SlideShare a Scribd company logo
1 of 24
Download to read offline
STAFFBOX
Editor and Publisher
Eric Corley 110
Office Manager
Bobby Arwatt
Production
Mike DeVoursney
Writers: John Drake, Paul Estev, Mr. French, Emmanuel
Goldstein, Chester Holmes, Lex Luthor, Phantom Phreaker,
Bill from RNOC, David Ruderman, Bernie S., Mike Salerno,
Silent Switchman, Mike Yuhas, and the usual anonymous
bunch.
Cartoonists: Dan Holder, Mike Marshall.
Reader: John Kew.
Editor Emeritus l::'H
260() ( I. S  ()7·/'J-385I ) 1.1 l'lIl>li.lh,.d /"",,/Id, /" .!M)(II.II/( 'I",(I III, . 7 ./f<)lIg:- 11111l". .'/Oll/'U.  } 11733.
.£ (()lld (/a. l'o.llIgc 1'( nJllf II('Iuit",!!. of S('taUh('1. (' } or/..
I'OS I :1.S I FI{: Scnd addrc" chan�c, III _'f>()(). P.O. Bll' 752. 1,ddk hl,lIld. :i II'IS.1.{)752.
Cllr1n�hl I'IX7. 2/l(XI I nl errr"c, Inc
i earl ,uh'LT'rtrlln: I .S. and ('"nada ::, IS IIldl Idual. ::,-l() Cmrmalc.
(hL'r�L'a, S�:=; lIldl H.luaL �)) corpurate
Back ",ue, ,l,,!Iahk 1m I'iX-l. I'IXS. I'iX/l al �2S per ear. S.'U pcr car mer,ca, .
.DDI{ESS .1.1. SI8S(I{II'IH)' (OI{I{ES"O'DF'(F TO: _'IJII(J Suh,crrr1,"n Dcrt.. I'.D. Bll' 752.
llddk 1,lan,1. :i 11'1).'-07)2.
HlI{ UT I FI{S .'D .1{ 11<1.1-: Sl B'IISSIO'S.  I{I! FlO: .!()(I()I dnlllrall>crt.. P.O. Bn.' '1'1. 1Jddlc
.!/')(I(J Oillee I 'Ill' ) 1(1-/)1·2(�XI
BBS ::IIOSI :i I 'i1-l-12)-4(1(�1
BBS ::2 I l "1 : IJ{ 1 OIIICI I 'JI-l-2.Q-.'2hO
ISI:1 I llIJJ{1 SS 2NX�ud;I,,I.1 I(I'
J{I'.:I I 1>1 JJ{ISS. phl,',b,,,1 '2(�X)u nlll
Page 2 December. 19117 260()
Important News
A number oj circumstances have
Jorced us to make some changes in the
way 2600 is published. As oj /988, we
will become a quarterly publication
imtead oj a monthly publication.
We've been printing 2600 under the
"new "Jormat Jor a year now. And one
thing we can't help but notice is that it:5
Jrightfully expensive. We adopted this
Jormat so that we could pre�'ent longer
articles and al�'O become a little more
visible. And we have succeeded in both
oj these ambitions. Ilowever, if we were
to continue at this pace, we would run
out oj Junds entirely. The 5/5 we charge
Jor an individual subscription is actually
less than what it costs to produce one
issue Jor a year. This is why we charge
more to th(He that can afJord more,
namely corporations and large
organizations where the magazine is
passed around to many people. And this
is why we continue to �'ell back issues.
By providing alternate sources oj
income, we are able to continue to keep
the magazine going at a low cost.
By raising the price to cover the casts
oj printing, mailing, and running an
oJJice, we could easily put the magazine
out oj the reach oj mmt oj our
suh.5criben. We've seen publications
smaller and less inJormative than oun
with annual price�' oj over $/OO! We
don't want to take that road.
By reducing the amount oj times we
publish during the year (at the same time
increasing the .5ize oj each issue slightly),
we can keep the price down, keep
ounelves out oj Jinancial problems, and
hopeJully give ourselves more time to
make each issue mean a little more.
Ihis bring�' us to the time Jactor. We
put a !!,reat deal oj time into putfing out
the magazine. But 26()0 is more than just
a magazine. We're constantly tryin!!, to
educate the populace on the u'es and
abus'es oj technolo!!.}'. We're told that a.
a result oj our campaign to abolish the
touch tone fee in .Vew l'ork, a bill may
be introduc{ Ii in the slate le!!,islature
proposing just that. Our growing
bulletin board network will do much to
ensure Jreedom oj speech Jor all
computer users. And, oj coune, we want
to make sure that people see and hear
about this magazine and our
organization, either by getting maximwlI
exposure ill the media or by getting
international distribution. A t our
current Jren::ied pace, we just don't have
the time to adequate(v pursue these
goak At a more relaxed pace, we Jeel
we'll be better able to put out a quality
publication :lnd make it more
memorable overall.
Vatural/y, we don't expect everyone to
agree with our conc/us;oll.5. IJ you Jeel
strongly negative about this change or
about anything el5e, we'll certainly give
you a reJund Jor the balance oJ your
subscription We hope, though, that
you '/I stick. il out at least to the Jirst
issue oj our quarterly Jormat to see if we
live up to your expectatioll.5.
Our spring issue will be mailed on or
around ,Hareh 15, 1988. Subsequent
mailing date' are scheduled Jor June /5.
.'eptember 15, and December 15. Your
expiration date will he adjusted in the
Jollowing manner: January, Fehruary,
and .Harch will end with the .5pring
is.ue; April, ,tay, and Jw;e-sununer;
Ju(v, A ugust, and Septemher-Jall; and
October, .Vovemher, and
December-1vinter.
A number oj subscribers have
complained about their issues arriving
late or sometimes not at all. It appean
we must become militant in convincing
the po.'j oJJice to do their job. IJ you do
not get an issue within a week. oj when
we �'end it out, you should call us and
call your pm! oJJice. Usually it is the
post oJJic(' on the reeeil·in!!. end thaI i. at
fault.
A , alwajl.. we welcome vour !('t'libuek
on what H
:
e re doing. We hope (hi,
('lianlte results ;n a betler publication
and a llronger Twenty Six Hundred.
2600 December, 19117 Page J
HACKING IBM'S
by Lex Luthor
and The Legion 01 Hackers
Command Interpretation Chart: The following
chart shows some VM/CMS commands with
their equivalent UNIX and VA X /VMS
commands. This will allow those readers who are
familiar with other operating systems to quickly
reference the CMS counterparts.
VAXIVMS UNIX
INOCOMMAND 'NONE'
SHOW USERS wtIO
DIRECTORY II
VM/CMS �
NOIPL .Il0<1l !olin "'"
QUERY NAMES onli.. _Iiltilll
lISTFILE
or FILELIST II10w cumnl dir.
TYPE Iii..... cat hilnlml TYPE m...
Itypo 1m lilt or viIW lila
EDIT M or v. or IX XEOIT &yIIIm MilOI'
DELETE iii. rlOllMl Ii.... ERASE m...
I1J1IIIm ..... hla
PHONE user write user TEll _ill user c:ornnIIIIiaIion
Control Y C�I·1IaI:ksI1Ih Hrink
u.. HX
Corresponding fties
SYSUAFOAT IETCIPASSWO USER DIRECT U..lisI /1_
inlormltion
MAILIXT USR/MAlll
user USERID NOTE ElodnInic
..ilhla
LOGIN.COM .PROFILE PROFILE EXEC U.. ..in COIII1IMd lila
Local Commands:
Local commands are written for an individual
system, and customized to suit a facility's needs
(These commands are execs which are either not
available from IBM or are cheaper to write on
your own.) I will mention a few which may be
found on other systems, as these are rather
common.
WHOIS
This command gives a little information about
any user that you specify who IS on the system.
This IS similar to the UNIX command "finger".
.WHOIS MAINT BACKUP MAILER BUBBA RELAY
VMUTIL
U...d
MAINT
BACKUP
MAILER
6UBBA
RELAY
VMUTIL
SYSPASS
REAOPW
WRITEPW
N...
SysIIm M.i_ ACCIIIIftt
VM SysIIm IautI nI R-V MlChi..
BITNET 1m. Node M.il Procasilll MlChi..
Buillll B. __P..........I..1yII Exlroldillliro
BITNET 1_ Chit fKility
VM Ut.lililion SlJtislics
I'agl' .. Decemhl'r. 19K7 16()()
In most cases, the only way to change a user's
password is by having the system operator or
someone with high privileges do it. This is one
reason why many passwords remain the same for
long periods of time. These programs allow users
to change their logon password (SYSPASS),
read access minidisk password (READPW), and
write access minidisk password (WRITEPW).
You may find these or similar programs on some
systems.
Privileged Commands
As tar as I know, there is no command to
determine which privilege class the userid you
are using is. The only way to find out is to check
in the CP Directory. The tollowing are some
privileged commands and what privilege class is
needed to run them. From what I've seen, the
system keeps no records of tailed attempts at
running privileged commands. Successful uses of
these commands are most likely recorded, either
In a log or by sending a message to the system
console or both, especially when using FORCE.
FORCE userid (Class A)
This command will forcibly log off the userid
you specify. I really can see no reason other than
to be a total idiot for abusing this command.
DISABLE raddr (Dr) all (Class A Dr B)
This is used to prevent specific terminals or all
terminals from logging onto the system. Again,
there is no real reason to use this or most other
privileged commands unless you want to be
kicked off of the machine. If you do DISABLE a
terminal, simply use ENABLE to repair the
damage.
DETACH raaladdr (FROM) whalaver (Class B)
This is used to detach real devices from the
system. These can be terminals, printers, disk
packs, tape drives, etc. You must know the real
address of the device, and "whatever" can be the
system name, or a userid.
WARNING userid (or) operator Dr all (Class A Dr B)
VM/CMS-PART TWO
Waming will send a priority message to a user,
operator, or all users on the system. It will
interrupt anything they happen to be doing.
Obviously sending a msg to all users stating they
are BONEHEADS is not recommended.
Minidisks
A minidisk is a subdivision of consecutive
cylinders on a real DASD volume. The real DASD
device is the actual disk the information is stored
on. This can be compared to a hard drive for an
IBM PC. Before the drive can be used, it must be
formatted. Once formatted, it is divided up into
directories called minidisks. Minidisks are
measured in cylinders, which are the standard
memory storage units. There can be many
minidisks on a DASD. Associated with each CMS
disk, is a file directory, which contains an entry
for every CMS file on the disk. A minidisk can be
defined for R/W or R/O (read/write or read/only)
access. It can also be used for storage of files.
Each minidisk has a virtual address which can be
from 001 -5FF (hexadecimal) in basic control
mode, and 001 -FFF in ECMODE (Extended
Control Mode).
CMS minidisks are commonly accessed by a
letter of the alphabet (A-Z). For example, let's
assume we are logged onto a VM/CMS system
under the userid of JOE. We want to see what
minidisks we have access to. We use the auERY
SEARCH command to determine which disks we
are ATIACHed to.
.Q SEARCH
JOEOOI
JOE002
CMSI90
CMSI9E
191
192
190
19E
A
D
S
YIS
RIW
RIO
RIO
RIO
Each minidisk has a volume name, virtual
address, filemode, and access mode. The A disk
is the default. Most accounts you gain access
with will have an A disk with a virtual address of
1 91 . The S disk is the System disk. This contains
the files and programs for running the system.
The same goes for the Y disk. The D disk is
another disk used by JOE.
You can view what each of these directories
, contains by issuing the LlSTFILE command.
.lISTF
BUBBA
MISC
PROFILE
NOTE
WHATEVER
EXEC
AI
AI
AO
This is a list of files on the A disk. The first
column is the filename, the second is the filetype,
and the third is the filemode. Filenames can be
anything you specify. Filetypes can also be
anything you specify, but commonly follow a
pattem which tells what type of file it is.
Filemodes are comprised of a filemode letter
(A-Z) and a filemode number (0-6).
Filenames can contain the following
characters: A-Z, 0-9, $, #, +, -, :.
Here is an explanation of common filetypes:
FilBIype Description
DATA Data lor programs or simply TYPE-able text.
EXEC User written programs or IBM procedures
written in REXX.
HELP System HELP files.
HELPCMS System HElP files.
LANGUAGE One of the languages that the system
supports. such as ASSEMBLE. COBOL. FORTRAN.
JCL. REXX. PlI. SNOBALL. BINARY. etc.
LISTING Program source code listings
LOADLIB Loading library
MAClIB Macro library
MODULE System commands
NETlOG Contains a list of all files which have been
SENT to other users.
NOTE Similar to E-MAIL on othar systems. a nota
sent from another user.
SOURCE SOURCE code for various programs.
TEXT Text file. Probably used lor programs and
when TYPEd yields little.
TXTLIB Text library
WHATEVER A nonstandard filetype which will
problbly be somewhat descriptive of its contents.
XEDIT A file which was crated using the XEDIT
utility.
Both filenames and filetypes must not exceed
eight characters in length.
Filemodes
Filemode numbers are classified as tollows:
Filemode 0: There is little file security on
VM/CMS. This may be due to the fact tlla!
directory security is very good. A file with a mode
(cr '111 illued Oil lleXI paKe)
26UU December, 987 I'age:;
HACKING IBM'S
7' of zero makes that file invisible to other users
¥ unless they have Read/Write access to that disk.
;- When you LIN K to someone's disk in Read/Only
.� mode and get a directory listing, files with a
t mode of 0 will not be listed.
=:... Filemode 1 : This is the default fdemode. When
reading or writing files, you do not have to
..:-. specify this fdemode number (unless you want
to) since it will default to it
.:, Filemode 2: This is basically the same as a
fdemode of 1 . It is mainly assigned to files which
� are shared by users who link to a common diSk,
like the system disk.
Filamoda 3: Be careful when you see thesel
These are automatically erased after they have
been read. If a file with a mode of 3 is printed or
read it will be erased Blindly reading files
without paying attention to the filemode numbers
can shorten your stay on a system. The main
reason for this filemode is so the files or programs
that are unimportant or have one-time use can be
automatically deleted to keep disk space and
maintenance to a minimum.
Filemoda 4: This is used for files that simulate
OS data sets. They are created by OS macros in
programs running in CMS. I have not found any
files with this filemode, so for the time being, you
should not be concemed with it.
Filamoda 5: This is basically the same as
filemode 1 . It is different in that it's used for
groups of files or programs. It makes it easier for
deleting a number of files that a user wants to
