! alphanumeric symbol of up to 8 characters . Operands: These specify the information on which the system operates when it performs a command function . Options: These keywords are used to control the execution of a command. When used , they must be preceded by a left parentheses, but a closing one is not necessary D ifferent commands are used within different environments. To see which environment you are in , simply hit retum at the period prompt . You w i l l receive one o f the fol lowing C M S , CP, XED IT. There are many commands that are useful to both regular system users and hackers , H ELP is avai lable on some systems, particularly on university systems. I t is extensive but not as clear as U N I X or VMS. Th is is typical of I B M . Nevertheless , H ELP is useful and you should get hardcopies of as many commands as you can . AI D is another foml Of H ELP which may be usefu l t o YOll in leaming more about the system . One n ice feature of C M S H ELP is that when you receive an error message, you can : . HELP OMSOOOOOO or OMKOOOOOO Where DM SOOOOOO or DM KOOOJOO is the error message you have received . The system wi l l then explain wllat it I S , wily it happened , and how you can correct i t ! elm gOing to hold off on explaining any and a l : �ommands related t o mlnidisks u n t i l tile next Sf�c:t I(Ii The others which I have found to be usetui dre as fol lows . You C:111 Issue any C P command while in eMS by precluding tile command wi th CP Ouery Ouery al lows you to obtain various bits oj I IlfOinlat !on about the system . A full l ist can be found by using H ELP. One of the most important Q U ERY commands for the Ilacker is .0 NAMES OPERATOR-O l F, SMART-[JSC CMSfl349- B27, LOGOO I 80--B3 1 lSM - · IjMVS I 5COTT· _·TP l l WfMZ, CMS 1 2 ! l · TP ! i WHi4, IJPH1ATNS,- TP l l WFY l II: T·O.GI /0,0] 1 1 :34:28
  • 21. There can be many users online; usual ly this l ist w i l l contain from 30 to 1 00 users . The last user onl ine was OPERATN S , since it was last in the list. The SMART userid is DSC, or in a disconnected state . Usual ly a tenminal will remain disconnected for 15 to 30 minutes and then is totally logged off the system . I f you logon to an already disconnected tenminal , the system will reply with "RECO N N ECTED AT time" . The other 2 userids on the same line as SMART are probably connected tenminals which are in a pre­ logged in or pend ing logon state . VSM-VMVS1 IS another system r·unning paral lel to (or under) CMS The QU ERY NAMES command allows you to gain a l i t tle more security for yourself on the systelTl . I t al lows you to gain more valid usemamcs to attempt passwords for in the unfortunate event that your current uselld dies. .Inotller use IS tilat you can start to compi le your . cornrnon accounts" l ist of userrds wtlich are found orl VM /CMS systems. This l ist should get larger and larger as you gain access to more and more systems and will allow you to gain access to more systems as it gets larger. If you can't count how lTlany users are online from the 0 NAM ES l ist .Q USERS 0007 USERS, 0000 DIALED. 0000 NET If YOLI didn' t catch the logon message you can view It aqain by .Q LOGMSG 10 see wrlat release oj CMS tllc system IS. .Q CMSLEVEl VM/SP REL. 4, SERVICE LEVEL 4 1 7 I I you al e wOfl(lennQ Wilich IBM II liilnfrarne eMS IS i U: lil l l ilj ,HI . YOl! can ISSLIe .0 CPU!!] no 1 4"f23438 1 0000 Til lS can be intt;IT'ret(�d as follows CPUI!J�' aabbbbbbccccdddd ad ;-" " F F '" w'i"j8fl runn!n� Viv1 / S, P bbbbbt-F�the piOC8%lil i [) i illmber. cccc=,llle mooel i iulnber of the I ;] tl 8 ctbIJVC case . U,,1S an ! i.Hl 438 1 ddcid:�-" GOOO" TI�i: used f0;- ::� r, SEN DF!LL a!!:iW" YO:I to s0nd fijr3S W: t:l!1I dny rnrnid l�;k ttl;] t IS cu rrently accessed VOd to anotiler use! . Any time you send a f i le an entry IS made in �he t i le U S E R I D N ETLOG (where U S E R I D iS t . .e user you are sending the f i le to) . This command i s also used for