keep for a certain period of time. You could just
enter: ERASE • • A5. Now all files on the A disk
with a filemode of 5 will be deleted.
Filamoda 6: Files with this mode are re-written
back to disk in the same place which is called
"update-in-place". I have no idea why this would
be specified, and have not found any files with a
filemode of 6.
Filamode 7-9: These are reserved for IBM use.
Accessing Information
Looking back at our Q SEARCH listing, let's
see what is on the D disk:
.LlSTF * * 0
N01MUCH ONHERE 01
Page 6 December, 1987 2600
In this case, the D disk only contains one file
called N OTMUCH with a filetype of ON HERE.
But do not forget the fact that you only have
Read/Only access to the D minidisk! So there
may or may not be merely one file on the D disk.
Remember all filemodes of 0 (which in this case
would be DO) are invisible to anyone who does
not possess Read/Write access.
Y ou can access any disk that you are
ATIACHed to by replacing the 0 in the above
example with the filemode letter (A-Z) you want
to access. As was shown previously, the QUERY
SEARCH command will give you a list of
minidisks that your userid is attached to upon
logging in. These command statements are
usually found in your PROFILE EXEC.
So you can access a few minidisks. Theremay
be hundreds on the system. Unlike UN IX and
VMS, and most other operating systems for that
matter. you cannot issue a command and some
wiIdcard characters to view the contents of every
user's directory. In order to access another users'
directory (minidisk) you must have the following
1 ) The USERID of the person whose disk you
wish to acce!;s; 2) The virtual address(es) (CUU)
that the USERID owns; 3) The Read, Write, or
Multi disk access password. depending on which
access mode you wish to use.
This would be accomplished by the following:
.LlNK TO BUBBA 19 1 AS 555 RR
Entar READ link password:
*************************
HHHHHHHHHHHHHHHHHHHHHHHHH
SSSSSSSSSSSSSSSSSSSSSSSSS
.RBUBBA
R; 1=0.01/0.111 21:58:48
.ACCESS 555 B
R; 1=0.01/0.01 21:59;03
.0 SEARCH
JOEOOI
BUBOOI
JOE002
CMS190
CMS19E
191
555
192
190
19E
A
B
o
S
Y/S
RIW
RIO
RIO
RIO
RIO
VM/CMS-PART TWO
.LlSTF * * 8
MISCFILE
PROFILE
.REl555
OATA
EXEC
R: T= 0 01 / 0 0 1 22 0 2 01
81
81
Now an explanation of the events which have
just occurred.
The L I N K command is used to access other
users' mlnidisks. The format is
.LlNK ITO) USERIO VADDR I lAS) VADDR2 IMODE)
IIPASS=)pASSWORD)
BU BBA is the USERID whose disk we wish to
access. VADDR1 IS a virtual address which
belongs to the BU BBA usend. If BU BBA was to
access our minidisk whose userid is JOE, he
could access either our 19 1 address or our 19 2
address. The 19 0 and 19E addresses are usually
automatically accessed by nearly all the users of
the system since it contains system commands.
We are assuming that BU BBA indeed has a
minldisk with the virtual address of 19 1 Some
usend's may not have any or they may have
addresses which are somewhat obscure, say of
13A or 503. The only way we would be able to
access those assuming BU BBA did not give them
to us would be to guess them This wou!,d be
rather difficult, lime-consuming !lild dangerous
as we will soon see
VADDR2 is any address which is not clliTemly
In our control ( i .e., III our 0 Search which would
be 19 0 , 19 1, 192, 19E) and is i n the range of 001
to 5FF in Basic Control or FFF III Extended
Contro l . In this example, we chose to use 555.
We could have easily used 1 0 4, 33F, 5FA , etc.
MODE is the access mode which consists of up
to 2 letters. The first letter specifies the pnmary
access mode. The second letter is optional and
designates the alternate access mode. If the
pnmary mode IS not available, the alternate IS
used
The access mode we used was RR Val id
access modes are
R: Pnmary Read/Only access This IS the
default. You can opt to not specify an access
mode when linking to a user's diSk, and this is the
mode which IS used. it will only work If no other
links are In effect.
RR: This allows read access no maller what
links are in effect to that user's disk
W: Primary Write access. This is only good if
no other links are in effect.
WR: If Write is available then ttle link will be
made. If not it will gG La Read.
M: Primary Multiple access.
MR: Resorts to Re<:d if Multi is unavailable.
MW: This guarantees write access 110 matter
what.
If another user has write access to one of your
disks whenyou log on your access will be forced
to Read/Only. For thL; reason, you should have
read access to other disks instead of write. If you
wish to see what files have a filernode of zero,
then l ink with write access, view, or access those
files, then RELEASE the disk and re access it via
read to avo i d suspic i o n by Hldl user of
unauthorized individlElls gaining write access to
his files.
I f a user has write access to a disk, you cannot
gain write access unless you use a mode of MW.
It is not recommenderl to have write access to
another's disk if they themselves have write
access. CMS cannot guarantee the Integnty of
the data on a disk which has mom tilan one
person l inked to it with w,ile access Now!f you
see that the user is in a d!sronnected (DSC) state
through the 0 N AMES rommanrl then I t
shouldn't b e 3 problem i f you also have write
access since the person is not actIve. I f that
person reconnects, however, then it is advisable
to RELEASE that disk as soon as possible to
avoid any chance of d"ta being destroyed.
PASS=PASSWORD. Like the logon password, It
can be a 1-8 character string that must match the
access mode passworrl for the VADDR1 of the
userid which you are attempting to gain access :::'
to. Up to three access mode passwords can exist
for each mlnidisk-R, W, and M.
I f the inst a l lation uses the Password �
Suppression Facility, ail INVALID FORMAT �
message will be issued when YOII dttempt to -
enter the passworrl for a disk on tll(; '�:�lle line '
that the LINK C0r11mand was entered on ':2
O bVIOusly thiS I S to prevent peop le f, om �
"spoofing" the password oil the screen or frn;!l
printouts found in the tr,'sh. I f this occurs, Ilist nit
2600 December. 1987 Page 7
the telecom informer
I
I ()ue ,uddenl" iOlgotten hO to
Ihe lthtOll1 t-.IIlill!c !edttHe" the
11l1'" ,II Suuthc,ern Bell h<lc a
Ildlllh "..'11 ICC lIn you. It a 'peel:.d
Illtc'I�I(tle !lulllhn that gives you
IIlI()lllllllillil 1)[1 hOI to ll',e certain
katllll" I"pll'" I lor clil w;utlllg into, 2
I"i ,Iili IUI,lIcilllg. etc."). lhe !lumher
h i i,-fl,' i-,"q'i. Kcep 111 nllJl(L though,
thill lli'll lIClI lllh tOI lhing cu,tOlll calling
katllTc, ,11 Illlm L'Ilinpany tn
l"npilll c' prohahlv all heard
'1l11ietllln" !lhout thl' "Max Headroom"
Illlldent III (hleagu i1 Ideo pirate
',(lllH'illl ,IIUPUlCIL'd thl' 'Igndb ot
t   1 [ucili ,til til111' Ull diI !ercnt nighh,
diC'N·d ill 1.[. 11"ddll"111l gcar and
:ll,t�, li!!__: dt: l'lll' Fl·....1UIL', Vcl' heard
,t:, �illd,,- 1.11 thl'O!ll'" �h to 110v; it d
d,)[,,:. 1""t Id lh,'cc' 'lTIll tIl agln� tklt
It', Ildll·,Ji"1.hl I.'ih til ()ICrpOICl a
IOl,:! ,[;[11<111 ,'!1 tile'! 111Il'l"()II;lIC link,
tlie 1',',11 lrll� "III)(illlg thl'lr path.
 ltll�" thl' t .tpLllll  lldlllght 'pcctal·lc.
I!<>i !!Ltlil pc'uple- h"It,,'lc' thl' hilildit II ill
C'c'1 ill' C·iIU.:.:iIt h,'Cdll'l' apparcntl" thl'rl'
1. ill) 1l..1i ,l� i)! tLI�-'liil� �Ul'il all actioll.
nthl'l tllilll h;lIng ,'n, 111Ie',e,. "l' hllrc
1(l hl' ;lhle t(l �:et Ill(IC 'pc'Cilll'
Inlllllll;ltlllll. It jl)(If" Iti-.c· 'llllll' lllil Iil",
itill'<ld ..  I,: I ,lllll Indlil!liI Bel! hilll'
Illlk,',1 I"l,'c" to .... lIlih,lt Illn� dhtillln'
11.111(1 I hC11 11,'11 ,,'1 ICC. called thc
j{"l'llll" I'l"lL"LlI<III Si,'1ll (tillc,n't t hill
".'lIlId il�" ,I !III,h,tcl tCrlll.') 11I1(l"
111!c'ICcll,lllgl' ldllll'l' tIl ,h,lrc
! ill ill' 1),11 [I'll (111 Ill'! II( Ilk 11l1'U'C ill](1
cledll hl,((lIIL'. (dIIlCI' tli he ilhlc to
Ilh!:1111 dat,l 1111 ,'liI" tll illH! Ir,lnl
P;lItiLlJ!al 1H1I!lhl'!' til tlacc tlaud nlllrc
l·il,lh. l'illtlllPdtlllg l(lllg cll,tillllT
l'Oll1pilllll" 1111I,t Iced thclr ncdlt
IIIIIllllliltl'lll Illlll the diltaha,e nn
1I1(lllth. I kpClldll� lin thcll Illlll
1IL'l11"1 1.,', till'''' C(lIllj1illllC' clnlld thcn
dl'l'l·.... ', till' .... � .... ic·!ll h� lhlll�� ;lll.t1o!2-linL'�,
dn'Il.li. ''i 1'1 11,1lL" Itill' 11 lib, 'licil a, thc
111,'1. 1',Iei-,e( llltliIl'll 'l·tllk
111,,' 1"lk'.I1 tilL' 11,lll(l11,i1
( Ul�1!1Hirlll'�ttlOlh I LJllti ( )[llrdl
I kn'mlll'r, I <iX 7 !600
Associalion 01 I-aidax, Virginia havc
endllr'.cd thi, ncw scrvicc ....Police hope
it tecnage computer "I hi/kid" arre,[ed
tor thell and interceptlllg computer data
in Burlington, ('anada will help them
hust a hacker !lctwork that spall, the
cntire provillce of Untand. Ihc
II1L"tlgatjdn started III Oetoher when
Wcstinghouse Canada complained to
Ilamiitoll police that illl outsider had
hroken into their Privatc Branch
Lxdlill1bC (PH') and hilled Illore than
S 1,000 in long-dl,tallcc computer calb to
thc C()lllpa Il. A Wcstinghollsc
'pOke'lllilll ,aid the youth la,
"ull,elfi,h", pa",ing thc cntlv code
i!llHlIlg cUI1lj1utn hackn, alound thc
 urld. "lie lao, u,lI1g our Cl)IllputCl
,,tcm to lhC othn com[1l1tu, ilnd
hulletln hoard,," hc ,ald. Ihl' I lilaI
lL'lcpl](lllL� tab could rC�lch S I (),()()O hllt
Wl'stinghlllhc ha'Il't del'ldcd it it 1 ill
,cck rcstitutlon III thc courh. I'lllicc ,aid
thc ol/th Ilil' w,ing il ha'il' CUlllputer, a
(ol11llwdorc (>4, to Incilj., thrllugh
"ophl,tIt'ated ,ccllrit'1 ,tUll'>. I he tccn"
rcc'ortis ,IHlcd lile other computer
",tem, thrcc belonging to Illultl­
national Cllrporatlolh In Southern
Onti110 Ierc clltL'lcd hut cn IIIlilaI
cilargc, wercn't lilld hccau,c thc
L"lllllpanlc, Inl'n't awarl' of thc
Illtru'lons. ..11'1 ha, an!luullccd that Ih
l(lng dl,t;lncc unit, l'S. Iran,mi"lo!l
S,klm 11K. (l SIS), II ill drop thc
surchargc lUI "9)11" c;i11s placcd h
,'u,tll!lln, II ith II I Giliing cards.
lllLIitll all illng dlstancc carner,
chargc sllb,LTlhn, a Icc to :tcce" "Y)()"
,ell ICC,. I'IC IOllsl, liT card cu'-,toillers
paid a )()-ccnt ,ml'hargc lor cach call
plaecd over the I l'I
lletlork ... BcIISollth 1 ill hc the tir,t
Rcgional Bcll ()peratlllg ("oillpam to tr
(lilt I hat PIllillIse, to hc it ,lgllJlicallt
1ll'1 "TICl' kn()11 ii' the 111lL"lllgelll
'c'tllllik. Iill, Ilctl ol k 11111 hl ahle to
hilildk;1 arict III ta,k, h Illtcrilctlng
Iith Ii tclllllJ1 (It Belkoll'-dclclopcd
'PCClilll/L'li diltilha'l" .. cL"llldlng to C'O
.faga�III[" the Intelligent :ctwork will
IInprme Bell Operating Company
(HOC) equipment elficiencie, in the
handing ott of X()() customers to
interexchange carners, enhance
interexehange cOlnpetition, and cnable
cu,tomer;, to easily change their
interexchange carriers without changing
their X(}O numbers. What this means is
that cu,tomer;, won't have to change
their X(}O numbcrs if they decide to
,witch long distance companies, Call
handling willllllt bc limitcd to switches.
Calb ill hc handlcd hj' the rcmotely
located datahase and distrihutcd
thnlllghout thc network.... Hritish
lelecom is markcting as part of ib
"advanced bw,mcss systems" a product
klllln a;, QWER I Yphonc. It's a desk­
t,)P terminal 1 ith alphanumeric,
Iullction and telcphone number kcys
plu, lour-linc LCD. It's being
dellHH1strated as a low-{;ost computer
and speech terminal. Ihcy abo arc
promoting I.iK lOR, a higlHccurity
data cneryption unit that protcct, data
agamst eavesdroppers, providc, user
authcntieation, and offers a simplified
ke' ma nagement ,ystel11. And of course,
thnc SkyplhlllC, cnahling travclers to
kecp in touch while thcy'rc in thc ,ky
Iith thc rc,t of us dlll n here on the
gr<lll1d. All paid lor by credit cani. of
cour,e. I'llpular features on ne British
le!ccom phones: tcn l1urr,!,cr memory,
;,ecrecy but ton , last-numbe,' rc:dial :JIld
dual ,ignaling, plus onc ·huttol� a"c'�s, I'l
network and PBX L.h.:ilitle:-..... brac! i,
creating a cOlllputeri71:d database Iith a
wide range of personal information
about Arab residenb of the West Bank
and GalLi Strip. Accordmg to a report
by the Vest Bank Data Base Project, a
widely respected lsral'li research in,titutc
monitOring developments III the
occupied terrilnrtcs, the new hrdcli
M inls(n of Defense datahase :t!ll(lil''''
tll a '.:om!1uter<;•.'d clfrot-an<i-,ti':f
operation" and ;1 potenli�.d "hig b',ltner"
for the e�t B"nk and Ciani Str!p. I he
c()mputcr. lrieh began operating ,lilT
the ,ummeL IS being programmed with
lI1formati()n un property. real estate,
lami!) tie�, political attitude"
im olvel1lent in illegal activities,
licem,iIH !, c'on, pmption patterns, and
oecupat'iom 01 Arab residents of the
Wcst Bank and (JaiL. It is particularl)
dangerous, the report says, because the
110rmal braeli I,IWS and checks and
halanees governing the usc of databases
do l1llt apply tu the occupied tcrritorie,.
By pressing a key on a computer
tcrminaL any braeli official working in
the occupied te rritories will be able to
gain acccss to hts of names of those
Arabs who arc "positive" and those who
are "hostile". I [lis information could be
used to decide lhe late of their
application, for anything from car
licenses to travel documents.
OS'UNY
2600 BBS #1
,4 vailable 24 hours a day with a wide
range of information on computers,
telepholles, and hackitl;:;.
CALI. l'()DAY!
914-725-4060
THE CENTRAL OFFICE
A full range of telephone.
radio, computer. and satellite
info plus l whole lot more!
2600 BOS #2
914-234-3260
26(jIJ December, 987
all about BL V
Verification and emergency interrupts are two
operator functions that have always fascinated
the phone phreak wor l d. Here then is an
explanation of just howit all really works. (Note:
this article is written solely on the A T& T TSPS
process of verification.)
.
Let's say Smith needs to get ahold of his
friend, Jones. Jones' telephone line is busy, and
Smith must talk to Jones immediately. He calls
the operator, by dialing 00 for an AT&T TSPS
Operator (or in some areas, 0 still gets TSPS).
The operator answers, and asks if she can help
him. Smith replies that he needs to Interrupt a
call in progress so he can get through. He tells the
operator Jones' number. After a few seconds, he
is connected to Jones and they talk.
The name for this process is Busy Line
Verification, or BLV. BLV is the telco tenn for
this process, but it has been called "Verification",
"Autoverify", "Emergency Interrupt", "Break into
a line", "REMOB", and others. BLV is the result
of a TSPS that uses a Stored Program Control
System (SPCS) called the Generic 9 program.
Before the rise of TSPS In 1969, cordboard
operators did the verification process. The
introduction of BLV via TSPS brought about
more operator security features. The Generic 9
SPCS and hardware was first installed in Tucson,
Daytona, and Columbus, Ohio in 1 979. By now
virtually every TSPS has the Generic 9 program.
A TSPS operator does the actual verification.
IfJones was in the314 Area code and Smith was
in the 815 Area code, Smith would dial 00 to
reach a TSPS that served him. Now, Smith, the
customer, would tell the operator he needed an
emergency interrupt on a given number,
31 4+555+121 2. The 815 TSPS operator who
answered Smith's call cannot do the interrupt
outside of her own area code, (her service area),
so she would call an Inward Operator for Jones'
area code, 314, with KP+314+TIC+121+ST,
where TIC is an optionalTenninatingToll Center
code that is necessary in some areas. Now a
TSPS operator in the 314 area code would
receive the 81 5 TSPS operator's call, but a lamp
on the 314 operator's console would tell iler she
was being reached with an Inward routing. The
815 operator then would say something along the
lines of she needed an interrupt on
Page 10 December, 1987 2600
31 4+555+1 212, and her customer's name was
J. Smith. The 31 4 Inward (which is really a
TSPS) would then dial Jones' number, in a
nonnal Direct Distance Dialing (DOD) fashion.
(DOD by an operator is really called 0000, for
Operator Direct Distance Dialing.) If the line was
not busy, then the 31 4 Inward would report this
to the 81 5 TSPS, who wouId then report to the
customer (Smith) that 314+555+1 21 2 was not
busy and he could call as nonna!. However, if the
given number (in this case, 314+555+1 21 2) was
busy, then the process of an Emergency Interrupt
would begin.
The 31 4 Inward would seize a verification
trunk (or BLV trunk) to the toll office that served
the local loop of the requested number
(555+1 21 2). A feature of the TSPS checks the
line asked to be verified against a list of lines that
should not be verified, such as radio station
call-in lines, police station lines, etc. If the line
number a customer gives is on this software list.
then the verification cannot be done, and the
operator notifies the customer. The 31 4 Inward
would then press her VFY (VeriFY) key on her
TSPS console, and the equipment would
o u t p u l s e ( o n t o t h e B L V t r u n k )
KP+OXX+NXX+XXXX+ST. The KP signal
prepares the trunk to accept MF tones, theOXX
is a "screening code" to protect against trunk
mismatching, the NXX is the exchange or prefix
of the requested number (555), the XXXX is the
last four digits of the requested number (1 212),
and the ST is the STart signal which tells the
verification trunk that no more MF digits follow.
The screening code is there to keep a nonnal Toll
Network (used in regular calls) trunk from
accidentally connecting to a verification trunk. If
this screening code wasn't present, and a trunk
mismatch did occur, someone calling a friend in
the same area code might just happen to be
connected to his friend's line, and find himself in
the middle of a conversation. But the verification
trunk is waiting for an OXX sequence, and a
nonnal call on a Toll Network trunk does not
outpulse an OXX first. (Example: You live at
9 1 4 + 5 5 5 + 1 0 00 a n d wish to call
91 4+666+0000. The routing for your call would
be KP+666+0000+ST. The BLV trunk cannot
accept a 666 in place of the proper OXX routing,
busy line verification
and thus wou ld give the cal ler a re-order tone.)
Also, note that the outpu lsing sequence onto a
BLV trunk cannot contain an area code. This is
the reason why if 'J customer requests an
interrupt outside of his own NPA, the TSPS
operator rnust cal l an I nward for the area code
that can outpulse onto the proper trunk. If a
TSPS in 81 5 tned to do an IIlterrupt on a trunk in
3 1 4, it would not work. ThiS proves that there IS
a BLV network for each NPA. and If you
somehow gained access to a BLV trunk, you
could only use it for interrupts within the NPA
that the trunk was located In.
BLV trunks "hunf to find the correct trunks to
the right C l ass 5 end office that serves the given
local loop . The same outpulslng sequence is
passed a long BLV trunk; until the trunk serving
tile tol l otfrce that serves the given elld office is
found
There IS usually 0118 BLV t runk per 10,000
lines (exchange) So. if a tol l office selved tell
centlal offices, that tol l office wou ld have ten
BLV trunks rUllillng frolll (l TSPS site to that to!1
office.
Scrambling the Audio
The operator (Ill uSing the VFY key) can hear
what IS going on on tile Illle ( modern, VOice, or t1
dial tone, Indicating a phone off-hook). iJut In a
scrambled state A speech scramllier Circuit
wlthlll the operator console generates a scrt1mb!r,
on the line while the operator IS do!:,] a VFY Tilt:
scrarnble IS there to keep opelator:, ;rol1ll:steI11Ilg
In on people, but It is not enough to keer' Hl
operator frorn being able to tel l if a converSdr,Of:
modem signal, or a dial tone IS present upon the
line If the operator hears a dial tone. she can
only report back to the custorner that either the
phone IS off-hook, or there is a problem with the
line, and she can't do anything about it. ThiS
speech scrambling feature IS located in the TSPS
console, and not on verification trunks. I n the
case of Jones and Srnlth , the 314 Inward would
tel l the 815 TSPS, and the 815 TSPS would tell
t he custorner. If there IS a convelsation on lille,
the operator presses d key marked EMER INl
(EMERgency INTerrupt) on Iler console ThiS
causes the operator to be added !ilto a three way
port orl the busy ililP The EMER IN r key also
deactivates the speech SCIambling clleull ana
aclivates an alertll19 tone that can be tleJrd by
the cal led customer evelY 10 seconds. rhls tone
tells the custorner that an operdtor IS on the Ilile.
S o m e areas don t have the a lerti n g t Oile.
however Now, the operator wouln say 'Is tillS
NXX-XXXX?" where N XX-XXXX would be the
prefix and suffix oj the number that the 01 iglnal
c ust o m e r request r n g tile Interrupt gave the
original TSPS. The customer wou ld COnll1lT1 the
operator had the correct line. Then the operator
would say , 'You have a cal l w<1ltlng from
( custorner Ilarne) Wil l you accept ? " This gives
the customer the cI ,ance to say 'yes" and let the
calling party be c'lIlllected to hll11, while the
prevIous party vI'u.lld be disconnected . If the
called customer says "no'. then the uperator tel ls
the person WllO requested the internlpt that the
cal led custornel wo(ilci 110t accept Thr O[,eralOr
can Just Infon11 the lJusy ,.!.lrty tlia: ,00neo'le
Ileeded to contact !'II1" or �ler, and ildve Imnliler
[1allQ up. and then Intlfy the requestlllg CUSt(lIner
that the 1IIIe IS free. Jr, the operator can connect
tile calling party aillJ the Intem!ptp,d party
Without loss of cOllllectlOri
If a customer lequested an Interrupt u,JOn a
line WIHlIil hiS [10lile NPA (H��Pii. 'i '�" tii,
()rlyina! ;::mswerinJ � SPS Clper .:tur V/OL:ll1 d�� tr,�:
entire "/f;(:flcat;ur: p:(H:r;,(;c; T' ';C;.'-){;t :bH�
The ctl:lrges ;:,1 '!ll� (;f; i' "/ area Clt
least) rllil $100 l'lr �1,K':I,j tiie a:,' :1
Inte'Tjpt a phone I.'ai: 'ill YJU ell!' �f/ :hrrlligh
Thel e IS an 80 cellt char �c , : you ,b� t: I� llperator
to verify whetlier the pholle YOllre tryli1(j to reach
'"� busy because of ,I 'iCN IiY P'OIJ!eI11 or because
of aCOllVersatlofl II tilt !11!el,asnocollversatlon
011 it, there Wil l be nu charqe for the venflcatioll
The Aftermath
Wilen t�1e CUSlOrner who IIlltlated the
emergency Interrupt gets hiS telephone bil l , the
charges fur the Iflterrupt cal l wi!1 look similar to �
thiS
12-1 530P INTERRUPT C'-
3 1 45551212 00 1.00
The121is Decer1.iJer Filet of 'tHe CUllcnt vear. -
5:30P :s the tllne 'ile Cdl: WdS InC.(j,' to the .::
opelator requesting an !I:errupl IN TtRRUPT CI
'.?
IS whdt took pl�!ce , that I". illi II1t81111pt (i!! 314
5551212 IS tile number Ihiuested OC,ta!l(;" i,;,
Operator dSslsted, Daytlr!lc rill the 1 IS tiw
26tH) Page II
D ECEMBE R'S
Switch-Hoole Dialing
Dear 2600 :
A f t e r r E c e n t l y [ f'Cl ci i n g s o m e o l d
tcx t f ! l f�s o n sWitch hook d i a l i n g , I 've
h e e n t r V l n q t o p r a c t i c e m y s p e e d .
SW l lc h - 1 100k d l a i l lHJ comes I n hi mdy
w l l ( � n yo u j l l s ! Iw ppe ll to be a t a p h o n e
l l ) a t i l Cl S d d i d ! lock o r some other
device r e ,; t r I C ! 1 1 1 �l d i a l i n g . I ca n now
sW l te l l hooi' d i d l 0 11 a l most a ny phone
h il t w l lt! l ) i tr Y t u d o I t on a payphone, I t
h imi l y P V t " works prope r l y Why I S
t l ) I S }
J S
D a l las, TX
Ti , t ( l ) I l o n A In d We s r e r n
t / 1' (' ( fi e /1 I g T /) , 1 Y/J h n f ) e h a s il
fl lt.'f e u r ,; " ,vile!.: I f ) II The wa y ti llS
work s IS :. VI II'Il [hi' I inuk S Witch IS ,11 .I f )
d/ !yli' d sl I l,/11 h<l// flf lIIercury rolls
!lOW!! of llo I Viil (.'l ln/dOs If you were 10
! afll,lly riC'1!! ess flit.' ,c'- lv/lch hook {)n a
fhl ,P,' !()l lI' 11 " ul / /d take Iltne for Ihe
hall (It men'{HY I() ! nil hack and forth
! i l ll S 1/I ,' [ i I ! h !l IlJ ' h I' f ll l l l n g of y o ur
di d /lilY !I i /! l il l i e I I ta k e s fO f t h e
IIlt 'fC{If Y l u 1/)<11: " O f iJl t!aA ('untilct CiJn
he /unij Iu d/lfledr thil t you are
Iha /III!] d ilt 'W (/"jlt vVh y , /0 / Ja Y phones
have tlies/? merCUf Y S Villches In the
first (i /ill l: ) liVe d S S l1 n )f' ,(s beca use
tl l tT tend til hI' ! I Iore durab le B y the
WilY the IJI'st Wil Y to riefeat (J (hal luck IS
to ,'.'Implv carry ,) touch (one pad (also
knovvf) as , / ' "wi llie iJux ')
Pen Registers
Dear 2600 :
I w a s w o n d e r i n g I f I t w o u l d b e
pOSS i b l e fnr y o u to h a ve a I l sl l 1lg o f a l l
t h e 2600 s u pp o r t B B S s a ro u nd t h e
co u n t r y ! I f u r (m e w o u l d be e xt r e m e l y
I n t f � r p s tp d , d l 1rl i n l S L i f e t h e r e d r e m a ny
otiw r s o u t t h e ft' i : k(; I n e
i i so . Ill y s e h o u l 1 1 a s d
'
reg u l a t i on
'
pen rp�l l s t f� r 0 1.1 a l l t h P l f i lil e s . I il m
c u r r P I1 t l v t r V m q t o (J d l l l a ny i n fo r m a t i o n
f r o rn 1 1 1 1 1 d t I c a l l B u t fo r 11 0W, I n eed to
k n ow 1 f t I ii, I , ; I S a IlY w a y of deterlTl l ll l nq
Pagt.· 1 2 261W
I f you have a pen reg i ster on you r l i n e ,
S t r a n g e t h lll gs h a v e b e e n h a ppe n lll g
o n my I lI1 e , a nd I was wonde r i n g if
there I S a ny s u re way of te l l i ng if you r
l ill e I S b e l llg mon i tored or ta pped by
g o o d o l d M a B e l l . A n y h e l p o r
suggest ions wou ld be a ppreciated .
Norman Bates
First off, we ha ve two bulletin boards
online at 9 1 4 - 725 -4060 and9 1 4 -234 -
3260 and qUite a few others that have
expressed interest in becomllJg 2600
b u lle tlfl b o a r ds. We Will a n n o u n c e
their numbers when the time comes.
Some p e op le c la im the y can t e ll
when there 's a pen register on their
I/lle hy healing strange clicks or tones.
In Sorllt! cases tIllS may very well be
t r U f.' b u t c e r t a l f ) l y n o t in a ll. For
e x a mp le, s o m e o n e c o u ld p lug In a
RadiO Shack pen register anywhere on
your Ime and it would n o t make an y
strange nOises over tile phone. The
phone compan y I tself IS one of the
easier culprtts to track down. If the y
have a pen register o n your Ime, you
can o ft e n fm d (J u t h y h e friendlng
s o m e o n e I n the s Wl t c h r o o rn . It 's a
S i m p l e m a t t e r o f a s k i n g a n y
acqua!f)tances you have there whether
or n o t t h e r e IS s o m e th ing s trange
attached to your Ime. When the phone
compan y does If legally, the y 're often
reqUired to tell you at some pOin t. The
harder culprtts are those that are dOing
I t o u t S i d e t h e l a w w h e r e t h e
posslblltties are almost endless. A s
m i c r o w a v e a n d s a t e l l i t e h a c k in g
becomes more commonplace, it 's likely
t h a t p a s s i v e e a v e s dr opp ing W i ll
increase. Smce no direct contact With a
p a r t i c ular line I S n e cessary, this
method is completely untraceable. A nd
naturally, you won 'l hear an y telltale
cltcks on your Ime
Evil Happenings
Dea r 2600 :
T h e r e rea l l y I S a b i g "brot h e r " . They
a r e t h e C F R . a n d t h e T r i l a t e r a l
LEITERS
Com m i ss i o n . The i r goa l a one wor l d
government a n d a one wor l d money
system Computers wi l l play a key role.
Th is i s why the crackdown on hack i ng
a nd b i l lboa rds IS o n .
Paia J ones
Thanks for this interesting bit of
news
Canadian Questions
Dear 2600 :
I th i n k you have a g reat m a g . I s t here
a store that I can go to ever ' rnonth to
buy you r mag I n Ca nada I Do YOll kn o'N
a Canad i a n add ress where I can get
hacking software for the Commodore
64 or an I B M clone? I wou ld l i ke bot h ,