sending NOTE files which can be created with an editor and sent to whomever as E-MA I L . I f you are tired o f seeing a text l i sting , o r have attempted to read a compi led program and wish to exi t or break out of i t , simply hit a hard-break , and then type H X H X i s for Halt eXecution . It wi II halt whatever you are doing and put you back into the C M S environment. It may take a few l i nes of text after entering it for the system to stop the process This article will be concluded in the December Issue of 2600. (continued/rolll page j{)) interesting user.,. The number for mws l', 2MJO Board #/ l 9/4-725-4060. The ( entraI O.fjice, 2600 Board tt2 is reachable at 914-234-3260. If you get a busy signal, just keep trying. Unfortunately, the 9/4 area code is flO/ yet reachable on P( PUr.<iuit, the service offered by US "';'print that allows unlimited computer time across the country for $25 a month. Let them know you want the 9J.1 area code added-their number ;.5 800---835-3638-so we can all save on phone bi/k /1 nd keep check.ing for future 26(}() bulletin boards ill other areas, While we 're Ofl the .mbj£·ct of bulletin hoards, W(' should paid out thai the old Private Sectorphone number in .Vew .Ieney is 110 longer ill use. It's ponible we may have sent mIf HJme information to new subscribi n with that number. If yOIJ recei.ni mell propaganda, I'lea.e disregard it. * * * Ttl Nldifiou to all of this, we flOW have an ilddrn.' rm the infamous "worldnet " Ji.�n.t.,sed in the ." eptember 1 987 issue of 2MJO. lf yoll know how to manellver Four way arow!, ! the networks, you can send mail to us tit ow· UHmet addf('5S (�f' ;;61){}@da�y,l , l!U( P ar our A rpanet address ojphri!dosysl!26()O(TlJnyu. Ifyou IIm'e dijficll!ly �endiflK to liS at these addre.ues, let U5 k,WlJ, 260{) November, 1 987 Page 21
  • 22. LETTERS(COlllilllledji-olll lJ(Jgl' IJ) TAP is Dead! Dear 2600: C a n you te l l me i f a news l ette r sim i lar toyou rs ca l led TAP is sti l l being p u b l i s hed a n d i f so, wh a t i s the i r address? D . l. New York TAP no longer exists, although back issues are being sold b y differen t people (check the 2600 Marketplace). A s far as we know, 2600 is unique in subject matter and approach, although t h e r e a r e s o m e o th e r h a c k in g publications-some good, some bad. Look for reviews in future issues. In last month 's letters column, a reader told us that the 8038 chip used in our 1 985 blue box schematic was no longer available. Several readers have notified us to claim otherwise. We understand the chip is obtainable through Janeco Elec­ tronics in California (a sk a n y electronics store for their number) at a cost of around $3. 95. listening in � prying ears. probably for reasons of security. The %:: truth is that fed frequencies are as wel l known as 2.. "regular" frequencies. A company cal led CRB ::.: Research , known for publ ications on surveil lance � and electronics, has a book called "The Top > Secret' Registry of U . S . Govemment Radio � Frequencies" by Tom Kneitei . This book contains � the frequencies, cal lsigns , and radio codes of 2 every U . S . Govemment Agency in existence, '- including such agencies as the FBI , C I A , D EA , and of particular interest t o phreaks, the Secret Service. Earlier edi tions of this guide were bound computer hardcopy w i t h everything l umped together and sorted by frequency. This made for something which was difficult to read , and difficult to use. However, it sti l l remained the de-facto scanner guide to the feds , and was very popular. Page 22 November, 1 987 2600 The recently published ( 1 987) sixth edition has eliminated the readabi l ity problems, and has added more non-frequency information which makes for an excel lent publ ication . Inside the 8 11z x 1 1 " , 1 92-page book , there is an alphabetical l isting of the various agencies Further delving into the book we find that each agency listing is divided into