m o s t l i k e l y c o m m u n i c a t i o n a n d
deprotect lon u t l l Ities.
PG
Toronto
We don 't ha ve any distributor in
Canada so you word find us in any
stores. As far as software, since we
really don 't handle that kind of thing we
suggest puttlfJg a free ad m the 2600
M a rk e tp la c e or ask ing around on
bulletin boards.
Speaking of stores, here are the ones
you can find us in in New York City:
Apostrophes Books, 660 Amsterdam
A v e n u e, C o lis e u m B o o k s, ' 7 7 I
B r o a dw a y; S o h o Z a t. 3 0 7 We s )
Broadway, Hudson News -Kiosk, 753
Broadway, Spring Street Books, 1 69
Spring Street. Papyrus Books, 29 1 5
Broadwa y; St. Mark 's Bookshop, 1 3
St. Mark Street; Shakespeare Books,
2 2 5 9 B r o a d w a y , B . D a l t o n ' s
B ooksellers, 396 6th A ven ue, and
College Stationery, 295 1 Broadway
The Truth Revealed
Dear 2600:
What's the d i fference betwee n Box
99 and Box 7527
Chesh ire Cata lyst
Besides being on separate ends of
the post office with 652 other boxe:,
b e t w e e n t h e m, t h e r e is a v e r
fundamental difference: Box 752 IS to:
subscription mformation and Box 99 I.)
for editorial sU/Jmissions and letters
You pla yed it safe by sending your
letter to both boxes. This is a reply to
the le t t e r s e n t to the proper box,
namely Box 99 The other letter was
sent to the wro/'g box and. as a result.
was ripped to sl 'reds "lnd burned.
Ingenious SOlution
Dear 2600 :
I may have fou nd the sol ution to the
prob lem of not be i n g able to store
issues of 2600 s i nce you went to the
" booklet" for m a t . If you take a p l astic
d i s kette holder such a s the ones pre­
p u n c hed to fit i n to the sma l l 3 - r i n g
notebooks, y o u wi l l see t h a t 2600 IS
J u st a l itt le too b i g to f i t i nSide the
pocket d e s i g n e d for the d i s k e t t e .
However, take a blow dryer a n d heat
the p lastic i nsert. When it IS fa irly
wa rm, grab each side a nd stretch the
i nsert ! Now, 2600 wi l l fit neatly i n S ide
the pocket a n d c a n be put in the 3 - r i ng
notebook. A whole yea r wi l l f i t n i ce l y i n
6 plastic i n serts a nd now the notebook
ca n be placed in you r bookshelf a long
with you r other classic books ! These
(milI illued (ill paKe 1())
2600 December. 1987 Page U
HACKING IBM'S(COIlliI/lied IW i l l paK£' 7)
return after entering the access mode, and wait
for the enter password response.
Every disk password along with every user's
password and other information is contained in
the CP D irectory. If the password is "ALL" then a
password is not required for any user so you wdl
not be asked for one. You will then receive a
ready message indicating that the transaction
has just been completed.
I f you receive the message: "BU BBA 19 1' NOT
L I N KED; NO READ PASSWORD", then within
the CP Directory, there IS no read password at all.
This means that the only way you can gain
access to BUBBA's directory would be by getting
his logon password. One note-I believe that a
user's logon password cannot be any of his
access mode passwords. The reasons for this are
obvious. If BU BBA wants JOE to access a disk ,
then h e can give JOE the corresponding disk
password. I f this was ident ical to his logon
password then JOE could logon as BUBBA and
access all of BUBBA's disks with no problem,
and at the same t ime possess all of the privs that
BU BBA has. Within the CP directory, If there IS
no password entry for read access then there are
no entries for write or multi I f there is no entry for
write then there may or may 110t be an ently for
read, but definitely not one for mult i . And finally,
if there is no entry for multi then there may or
may not be entries for read and write
The methods for o b t a i n i n g d i s k access
passwords are the same as anything else.
Common sense and " P assword Psychology"
come IIltO account along with the element of
luck.
Assume the userid is VMTEST and you are
hacking the READ password. Passwords may be:
RVMTEST, RVM , RTEST , RTESTVM . Others
m a y b e R E A D , R E A D V M , V M R E A D ,
R EADTEST, TESTREA D , and even VMTEST. Of
course it could be something like J2*ZS. Many
t imes the same password w i l l be used for R , W,
and M access Instead o f t h ree separate
passwords.
CP keeps track of unsuccessful LI NK attempts
due to invalid passwords. When you exceed the
maximum n u m ber of I n correct password
attempts, which usually defaults to 1 0, the link
command Will be disabled for the remainder of
Page 1 � December. 1 9117 261)0
your stay on the system. All you have to do is
re-Iogon and you will have ful l use of LINK again.
I f the LOGON /AUTOLOG/ L I N K joumaling
facility is activated, unsuccessful link attempts
due to the above are recorded. When the
threshold is reached the userid whose password
you are trying to hack is sent a message.
Therefore, keep track of the number of attempts
you make and keep just short of the system
threshold
After successfully linking to a user's disk, you
must issue the ACCESS command in order to get
a directory listing or access any f iles on that disk.
This is accomplished by
.ACCESS VADDR2 B
VADDR2 IS the address after ' AS" in your link
cornrna.ld l ine, and "B" is the Idemode letter
which you wish to access the disk as. This can be
anything but the letters which you have already
assigned up to a total of 26 (A-Z)
AIter accessing the disk to your heart's
content, you can then RELEASE it. When you
logo f l , the disk IS automat i c a l l y re lease d .
Releasing the disk is n o t necessary unless you
already are attached to 26 minldisks, and you
want to access more. You would then release
whatever disks you wish and link to access
others. After releasulg a disk , to re-access it you
do not have to issue another link command but
merely the ACCess command and what filemode
you Wish it to be.
The Q U ERY DASD command will list the
minidisks that most everyone on the system has
access to. All of these may or may not be
automatically accessed upon logon For this
reason, you should issue i t . Then all you have to
do is ACCess the virtual address and define the
filemode.
.0 DASD
DASD 1 90 3380 SYSRES RIO 32 Cn
DASD 1 9 1 3380 SYSR ES R IW 1 cn
DASo 1 92 3380 SYSRES RIO 2 Cn
DASD 1 93 3380 SYSRES RIO 1 9 Cn
DASD 1 94 3380 SYSRES RIO 21 cn
DASD 1 9E 3380 SYSRES RIO 27 cn
VM/CMS-PART TWO
I n our Q SEARCH l ist, we have access to 19 0
as the system disk, 19 1 as our A disk, 19 2as our
D disk, 19 E as the system's Y disk . Both 19 3 and
19 4 are accessible but have not been accessed
by us. Thus:
.ACC 1 93 B
B ( 1 93) RIO
Now the 19 3 disk is our B disk and accessible
by us. We can perfonn the same procedure lor the
19 4 disk .
DlRMAINT
The D irectory Maintenance utility can be
found on some system s . I I it is runn i n g .
D I R M A I N T shou l d b e a v a l i d user i d . The
D I RMAINT userid is automatically initialized
when the system is started up. It remains in
"disconnected" mode awai t i n g t ransact ions
which contain directory maintenance commands.
I I you come across a system with D I RMA I NT,
it will provide you with all the inlonnation you
need to know about it. A lew commands are
important, at least to the hacker:
MOPW: This displays access passwords lor one
or all 01 that userid's minidisks.
.DlRM MOPW
OVHDlR005R ENTER CURRENT CP PASSWORD TO
VALIDATE COMMAND OR A NULL TO EXIT:
R; T-=0. 1 210. 1 5 1 9:33:34
DVHMDF30 1 1 MINIDISK 1 9 1 : RBUBBA
WBUBBA MBUBBA
DVHMOF30 1 1 MINIDISK 1 92: RBUBPW
BONEHEAD MULTIBUB
The reason you must enter the user's logon
password is obvious. II someone walks up to a
user's tenninal and wants to know what the guy's
disk passwords are all he would have to do is
enter this command and he would get them,
except lor the lact that it does ask lor the user's
logon password . thus protect ing the d i sk
passwords.
Help: Get more info on D I RM commands.
PW: This changes a user's logon password.
PW?: Find out how long it was since the user
changed his logon password.
MDlSK: Change access mode, change. add, or
delete passwords.
LINK: Cause an automatic link. at logon, to
another user's mlnidisk.
FOR: Enter a D I RMaint command lor another user
il authorized.
Things You Want
Things you want are: more valid userid's to try
passwords on, actual logon passwords, and disk
access passwords. Obtaining userid's can be
accomplished by using the Q NAMES command
every t ime you logon. Obtaining logon passwords
isn't as simple. There are a couple 01 places that
you will want to explore.
The AUTOLOG1 or AUTOGP virtual machines
(userid's) usually auto-logon other userid's. Now ,
in order to d o t h i s they must have those users'
passwords. These are contained within various
EXECs within their user directory . II you can
o b t a i n a v a l i d d i s k access p assword lor
whichever one 01 these is running on your
particular system , you can get more passwords
and possibly some disk access passwords lor
about 10 other userid's. This should allow you to
get more disk access passwords and hopefully
more logon passwords. Nevertheless, having
obtained a few more passwords. and not using
them unti l the original one you hClcked dies, will
greatly extend your stay Gn the system .
EXEC files lrom any user 1l1ay contain more
disk access passwords for other users and those
users directories may contain EXECs which have
more passwords, and so on. 01 course many
other types of files may contain this type of
infonnation.
The CP directory-this is similar to a big
bullseye on a target . This directory, as previously
explained. contains users' passwords, various
system inlonnat ion, and minidisk passwords.
T h e d i r e c t o ry u s u a l l y g o e s u n d e r t h e
filename/filetype 0 1 USER D I R ECT I t can be "2
anywhere on the system, and can have a different �.
name, which in my view would add to system �
security. I t is usually found in either or both of �
two users' directories which I leave to you to find _
(sorry ) . This is a very big weakness In CMS due
to the fact that if you can lind what userid the :::
directory is in, and its disk access password, �
you've got the system by the balls. Tile file may :2
2600 December, 1 9117 Page 1 5
HACKING VM/CMS
-;: also have a filetype of I N D EX which is a
� compi lation or sorting of pert inent infonnation
? used for speeding up various procedures the
.� system carries out constantly. A typical entry in
f the USER D I RECT file would look like
:::...
� USER BUBBA BUBAPASS I M 3M BG
....-.
S· VMUOI OOO
§ ACCOUNT 1 0 1 SYSPROG
� VMUO I O I O
IPL CMS
VMUOI 020
CONSOLE ODD 32 1 5
VMUOI 030
SPOOL DOC 2540 READER *
VMUOI 040
SPOOL ODD 2540 PUNCH
*
VMUOI 050
SPOOL ODE 1 403 A
VMUOI 060
LINK MAINT 1 90 1 90 RR
VMUO I 070
LINK MAINT 1 90 1 90 RR
VMUOI 080
LINK MAINT 1 9E 1 9E RR
VMUO I 090
MDiSK 1 9 1 3350 1 52 003 VMPKO I MR RBUBBA
WBUBBA MBUBBA
MDiSK 1 92 3350 1 52 003 VMPKO I MR RBUBPW
BONEHEAD MULTIBUB
VMUO I I OO
*
The first l ine gives the userid of BU BBA .
password BU BAPASS, 1 and 3 Megs o f virtual
memory, and Privilege Classes B and G. The next
l ine gives the account nUlllber and department or
owner of the account . The next few lines define
miscel laneous system infomlation. Next. three
I)age I II December. I 'JI17 260(1
l ines of what disks should be automatically
linked to upon logon. And finally the minidisk
( M D I S K ) virtual addresses and corresponding
passwords.
Conclusion
As usual , there is always more I could add to
an art icle l ike this one. I did riot want to keep
writing part after part so I wrote a "complete"
article on H acking VM /CMS . I apologize for the
length but I wanted to mention everything you
needed to become famil iar with the operating
system and its security/insecurity. I intentionally
"forgot" to mention various bits of infonnation
w h i c h wou l d put sen s i t ive and destru c t i v e
infonnation in the hands o f anyone who reads
thiS art icle. The infonnation within this article
can and will be different from system to system
so don't take anything too literally. This article is
comprised of 80% i n format ion from actual
system use. 10% eMS help files, and 10% from
various CMS documentation. I may write a
followup art icle of shorter length as more people
become famil iar with CMS.
DECEMBER 'S LETTERS
i n s e r t s c a n be p u r c h a s e d a t m a n y
;;::; off ice supply stores, d i scou nt centers,
-= and department stores. I a m enclos i ng
s: a sample i n sert for you to try out. Heat,
::- stretc h , a n d store ! How is that for
2 "a lternat ive technology"?
i Sgt. Pepper of Texas
::s We 're gla d to s e e some of o u r
.§ readers working imaginatively t o solve
� this problem of storage. Perhaps the
-:: fo lks at Readers Digest would b e
interested as well.
How Do Inmates Do It?
Dea r 2600:
G ot a couple of n ewspaper c l ippi ngs
for you . What I 'd l i ke to know is how the
cou nty j a i l i nm ates got ahold of a l l
those long d i stance codes. I J u st ca n 't
p i c t u r e a n A p p l e I I w i t h a u t od i a l
modem attack i ng a d i a l - u p node from a
ja i l ce l l .
The H ooded C law
They didn 't need one. A /I they need is
human contact with the outside world
( ((J i l l illul:'J (ill pUJil' :!:!)
BL V facts
(( Olllil1l1cd ImllI I){I,!!,C I I )
length o f the call ( 111 minutes), and the 1 00 IS the
charge for the Interrupt. The format may be
d i f feren t , depending upon your area and
telephone company
Verification seems to be on a closed network,
only acceSSible by the TSPS . However, there
have been claims of people doing BLV's with blue
boxes. I don't know how to accornpllsh BLV
without the assistance of all operator, nor do I
know If It can be done. But hopefully this article
11as helped people understand how em operator
does Busy Line Venflcalion and Ernergency
I nterrupts.
social interaction
with phones
by Dave Taylor
An interesting thing has been happening to O U I
telephones throughOilt the worlrJ --they've bee!1
t rclll s i t i o n i n g froll) belll Q Zl person 1 0 person
communications deVice to being a lul!-bloWJl
Information provider
ConSider, Without leaVing illy eilair I can ,lot
only cal l up people I know ( the easy part) but I
can also track down people by deal ing With
I llfoimation (obtaining their addresses as wel l <1:;
their phone Ilumbers) , get stock quotes, Iny
horoscope, the racing results, summaries of the
latest instal lments of varrous popular tel"V!SIl)I;
serres [Jut , mucll illore Interestlng!y cal' act ua!ly
meet new people too.
The phone has been exter'," ',_' to tv; the
lI l t llllate III safe SOCial Il1te,ac t l�,n sv::t'�I1lS---­
With the rallYing cry of "profit tb" ; hene
company and the FCC has been l i c enSing '10' ,ust
976 numbers, but also IS now offerrng 900
service With a vengeance
1 976 numbers, for those that don't know, are :1
speC i a l c l ass o f phone numbers leased t o
Individuals for Just about any legal purpose. Tile
person call ing IS charged tYPically a connect cost
(usual ly about S1 75) and then a per�millute
charge too Tile phone company pockets a
Significant percent age of this revenue. and the
owner of thf' sr:fvice gets the rest /1, gOO
number I S s l m : 1ilr to an 800 nUITlber ( P . g . tne , u i i
free phone number area code l but the cal ler :s
charged a flat S 50 per cal l to access I t . The
numbers operate throughou t tile cont inental U S
and t h e person who owns the equipment pockets
5 cents for each call placed I
S omew h a t S U p l : S ::l �l l y t tl O lHl h I
England and France a while back and I
that they're catching on tl lere tool Thten.
colorful adverts all over tile Tube I i i I
advertiSing a teel! party IllIe, for exan :p'"
What's also IIlterestlng tilat not
have "call a recordirlCj' system:; (also
the name "d1al-il-porn ' due to the prl:: ;I:,1I 1 , '
that type o f recording being a�(lI!�,ii! ' I
systems where IOU can call up and
"person a ! a d " , il lso h e e F I n l sorneCli l i
( randolTlly ) , but : I s been exter-Icled to p;II ,;
l ike they had in tile early days of
A frrend of ITlIW: runs a 976 ' ch;Jj In
he leases 1 2 phOll'; I Illes from the phone
,md people cal l 1 l1u (;illl r:onnecl to ' I:) to)
people al l 111 one )1(1 C0nk': f;llce cal :
;ome bU ilt In I lln i l a iol !�, !)! ' tll[;
i aw-�- they ,1 1 i must iernl lllClTI' wltil!l ' i
connect clnd by
to gil I e
make" rt sOlind lwful )
I thlilk 1 11:1' Hw rJevelopl1lC,nt Le;
(l ilumber of li l ttel ;rlt reaS()Ils above (lI d !
tile further ut!ll/a!:Or1 of t h i telephone
IIs also an excell'mt eXiul1ple of HlP
: n s l d l o u s Ci l o w t h a ll d e Il U ' , ' ! I , , ·
-
:�, f
technology ()Il OUI ever/d:I '! ' I J(,:;
B u t most o f I I I I I r � t !l"
stalCIlIt?ll l l")i I ; Ilt� ;'...):1(11
paced SOCletv
I've sat V.'IHI rnv h"lel id �1 < r'1c ! ! �) t r;rl�� l
' r ile, or calls otlier l i nes :0 ! I,;a! Ii;)w tfltl'
and enost of ali I 'm st ruck With t ilf;  :1'
rJespa ir and lonel i l :!�ss that '11 1 the e;1 11111 ',
have. Undeilleatil tllell ilatitJ!e ( ,mit I!l(li�,:
surprising that peJple pay so mudl t o
little) I S a group of .Jeople who are
unable to succeed SOCial ly III our
I know of a womall . qU i te a t t i d '
personable, anrl flln to spend lime With. W i .! 1
used [he 976 personals recording 11Ul11tler ' ,
Illeet m,�n She's actually enjoyed
With the people she's u l t !m;lte!y ITII:t I " :, I ' i
iJl!t they a l ! S8P,rn t n va!1i�-J� vV ! l h i n a '}jj.�f�k , i t
Yet ;mother person i know C!;J III::, [ ( ;,o t
o n l y friel1d he has !I'lat i 1 P hasl1 1 ;i;[
' pllorH' conferenclng" and t hat ill' f l[lri , : .
difficu l t to make friends at par tlee, lind c,' : '
So l il (l rather ClrCLl l i ollS w;;y I SCii
(, , 'l1ll1l11l'd ( 11 1 1 1 ( '  /
26{)() December. 1 9S7 P"l:" .i i
social interaction
(, ( illill llled /'-(11 1 / !'nT/OIl I !!Ilgcj
we l e 110t seeing the usage of these new phone
selV lces ( and they are used an astounding
amount , III excess of a b i l l ion dollars wortil of
phone l evenue per year I n the U S ) as Indicat ive
of l ile gradual changes that are t l ansformlng our
cu lture and society
I II some sense, tiley're a direct paral lel to
computer bu l letrn board systems-a few years
d90 when t hey started to become popu lar a group
o f people sprung up t llat used them as their
pl llllcHY place fOI making new friends The
pal d l l els are l eal l y q U i t e stl l k l n g . (And the
CUl l en t computer confelence systems , l ike tile
U S l N ET , are an outgrow th of t hese early B BS's
IOU, wllh sli n r iar deIl10l1rClpll I CS . )
f ile ol her quest ion thelt ar ises . and I tlel leve IS
lil8 CIUX of dl f of 1 11 1 S , IS where (lid tillS clique
(1)1I 1t: fI UIII ) I s It d new group of people, tilese
; l l d t u s e l eclmo l ogy a s a vehicle f o r SOC ial
I l l tcr acl lo n , 01 IS I I a nalul el i OU tglOWtll of ot hel
I delOI s 7
M y SI:SP I C I Oll I S t h a t Its all Ullsurpl lslIlg resu l t
uf t ile CXpelilS IOll o f med ia and t he consequen l
,t l cngt ilel1 1119 of t he Illedla s periec t per son
T il e t;X p e c Ll t l o ll s I II s o c i e t y l ea l l y h a v e
1'lldllCJed qU i t e dr dmat lca l ly III t ile last few yeals
I Il(; l lcve (l I te Illust el tllel tJC p a l t of t ile popu lal
( u l l l l ! " ( I� 11 I ll(; so c dl leet Ined l a stel (�.Jtypes ) 01
I l l e y W i l l I l d v e a d i f f i c u l t t l ill e s u c ceed l ll (j
,(li i d i l y
;, ". C l iVI: Bdl kt;r ( d l l ec t o l O f t ile Ilew f l llll
ti t'lll,i/SCI ) ,dy� III tile IlldCJd2 1 ne S lgM cillO
:;, llIlIel I d 111111<'1 cll a r d e l (:1 III t i le lll lQ l llil l has
: ) (; e l , I U l f l e r! I l l t O t il l: s " c o n d l e a cl I I I t il e
dlidp l , l  IOII ,Jl ILi poi lsiled l!fJ (lS a Illo r e or less
I lJl1V(�l l I l tlllal l1t: I O l lle I I l i ked t ile lact t h a t I II t he
' I u v e i l d I l le (j I l l was a t o t a l l o:;el You call l ive
W l t ll StlilleOI1C l ike t lla t fOI t ile lell g t h of a novella
YULI CUI t fOI d 1110V le
What eXdc t ly IS t il l S say lllC) abOu l OlJl c u l t u l e 7
I ve s t l ayed d il l t o f f t ile bea t en path but I
,vtlll l lj De 1 110St I l l t er est ed l ll ilearr ng about otller
p t: l l jJ l e S l lliJ lI g il t s a ll t il l S e S fJ e c l a l l y t h o s e
ilu t s l cte of tile U i l i ted S t d t (:S
Ronlan /fackers
TlIf' fo!loWlIlfj ,lltlcle IS dliotlJcr III ci seues of
1 ' '1;1 , ,:. 1 tdle, u ( IJdcklllfj dnd pIJledk,llfj
IJy Hal from Rome
I IldVt: seell t l l a t sOllle! l i j1P'� you g i ve space to
I'a gl' I X I h'(" lllher. I IJX 7
foreign contributors, so I hope to tel l you some
things that could be Interest ing
In Europe we sti l l have t he pulse dial system
a n d 111 I t a l y we p r o b a b l y h a v e the o l de st
telephone system in Europe I n my COUlltry w e
make every effort to be compared with th e rest o f
the worl d . So even i f we do have a ba d telephone
organization, we miraculously have a lot of
serv ices and our fantasies make up for the faults
of the Govemmen t .
W e h a v e s u c cessf u l l y c r e a t e d a g o o d
organ izat ion of people who use a modem and
through thiS orgallization we successfully hack a
lot of t hings.
F i rst of a l l , dS descrrbed rn the M ay 19 87
I ssue , we learned how to easily cal l free from the
pilone booths. f llSt uSing a l ittle tool ( an electric
wire) and then Without any toolS-Simply by
h a n g i n g t h e h a n d s e t up q U i c k l y , t h ereby
' uil lockl llg ' the l i lle fOI cal l ing everywhere
U nfortullately OUI company locked a l i of the
booths III J u ly so we're t rying to find another
way
We ale also able to use "black boxes" when
receiving a cal l If someone cal l s , you can SW itch
on tillS elec t l lc box cOllnected to t he I rne, 11ft up
t he lecel ver and talk w h i le the phone is st i l i
I l ll g l llg ' 1 11 thiS case the person who has cal l ed
you doesn t pay clily t h l llg because tillS box makes
t ile telepllolle exchange bel ieve that you dJdn t
1 1 f t t ile l ecelver So tile exchange bel ieves the
t e l e p t1 0 ll e I II y o u r Il o u s e IS s t i l i l i n g l n g l
S Olllct lilies you lTlay have to p u t up W i t h a l igh t
I l lig while you t a l k On local cdl ls you can talk
dS long do you wan t because the phones call ling
fOl evel O ll ext l a local" c a l l s ( w e cal l them
. extra u l ban ca l ls ) , the l ine Will be cut after
t hree millutes and you W i l t have to dial agarn
Hacking via Modem
We also have a network for long dlstallce calls
v i a modelTl Whi le t rle U nited States has Telene1 .
Tymnet , etc , we fortuna tely have only one
n e t w o l k tl e c a u s e t h e t e l e p h o n e sys t em I S
con t rol led b y t ile Government 0 1.11 network I S
cal led ITA PAC and , a s you can IImglne once
you �et 3 passwol d to lise It you '.'all ca l l all of the
lJ l gges t COll iputel s III tile wOl ld i. B I X , D I A LOG ,
C O M P U S E RVE etc ) alld oil l y spenrJ money for a
l ucal ca l l
W e Ilave :,�Vt;1 el l uf t hese PdSSWOI d s and w e re
q U i t e sUle t iley won t chelnge soull lJecause t hey
(, I '/II/I I/I< d ( II / ! '<ig< , _'I I )
Z600 marketplace
8 0 3 8 C H I P W I T H S P E C S H E E T ,
b lock d i a g r a m a n d p i nout-very l i m ited
q u a n . $ 1 5 .00 each postpa id, checks,
m . o . to P E L , cash, m . o . s h i pped sa me
day, checks m u st c l e a r . Pete G , P . O .
Box 4 6 3 , M t . La u re l , NJ 08054.
WANTE D : Any hacker and ph reaker
software for IBM compat ible a nd H ayes
compat i b l e mode m . If you are se l l i ng or
know a nyone who is, send rep l ies to
M a r k H , P O Box 7052, Port H u ron, M I
4830 1 - 705 2 .
F O R S A L E : O k i d a t a M i c r o l l n e 9 2
persona l p r i nte r . I nc l udes m a n u a l for
i n st r u c t i o n s . H a r d l y u s e d . M a k e a n
offer a nd I f it's reasonable, I wi l l pay
postag e . Matt Kel ly, 3 1 0 Isbe l l , H owe l l ,
M 1 48843 .
TAP BAC K I S S U E S . Comp l ete set,
vo l . # 1 t o a n d i n c l u d i n g vo l . # 9 1 ,
i n c l u d i n g s c h e m a t i c s a n d s p e c i a l
reports. Copies i n good to exce l lent
cond ition . $ 50.00, no checks, i n c l udes
postage. T . G enese, 2 1 9 N. 7th Ave . ,
M t Vernon, N Y 1 0550.
DOC U M E NTAT I O N on e l ectronic and
d i g ita l switch i n g system s a nd PBX's.
W i l l i n g to p u r c h a s e / t r a d e . A l s o
look i ng for other parapherna l i a such as
Be l l System Practices. Write to B i l l , c/o
2600, P O Box 752C, M idd l e I s l a nd ,
NY 1 1 95 3 .
B LU E BOX I N G ? Let 's excha nge I nfo
on phone n u m bers, pa rts, a nd etc .
Write to: B l ue Box, P . O . Box 1 1 7003,
But i i ngame, CA 940 1 1 , Attention D . C .
FOR SALE : 8038 m u lt i - pu rpose tone
generator c h i ps, p r i m e q u a l ity $ 7 . 50
e a c h p p d . I n c l u d e s c o m p r e h e n s i v e
a p p l i c a t i o n s d a t a . T w o c h i p s w i l l
generate a ny d u a l tone format. These
are no longer in prod u ct i o n . G et 'em
wh i le they last. B ruce, P . O . Box 888,
Stinson Beach, CA 94970.
S U M M E R C O N '88-com i ng to NYC .
Watch t h i s space for more i nfo.
FOR SALE : RadiO S hack C PA- lOoo
Pen R eg ister . J u s t l i ke new. $70.00.
J . C . D e v e n d o r f , 2 9 2 6 1 B u c k h a ve n ,
Lag u na N ig u e l , CA 92677- 1 6 1 8 .
FOR SALE : Ex-Be l l b l u e boxes, old and
sty l i s h , may eve n work! Also a wide
range of old B e l l comms eq u i pment.
Ca l l (5 1 4) 393- 1 840 and ask for R ick
for deta i l s .
F O R S A L E : SW f P C M od e l CT - 8 2
i nte l l igent video term i n a l . Completely
p r o g r a m m a b l e ( 1 5 0 s e p a r a t e
fu nctions), R S - 232C & para l le l pri nter
ports, fu l l ASC I I keyboa rd w/cu rsor
control pad, 9 " P- 3 1 CRT w/7x1 2 dot
matr ix-up to 92 col u m n capa b i l ity, 32
baud rates to 38.400--much more.
E x c e l l e n t c o n d i t i o n w i t h f u l l
doc u mentat i o n . O r i g i na l ly $800, sel l
for $ 1 25 o r best offer . Bern ie S p i nde l ,
1 44 W. Eagle R d . , S u ite 1 08, H averton ,
P A 1 9083 .
2600 M E ET I N G S . F r idays from 5 - 8
p m a t t h e C i t icorp Center i n the Ma rket
(lobby where the tables a re}-- 1 53 East
5 3 rd Street. N ew York C ity. Come by,
drop off a rt i c les, ask q uestions. Ca l l
5 1 6-75 1 - 2600 for more i nfo.
G OT S O M ETH I N G TO S E LL? Looki ng
for somet h i ng to buy? O r trade? T h i s is
the place ! The 2600 Marketplace is
free t o s u bs c r i b e r s ! J u s t send us
whateve r you wa nt to say (without
m a k i ng it too long ) a nd we ' l l print it!
O n ly peop le please, no busi nesses.
Add ress : 2600 M a rketplace, P.O. Box
99, M idd le I s l a nd, NY 1 1 95 3 . I n c l ude
you r address l a be l .
Deadline for Spring issue: 2 / 1 5/88.
2600 Drcember, 1 987 Page 1 9
Ranzan Hackers
(colltillued/rolll page 18)
belong to the telephone company! Strange but
true: in I taly it is easier to find passwords that
belong to the telephone company instead of
hacking private passwords. This is because our
telephone company ( cal led " S I P") doesn ' t
believe there are very many hackers and so it
doesn't care too much about keeping their
passwords secret!
Now using ITAPAC , I very often use systems
in the United States and one of my favorite ones
is an outdial system-one that you can call and
say, "OK, now dial this number in the USA." So
using this outdial l can connect to every number