sections containing f re q u e n c y / f re q u e n c y u s e , t ra n s m i t t e r locations/cal lsigns, and , when avai lable, the various codes and slang used by the particular agency. ( Rawhide will arrive at Curbside rather than Pivot . ) A particularly interesting section contai ned the l i stings for the U . S . Secret Serv i ce . Among the frequency / f requency codename / f requency use data was a l i st c o n t a i n i n g the codenames used for the presidential staff , first famil ies, and other related information. Did you know that Amy Carter's codename was "Dynamo"? The Top Secret Registry is an excellent book and is highly recommended reading for those interested in listening to those who are l istening to you . It's avai lable for $1 6.95 from CRB Research , P O . Box 56, Commack , NY 1 1 725. And by the way. . . . here are some rather active federal frequencies (In megahertz) Secret Service: 1 65.375: "Charlie" nationwide primary channel 1 66 . 462 5 . "X - Ray" common channel for Treasury Dept . State Department: 409.625 Justice Department: 36. 07 41 1 .025 General Services Administration: (protection of federal buildings) 4 1 5 . 2 41 7.2 Drug Enforcement Administration: 4 1 6 . 05, 41 6 325 , 41 8 .75, 4 1 6 . 2 CORRECTION : In last month 's l i st of mass a nnou ncement n u m bers, we neg lected to mention that they cou ld a lso be reached from a rea code 7 1 8. PHONE N UMBERS OF INTER EST: 2 1 2-222-81 08 . . . . . . . . . . Parents U l 1 ited 7 1 8-343-01 30 . . . . . . . . . . . . ScrambleFax 800-223-333 1 . . . . . . . . . . . . . . . . A Bank 01 1 -6 1 -3-692- 2982 . . Recording, wild tone
  • 23. N OTI C E Does yo u r add ress l a be l say "Ti rn e to Renew " ? Don 't rn i ss a n i s s u e . R e n ew yo u r s u bsc r i p t i o n today a nd e njoy peace o f rn i nd . S i rn p l y i nd i cate t h e a rn o u nt e n c l osed a nd wh i c h , i f a ny, back i ss u e s yo u wa nt. Yo u r add ress l a be l s h o u ld be on the back of t h i s forrn . $ 1 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 yea r of 2600 $ 28 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 yea rs of 2600 S 4 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 yea rs of 2600 $40 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 yea r co rpo rat e s u bscr i pt i o n $ 7 5 . . . . . . . . . . . . . . . . . ' . 2 yea r corporate s u bsc r i ption $ 1 '1 0 . . . . . . . . . . . . . . . . 3 yea r corporate s u bscr i pt i on $ 2 5 . . . . . . . . . . . . . . ove rseas s u bsc r i pt i o n ( 1 yeCi r on ly) $ 5 5 . . . . . . . . . . . . . . . ove rsea s corporate s u bsc r i pt i o n (1 yea r o n ly) $ 2 60 . . . . I ifetl rne s u bsc r i p t i o n (never aga i n w i l l we bot h e r you ) Back i s s u e s a re a va i l a b l e . P r i ces a re : $ 2 5 . . " " . . . . . . . . . . 1 984, 1 985, o r 1 986 i ss u e s ( 1 2 pe r yea r ) $ 50 . . . . " : . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . Any two yea rs $ 7 5 . . . . . . . . . . . . . . . . . . . . . . . . . . A l l th ree yea rs (36 Issues ) (Overseas orders add $ 5 for each yea r ordered ) A l l ow 4 to 6 weeks for de l i v e ry . Send a l l o r ders to : 2600 PO Box 752 M idd l e I s l a nd , NY 1 1 953 U . S . A . ( 5 1 6 ) 7 5 1 2600 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AM O U NT E N C LO S E D F O R S U B S C R I PTI O N : __ AM O U NT E N C LO S E D F O R BAC K I S S U ES : ___ 1 984 1 9 85 1 98 6 (circle years ordered) TOTA L AM O U NT E N C LOS E D : ___ (clip and send to us- your address is on the back)
  • 24. CONTENTS I 2600 BULLETIN BOARDS . . 3 IBM'S VM/CMS SVSTEM. . . 4 : II S.5. PREFiXES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 LISTENING IN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 TELECOM INFORMER..... . 8 I LElTERS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 2600 MARKETPLACE. . . . :.... 1 9 2600 MaQazlne P0 8ox 7S2 MIddle Island. NY 1 1953 USA WARNING: MISSING LABEL