via modem in the United States and I can join a
lot of BBS's nonnally not connected on the
network.
I hope this is of interest to those of you in the
United States. Please contact me on BIX (write
to "capoccia" and if you want I can give you my
password for a while so you don't have to spend
anything and so we can write to each other) or
write me a number of a BBS at which I can reach
you
In I taly, there isn't actually any law against
hackers, so you can use this infonnation as you
want. I'm not airaid at all and you can publish my
address.
Hal (from Rome)
c/o Enrico Ferrari
Via Giuseppe Valmarana 43
001 39 Roma
I taly
Phone 01 1 -39-6-81 0761
Because of existing laws in the United States
a n d because we a re a / w a ys w a ry o f
overconfidence, we have omitted any references
to specific hacking on specific systems.
More Long Distance
Unpieasantries
Recently I decided I wished to have legal
access to a long distance carrier's facilities, so I
began to gather toll-free 800 customer service
numbers to the major interexchange carriers that
served my area. A quick call to 800 DA got me
the correct number to US Sprint Customer
Service for my area ( 800531 4646), and the
correct number for A LC Comm u n i cat ions,
otherwise known as Allnet ( 800521 0297 ) . I then
called US Sprint and inquired about getting a
travelcard, or a code on one of their 950 or 800
Page 20 December, 1987 2600
access numbers. H owever, the person who
answered the telephone was insistent upon trying
to get me to sign up with US Sprint as my equal
access carrier. I didn't want Sprint as my equal
access carrier. But one of their travelcards would
cost me $1 0 a month plus charges incurred if I
didn't choose them as my Equal Access carrier. I
didn't want to have to fork over this ridiculous
charge just for a simple code which could be
hacked for free. They lost a prospective customer
by being so stubbom about getting my Equal
Access dollar (this is understandable, as Sprint
has invested a huge amount of money in their
Equal Access campaign) . Another bad point
concern i n g U S Spr i n t is the fact that its
authorization codes have been widely abused and
posted on electronic bulletin board systems,
where they are then spread to more and more
people who are potential abusers. I rarely saw an
M C I code, or an ALC code posted on a BBS , and
when I d i d , they went bad very q u i c k l y ,
especially in the case o f Allnet. This i s due to
ALC having the city name of the general area that
you called from included in their records. When
calls come from different points at the same or
close to the same time in excess, the customer
can be con tacted and t h e code changed.
Anyway, back to the pushy representative: I
hope this experience opens the eyes of any
poten t i a l U S Spr i n t customers . O h , and
incidentally, GTE, which owns U S Sprint, is a
n u c l e ar w e a p o n s c o n t r a c t o r w i t h t h e
govemment . Another bad point (see 2600,
M arch, 1 987) .
Next, I decided to t ry MCI . A quick call to 800
DA revealed their 800 customer service number
to be 8006246240 . I knew this number was
incorrect. I recognized the 624 exchange as the
o n e where Me I had a node, wh ich was
8006241 022 and has since been replaced with
another 800 number (8009501 022) that belongs
to MC I and also receives A N I (the phone number
you're call ing from) when you call it (see 2600,
July 1 987 ) . Anyway, I then decided to get
"assistance" from a local Bell TOPS operator,
who was quite friendly, and completed several
calls for me in an effort to find the right customer
service number. The TOPS called 800 DA for me
and I requested any other numbers they might
have for MC I , explaining that the number they
had was no longer valid. They gave me a number
more long distance horrors
listed as MC I Sales' , which was 8006242222 .
The TOPS (who did not disconnect) then dialed
KP FWO+8006242222 +ST III an attempt to
reach MCI Sales. This numberwas answered by a
Bel l O N I I n tercept O perator (an i ntercept
operator who didn't know the number I was
call1rlQ: I had to verbally tel l it to her) She then
told me that the new number was 8004442222 .
So, after three attempts, I finally received tile
correct number tor MCI Customer Serv ice. or so I
thought I cal led this numbel and Infonned them
of the trouble I had Irl gettlrlg the new customer
service number, and the woman who answered
the phone said she would look into It. I wandel
why AT&T was so slow In getting the new
customer service number for one of their major
competitors? U pdates to the 800 Directory are
supp osed to be han d l ed automat i cal l y , by
computer It seems that someone put a low
prrori ty UPOll this partIcular company, as I had no
problem With any of the others. Anyway, I tilell
began asking the wOlllan some general questions
about their service, and only when she asked me
my area code was I told that I needed to talk to
t h e S o u t h w e s t D i v i S i o n , reac h a b l e at
8004 441 21 2 . So, after all this hassle, I finally
called and had a chat With what sounded l ike a
J apanese- speak ing person who sounded
intox icated. I leamed several Interesting thillgS
from talking to thiS person . One such thing IS that
MCI Customer Selvice reps have access to rate
Information via a computer. They enter the
, orrglnating N PA-NXX, and the terrnillatlllg N PA·
N XX , and the computer displays rate infollllation
tor a II three rate classifications (day, evel ling,
and night/holiday) I also discovered that to get
a travelcard With MC I , you usually have to pay a
one-time fee of $1 0 30, but they had some sort of
spec ial gOing where you could get the travel card
free at this specifiC pOint rn time. I also asked
aboLJt MCI operators, assuming that they would
be Implemented shortly. The man told me they
would be there by the end of 1 987 . ThiS was all
fine and well , but i t would then take tilem 1 0- 1 4
working days to activate my service I found out
other Interest Illg thrngs about theni that I plal1 Oil
rnclLJdlng III a separate article which will be
released at a later date. Olle last bad pOi n t about
MCI -they, like GTE, are a nuclear weapons
cont ractor (see 2600. March. 1 987) , so I
decided not to deal with them
The next vai ner up was A l l lle! . or 1 11 tru til , A LC
COlllmLJl1 lcat!0I1S ( formed when A l lnet merged
With Lex ! t c l ) H owever, 800 0, dldn l have any
IIStll1g for ALC Co�n:nu i l lcdt lollS . bu t they did
have a number k" A l l net Customer Selv lce' I
called thiS IlLlll r)p,r and t l18 tele�ilCllle was
allsweled by a [it W Th,:, pe[ " oll was
velY helpful and dllswcl ed a i l ot ' f:y QI I(;:;l lons
with flO hassle 1 Inct hac ! h-) �ljrUldrge
'or thf: LJ':e of �l :i" Jei car d dilli (i!c1 flul :ry to
push I ll €) IlltO SIF I ng up with tile;1 " " my Equal
Access camer S'l III other words, I was able to
get a code 011 A l lret easily Without much hassle
From the t h r ee ear llers I sJlllp l ed , A l lnet was by
far tfle most helpl: J I I f you ale tll!rlklllg of get t ing
youl OWll tl (lVeICaf d , I wou l e! 3uggest Aline!
They are, of course, a major reselier of othel
COll1panleS' l i nes ThaI I S tD say they do not have
their own network l ike Mel 01 US S p . illt Thus
you w!11 have to Di;t up with slightly lowel
l ines, but they ell,) s t i l i IIIore tharl allequ,lte fOI
vOice and data 1 c:11SllliSSlons
When ChOOSlllCi, be sure to cOlllpare the lon)
distance services :hat are available III your arc;;
before you dec r, Ie to pick one Ask them
questions but dOll t be rude MCI III particulal
has thell custoiliel service numbers set "p III ttlel!
OWIl 800 exchall(J8 ,md calls to lills exchange
wrll receive ANI So being polite '1nrj tactful IS
adVisable when cleallllCj With !rlenl from a hOllle
telephone .
Also keep In ITllnd that ille ClistDmer service
numbers listed here are for !ny area code You will
have to get your own number s for youI area code
If you Wish to enCJlneer th{;se companies
O n e l a s t 11 0te rean e r s , s h a r e y o u r
experiences I O n l y through a n I ll t e i l i gent
COInrnUlllcatlons forum l i ke 2600 call we Inform
each other and the general publ ic of the good/bad
aspects of telephol18 systems here and abroad.
SOME N U M BE R S
1 00 4 1 - 1 -700·777·7777 ALLNET
conference line in NY·-- $1 a minute
1 0220· 1 700 · 6 1 1 · 6 1 1 6 Western U n ion
Help Line
, ·800 - 988·0000 Western U n ion
Long D istance Customer Service
1 - 800· 988-4726 Western U n ion
Telegram Operator
260() I)ec�rnber, 1 9X7 Page 2 1
(( ( !lIlilllll'li jrulll /)(Jgc 16) D ECEM B ER 'S LEITE RS
G u a rds can pre vent vis itors from
brmgmg in kmves and guns, but so far
they 've been unable to keep people
from recitlf7g numbers. Someone could
also easily set up a voice mailbox to
read out this month 's Sprint codes. A ll
an inmate has to do IS call that number
and write down the codes. But isn 't it
true that all calls from a prison have to
be collecr? That 's no problem -Simply
mak e th e first part o f the voic e
m essage s a y "Sure, I ' ll accep t " or
something slfnilar.
BBS Thoughts
Dear 2600 :
F i rst off, I 'd l i ke to comp l l fnent you on
yo u r magaz i n e I t rea l l y shows how
l i t t l e t h e a v e r a g e p e r s o n k n ows o f
what 's happe n i ng I n ou r techno wor l d .
Second ly, I s a w you r com ment a bo u t
wa n t i ng to s e t u p a network o f safe
B B S ' s . J u st In t l rne - I was t h i n k i ng
abo ut re-ope n l ng m i ne, yet abhor t h e
t h o u g h t of r u n n i ng a p i rate BBS aga i n
( a s I n softwa re hack i n g ) . I 'd love t o r u n
a "2600 a uthor ized B B S " . I wou ld be
r u n n i ng on an Am lga 1 CXlO, 3 ' /L I nch
d r ive, a nd 300/ 1 200 B PS . It wou l d be
24 hou rs a day. I ' m st i l i l ook i n g for t h e
r i g h t software to r u n , b u t a n y that I
c h o o s e w o u l d e a S i l y m e e t y o u r
req u I rements
P . A . Z .
We ha ve some additIOnal reqUire ­
ments that we can go o ver with you at a
future date. We expect to start addmg
n e w b o a rds sometim e in Jan u a r y.
A n yone e ls e wh o 's Interested in
running a 2600 board should contact
us
The Missing Chip
Dear 2600:
As p e r t h e " :ost " 8038 c h i p for trle
b o x p l a n s I C L 8 0 3 8 p r e c I s i o n
w a v e f o r m g e n e r a t o r vo l t a g e c o n t
o s c i l l a t o r , m a d e by I n t e r s l i - n ow
G E R C A a n d a v a i l a b l e f r o m t h e
, COIll ITlOn " ' d l s t l l bu tors I n most c i t ies
Page .2 2 DccclIIllI'r, I 'IX7 26()()
( I e A r row E l e c t r o n i c s , S c h we b e r
E l e c t r o n i c s , H a m l i t o n / A v n e t
E lectron ics) or to the " hobbiest " from
Ja meco E lectron ics, 1 355 S horeway
Road, B e l mont, CA 94002, (4 1 5 ) 592-
8 0 9 7 , F A X 4 1 5 - 5 9 2 - 2 5 0 3 , T e l e x
1 76043 ( lC L8038CCJ D $ 3 .95 w/ $ 20
m i n i m u m order)
Yet Another Telco Ripoff
Dea r 2600:
H a ve you ever bee n ta l k i n g on a
payphone a n d had you r time r u n out?
F i rst the phone col lects you r money
a n d t h e n t h e n ice m a n asks you to
d e p O S i t a n i c k e l f o r a n o t h e r f i v e
m i n utes. You reach I n to you r pocket
and a l l you h a ve IS a q u a rter. You
depOS i t yo u r q u a rter a nd a re left a lone
for o n l y a nother five m i n utes ! It seems
q U ite u nfa i r that no m atter what you
depOS i t is t reated a s a n icke l . I ca n
u n d e r s t a n d t h a t u n d e r p r i m i t i v e
centra I off i ce equ i pment the phone J u st
ch ecks to see If t h e re I S a co i n g rou n d .
B u t today s i nce most b i g cit ies h a ve a
m ajor ity of the i r ce n t r a l off ices cut ove r
to ESS, why ca n ' t someone at the
phone compa ny mod ify t h e i r SWitches
to a ccept d i mes a s d i mes and q u a rters
a s q u a rters7
Mary M ,
Cornland, Iowa
Wh y in de e d ? L e t ' s h e a r s o m e
"explanations " for thiS one from the
folks on the InSide. If We don 't get a
s a t is fa c t o r y a n s wer, y o u ma y b e
looking at next years project to combat
consumer fraud.
The correct address
to send a letter
or to forward an article
IS:
2600 Editorial Dept.
P. O. Box 99
Middle Island, N Y 1 1 953
Attention Readers!
2600 is a lways looking for i nformation that we can pass on
to you . Whether it is a n a rticle, data, or a n i nteresting news
item-if you have someth i ng to offer, send it to u s !
Remember, much of 2600
is written by YOU, our readers.
N01E: WE WIll.. ONLY PRINT A BY·UNE IF SPEClFlCALl..Y RE.GX.IES1ED.
Ca l l our office or BBS to arrange a n upload. Send US ma i l to
2600 Ed itorial Dept.
Box 99
M iddle I sland, NY 1 1 953-0099
( 5 1 6) 75 1 -2600
The Telecom Security Group
SECU R ITY PERSON N EL: H ackers play a role i n violat i ng
YOUR com puter's secur ity.
LET OUR TEAM PUT YOUR FEARS TO REST
with our complete "system penetration"
services. We'll also keep you up to date
on what hackers know about yOU .
CALL OR WRITE FOR MORE INFORMA TION.
The Telecom Security Group Office: 91 4-564-04J7
366 Washington Street Fax: 91 4-564-5332
Newburgh, NY 1 2550 Telex: 70-3848
2600 December. 1987 Page B
CONTENTS
IMPORTANT NEWS... . . . . . .. . . . .. .. 3
IBM'S VM/CMS SYSTEM. .. 4
TELECOM INFORMER. . . . .. . .
. 8
BLV. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . _ . .... .. . 1 0
LETTERS............ .
........................ 1 2
SOCIAL INTERACTION . . . 1 7
ROMAN HACKING. . . . . . . . .. .. 1 8
2600 MARKETPLACE. . . . . . .
.. 1 9
L.D. HORROR TALES. . . . . . . . .
.. 20
2600 Magazine
PO Box 752
M iddle Island, NY 1 1 953 U SA.
Forwarding and Address Correction Requested
WARNING:
MISSING LABel
SECONO CLASS POSTA GE
Permll Pendln9 �t
E iI,t Selluke-t. N Y.
1 1 733
ISSN 014�38S'

More Related Content

Similar to 2600 v04 n12 (december 1987)

Shared Coursework in Cyber Security Instructions Manual .docx
Shared Coursework in Cyber Security Instructions Manual .docxShared Coursework in Cyber Security Instructions Manual .docx
Shared Coursework in Cyber Security Instructions Manual .docx
edgar6wallace88877
 

Similar to 2600 v04 n12 (december 1987) (20)

Installing JVM
Installing JVMInstalling JVM
Installing JVM
 
Bgnet a4 2
Bgnet a4 2Bgnet a4 2
Bgnet a4 2
 
25. Phylogenetics trees with ModestRr and bold (Version ModestR 6.5 or higher)
25. Phylogenetics trees with ModestRr and bold (Version ModestR 6.5 or higher)25. Phylogenetics trees with ModestRr and bold (Version ModestR 6.5 or higher)
25. Phylogenetics trees with ModestRr and bold (Version ModestR 6.5 or higher)
 
02 linux desktop usage
02 linux desktop usage02 linux desktop usage
02 linux desktop usage
 
The linux-guide
The linux-guideThe linux-guide
The linux-guide
 
2600 v02 n10 (october 1985)
2600 v02 n10 (october 1985)2600 v02 n10 (october 1985)
2600 v02 n10 (october 1985)
 
Shared Coursework in Cyber Security Instructions Manual .docx
Shared Coursework in Cyber Security Instructions Manual .docxShared Coursework in Cyber Security Instructions Manual .docx
Shared Coursework in Cyber Security Instructions Manual .docx
 
A basic unix overview(2)
A basic unix overview(2)A basic unix overview(2)
A basic unix overview(2)
 
11 unix osx_commands
11 unix osx_commands11 unix osx_commands
11 unix osx_commands
 
Linux bible
Linux bibleLinux bible
Linux bible
 
A Newbie’s Initiation To Linux
A Newbie’s Initiation To LinuxA Newbie’s Initiation To Linux
A Newbie’s Initiation To Linux
 
Troubleshooting: The Two Laws - IXIASOFT User Conference 2016
Troubleshooting: The Two Laws - IXIASOFT User Conference 2016Troubleshooting: The Two Laws - IXIASOFT User Conference 2016
Troubleshooting: The Two Laws - IXIASOFT User Conference 2016
 
Linuxs1
Linuxs1Linuxs1
Linuxs1
 
#SydPHP - The Magic of Redis
#SydPHP - The Magic of Redis#SydPHP - The Magic of Redis
#SydPHP - The Magic of Redis
 
1 the linux-guide
1 the linux-guide1 the linux-guide
1 the linux-guide
 
Iniciación a linux
Iniciación a linuxIniciación a linux
Iniciación a linux
 
Te xworks manual
Te xworks manualTe xworks manual
Te xworks manual
 
Samba
SambaSamba
Samba
 
Log mikrotik.0
Log mikrotik.0Log mikrotik.0
Log mikrotik.0
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

More from Felipe Prado

More from Felipe Prado (20)

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
 

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Recently uploaded (20)

Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 

2600 v04 n12 (december 1987)

  • 1.
  • 2. STAFFBOX Editor and Publisher Eric Corley 110 Office Manager Bobby Arwatt Production Mike DeVoursney Writers: John Drake, Paul Estev, Mr. French, Emmanuel Goldstein, Chester Holmes, Lex Luthor, Phantom Phreaker, Bill from RNOC, David Ruderman, Bernie S., Mike Salerno, Silent Switchman, Mike Yuhas, and the usual anonymous bunch. Cartoonists: Dan Holder, Mike Marshall. Reader: John Kew. Editor Emeritus l::'H 260() ( I. S ()7·/'J-385I ) 1.1 l'lIl>li.lh,.d /"",,/Id, /" .!M)(II.II/( 'I",(I III, . 7 ./f<)lIg:- 11111l". .'/Oll/'U. } 11733. .£ (()lld (/a. l'o.llIgc 1'( nJllf II('Iuit",!!. of S('taUh('1. (' } or/.. I'OS I :1.S I FI{: Scnd addrc" chan�c, III _'f>()(). P.O. Bll' 752. 1,ddk hl,lIld. :i II'IS.1.{)752. Cllr1n�hl I'IX7. 2/l(XI I nl errr"c, Inc i earl ,uh'LT'rtrlln: I .S. and ('"nada ::, IS IIldl Idual. ::,-l() Cmrmalc. (hL'r�L'a, S�:=; lIldl H.luaL �)) corpurate Back ",ue, ,l,,!Iahk 1m I'iX-l. I'IXS. I'iX/l al �2S per ear. S.'U pcr car mer,ca, . .DDI{ESS .1.1. SI8S(I{II'IH)' (OI{I{ES"O'DF'(F TO: _'IJII(J Suh,crrr1,"n Dcrt.. I'.D. Bll' 752. llddk 1,lan,1. :i 11'1).'-07)2. HlI{ UT I FI{S .'D .1{ 11<1.1-: Sl B'IISSIO'S. I{I! FlO: .!()(I()I dnlllrall>crt.. P.O. Bn.' '1'1. 1Jddlc .!/')(I(J Oillee I 'Ill' ) 1(1-/)1·2(�XI BBS ::IIOSI :i I 'i1-l-12)-4(1(�1 BBS ::2 I l "1 : IJ{ 1 OIIICI I 'JI-l-2.Q-.'2hO ISI:1 I llIJJ{1 SS 2NX�ud;I,,I.1 I(I' J{I'.:I I 1>1 JJ{ISS. phl,',b,,,1 '2(�X)u nlll Page 2 December. 19117 260()
  • 3. Important News A number oj circumstances have Jorced us to make some changes in the way 2600 is published. As oj /988, we will become a quarterly publication imtead oj a monthly publication. We've been printing 2600 under the "new "Jormat Jor a year now. And one thing we can't help but notice is that it:5 Jrightfully expensive. We adopted this Jormat so that we could pre�'ent longer articles and al�'O become a little more visible. And we have succeeded in both oj these ambitions. Ilowever, if we were to continue at this pace, we would run out oj Junds entirely. The 5/5 we charge Jor an individual subscription is actually less than what it costs to produce one issue Jor a year. This is why we charge more to th(He that can afJord more, namely corporations and large organizations where the magazine is passed around to many people. And this is why we continue to �'ell back issues. By providing alternate sources oj income, we are able to continue to keep the magazine going at a low cost. By raising the price to cover the casts oj printing, mailing, and running an oJJice, we could easily put the magazine out oj the reach oj mmt oj our suh.5criben. We've seen publications smaller and less inJormative than oun with annual price�' oj over $/OO! We don't want to take that road. By reducing the amount oj times we publish during the year (at the same time increasing the .5ize oj each issue slightly), we can keep the price down, keep ounelves out oj Jinancial problems, and hopeJully give ourselves more time to make each issue mean a little more. Ihis bring�' us to the time Jactor. We put a !!,reat deal oj time into putfing out the magazine. But 26()0 is more than just a magazine. We're constantly tryin!!, to educate the populace on the u'es and abus'es oj technolo!!.}'. We're told that a. a result oj our campaign to abolish the touch tone fee in .Vew l'ork, a bill may be introduc{ Ii in the slate le!!,islature proposing just that. Our growing bulletin board network will do much to ensure Jreedom oj speech Jor all computer users. And, oj coune, we want to make sure that people see and hear about this magazine and our organization, either by getting maximwlI exposure ill the media or by getting international distribution. A t our current Jren::ied pace, we just don't have the time to adequate(v pursue these goak At a more relaxed pace, we Jeel we'll be better able to put out a quality publication :lnd make it more memorable overall. Vatural/y, we don't expect everyone to agree with our conc/us;oll.5. IJ you Jeel strongly negative about this change or about anything el5e, we'll certainly give you a reJund Jor the balance oJ your subscription We hope, though, that you '/I stick. il out at least to the Jirst issue oj our quarterly Jormat to see if we live up to your expectatioll.5. Our spring issue will be mailed on or around ,Hareh 15, 1988. Subsequent mailing date' are scheduled Jor June /5. .'eptember 15, and December 15. Your expiration date will he adjusted in the Jollowing manner: January, Fehruary, and .Harch will end with the .5pring is.ue; April, ,tay, and Jw;e-sununer; Ju(v, A ugust, and Septemher-Jall; and October, .Vovemher, and December-1vinter. A number oj subscribers have complained about their issues arriving late or sometimes not at all. It appean we must become militant in convincing the po.'j oJJice to do their job. IJ you do not get an issue within a week. oj when we �'end it out, you should call us and call your pm! oJJice. Usually it is the post oJJic(' on the reeeil·in!!. end thaI i. at fault. A , alwajl.. we welcome vour !('t'libuek on what H : e re doing. We hope (hi, ('lianlte results ;n a betler publication and a llronger Twenty Six Hundred. 2600 December, 19117 Page J
  • 4. HACKING IBM'S by Lex Luthor and The Legion 01 Hackers Command Interpretation Chart: The following chart shows some VM/CMS commands with their equivalent UNIX and VA X /VMS commands. This will allow those readers who are familiar with other operating systems to quickly reference the CMS counterparts. VAXIVMS UNIX INOCOMMAND 'NONE' SHOW USERS wtIO DIRECTORY II VM/CMS � NOIPL .Il0<1l !olin "'" QUERY NAMES onli.. _Iiltilll lISTFILE or FILELIST II10w cumnl dir. TYPE Iii..... cat hilnlml TYPE m... Itypo 1m lilt or viIW lila EDIT M or v. or IX XEOIT &yIIIm MilOI' DELETE iii. rlOllMl Ii.... ERASE m... I1J1IIIm ..... hla PHONE user write user TEll _ill user c:ornnIIIIiaIion Control Y C�I·1IaI:ksI1Ih Hrink u.. HX Corresponding fties SYSUAFOAT IETCIPASSWO USER DIRECT U..lisI /1_ inlormltion MAILIXT USR/MAlll user USERID NOTE ElodnInic ..ilhla LOGIN.COM .PROFILE PROFILE EXEC U.. ..in COIII1IMd lila Local Commands: Local commands are written for an individual system, and customized to suit a facility's needs (These commands are execs which are either not available from IBM or are cheaper to write on your own.) I will mention a few which may be found on other systems, as these are rather common. WHOIS This command gives a little information about any user that you specify who IS on the system. This IS similar to the UNIX command "finger". .WHOIS MAINT BACKUP MAILER BUBBA RELAY VMUTIL U...d MAINT BACKUP MAILER 6UBBA RELAY VMUTIL SYSPASS REAOPW WRITEPW N... SysIIm M.i_ ACCIIIIftt VM SysIIm IautI nI R-V MlChi.. BITNET 1m. Node M.il Procasilll MlChi.. Buillll B. __P..........I..1yII Exlroldillliro BITNET 1_ Chit fKility VM Ut.lililion SlJtislics I'agl' .. Decemhl'r. 19K7 16()() In most cases, the only way to change a user's password is by having the system operator or someone with high privileges do it. This is one reason why many passwords remain the same for long periods of time. These programs allow users to change their logon password (SYSPASS), read access minidisk password (READPW), and write access minidisk password (WRITEPW). You may find these or similar programs on some systems. Privileged Commands As tar as I know, there is no command to determine which privilege class the userid you are using is. The only way to find out is to check in the CP Directory. The tollowing are some privileged commands and what privilege class is needed to run them. From what I've seen, the system keeps no records of tailed attempts at running privileged commands. Successful uses of these commands are most likely recorded, either In a log or by sending a message to the system console or both, especially when using FORCE. FORCE userid (Class A) This command will forcibly log off the userid you specify. I really can see no reason other than to be a total idiot for abusing this command. DISABLE raddr (Dr) all (Class A Dr B) This is used to prevent specific terminals or all terminals from logging onto the system. Again, there is no real reason to use this or most other privileged commands unless you want to be kicked off of the machine. If you do DISABLE a terminal, simply use ENABLE to repair the damage. DETACH raaladdr (FROM) whalaver (Class B) This is used to detach real devices from the system. These can be terminals, printers, disk packs, tape drives, etc. You must know the real address of the device, and "whatever" can be the system name, or a userid. WARNING userid (or) operator Dr all (Class A Dr B)
  • 5. VM/CMS-PART TWO Waming will send a priority message to a user, operator, or all users on the system. It will interrupt anything they happen to be doing. Obviously sending a msg to all users stating they are BONEHEADS is not recommended. Minidisks A minidisk is a subdivision of consecutive cylinders on a real DASD volume. The real DASD device is the actual disk the information is stored on. This can be compared to a hard drive for an IBM PC. Before the drive can be used, it must be formatted. Once formatted, it is divided up into directories called minidisks. Minidisks are measured in cylinders, which are the standard memory storage units. There can be many minidisks on a DASD. Associated with each CMS disk, is a file directory, which contains an entry for every CMS file on the disk. A minidisk can be defined for R/W or R/O (read/write or read/only) access. It can also be used for storage of files. Each minidisk has a virtual address which can be from 001 -5FF (hexadecimal) in basic control mode, and 001 -FFF in ECMODE (Extended Control Mode). CMS minidisks are commonly accessed by a letter of the alphabet (A-Z). For example, let's assume we are logged onto a VM/CMS system under the userid of JOE. We want to see what minidisks we have access to. We use the auERY SEARCH command to determine which disks we are ATIACHed to. .Q SEARCH JOEOOI JOE002 CMSI90 CMSI9E 191 192 190 19E A D S YIS RIW RIO RIO RIO Each minidisk has a volume name, virtual address, filemode, and access mode. The A disk is the default. Most accounts you gain access with will have an A disk with a virtual address of 1 91 . The S disk is the System disk. This contains the files and programs for running the system. The same goes for the Y disk. The D disk is another disk used by JOE. You can view what each of these directories , contains by issuing the LlSTFILE command. .lISTF BUBBA MISC PROFILE NOTE WHATEVER EXEC AI AI AO This is a list of files on the A disk. The first column is the filename, the second is the filetype, and the third is the filemode. Filenames can be anything you specify. Filetypes can also be anything you specify, but commonly follow a pattem which tells what type of file it is. Filemodes are comprised of a filemode letter (A-Z) and a filemode number (0-6). Filenames can contain the following characters: A-Z, 0-9, $, #, +, -, :. Here is an explanation of common filetypes: FilBIype Description DATA Data lor programs or simply TYPE-able text. EXEC User written programs or IBM procedures written in REXX. HELP System HELP files. HELPCMS System HElP files. LANGUAGE One of the languages that the system supports. such as ASSEMBLE. COBOL. FORTRAN. JCL. REXX. PlI. SNOBALL. BINARY. etc. LISTING Program source code listings LOADLIB Loading library MAClIB Macro library MODULE System commands NETlOG Contains a list of all files which have been SENT to other users. NOTE Similar to E-MAIL on othar systems. a nota sent from another user. SOURCE SOURCE code for various programs. TEXT Text file. Probably used lor programs and when TYPEd yields little. TXTLIB Text library WHATEVER A nonstandard filetype which will problbly be somewhat descriptive of its contents. XEDIT A file which was crated using the XEDIT utility. Both filenames and filetypes must not exceed eight characters in length. Filemodes Filemode numbers are classified as tollows: Filemode 0: There is little file security on VM/CMS. This may be due to the fact tlla! directory security is very good. A file with a mode (cr '111 illued Oil lleXI paKe) 26UU December, 987 I'age:;
  • 6. HACKING IBM'S 7' of zero makes that file invisible to other users ¥ unless they have Read/Write access to that disk. ;- When you LIN K to someone's disk in Read/Only .� mode and get a directory listing, files with a t mode of 0 will not be listed. =:... Filemode 1 : This is the default fdemode. When reading or writing files, you do not have to ..:-. specify this fdemode number (unless you want to) since it will default to it .:, Filemode 2: This is basically the same as a fdemode of 1 . It is mainly assigned to files which � are shared by users who link to a common diSk, like the system disk. Filamoda 3: Be careful when you see thesel These are automatically erased after they have been read. If a file with a mode of 3 is printed or read it will be erased Blindly reading files without paying attention to the filemode numbers can shorten your stay on a system. The main reason for this filemode is so the files or programs that are unimportant or have one-time use can be automatically deleted to keep disk space and maintenance to a minimum. Filemoda 4: This is used for files that simulate OS data sets. They are created by OS macros in programs running in CMS. I have not found any files with this filemode, so for the time being, you should not be concemed with it. Filamoda 5: This is basically the same as filemode 1 . It is different in that it's used for groups of files or programs. It makes it easier for deleting a number of files that a user wants to keep for a certain period of time. You could just enter: ERASE • • A5. Now all files on the A disk with a filemode of 5 will be deleted. Filamoda 6: Files with this mode are re-written back to disk in the same place which is called "update-in-place". I have no idea why this would be specified, and have not found any files with a filemode of 6. Filamode 7-9: These are reserved for IBM use. Accessing Information Looking back at our Q SEARCH listing, let's see what is on the D disk: .LlSTF * * 0 N01MUCH ONHERE 01 Page 6 December, 1987 2600 In this case, the D disk only contains one file called N OTMUCH with a filetype of ON HERE. But do not forget the fact that you only have Read/Only access to the D minidisk! So there may or may not be merely one file on the D disk. Remember all filemodes of 0 (which in this case would be DO) are invisible to anyone who does not possess Read/Write access. Y ou can access any disk that you are ATIACHed to by replacing the 0 in the above example with the filemode letter (A-Z) you want to access. As was shown previously, the QUERY SEARCH command will give you a list of minidisks that your userid is attached to upon logging in. These command statements are usually found in your PROFILE EXEC. So you can access a few minidisks. Theremay be hundreds on the system. Unlike UN IX and VMS, and most other operating systems for that matter. you cannot issue a command and some wiIdcard characters to view the contents of every user's directory. In order to access another users' directory (minidisk) you must have the following 1 ) The USERID of the person whose disk you wish to acce!;s; 2) The virtual address(es) (CUU) that the USERID owns; 3) The Read, Write, or Multi disk access password. depending on which access mode you wish to use. This would be accomplished by the following: .LlNK TO BUBBA 19 1 AS 555 RR Entar READ link password: ************************* HHHHHHHHHHHHHHHHHHHHHHHHH SSSSSSSSSSSSSSSSSSSSSSSSS .RBUBBA R; 1=0.01/0.111 21:58:48 .ACCESS 555 B R; 1=0.01/0.01 21:59;03 .0 SEARCH JOEOOI BUBOOI JOE002 CMS190 CMS19E 191 555 192 190 19E A B o S Y/S RIW RIO RIO RIO RIO
  • 7. VM/CMS-PART TWO .LlSTF * * 8 MISCFILE PROFILE .REl555 OATA EXEC R: T= 0 01 / 0 0 1 22 0 2 01 81 81 Now an explanation of the events which have just occurred. The L I N K command is used to access other users' mlnidisks. The format is .LlNK ITO) USERIO VADDR I lAS) VADDR2 IMODE) IIPASS=)pASSWORD) BU BBA is the USERID whose disk we wish to access. VADDR1 IS a virtual address which belongs to the BU BBA usend. If BU BBA was to access our minidisk whose userid is JOE, he could access either our 19 1 address or our 19 2 address. The 19 0 and 19E addresses are usually automatically accessed by nearly all the users of the system since it contains system commands. We are assuming that BU BBA indeed has a minldisk with the virtual address of 19 1 Some usend's may not have any or they may have addresses which are somewhat obscure, say of 13A or 503. The only way we would be able to access those assuming BU BBA did not give them to us would be to guess them This wou!,d be rather difficult, lime-consuming !lild dangerous as we will soon see VADDR2 is any address which is not clliTemly In our control ( i .e., III our 0 Search which would be 19 0 , 19 1, 192, 19E) and is i n the range of 001 to 5FF in Basic Control or FFF III Extended Contro l . In this example, we chose to use 555. We could have easily used 1 0 4, 33F, 5FA , etc. MODE is the access mode which consists of up to 2 letters. The first letter specifies the pnmary access mode. The second letter is optional and designates the alternate access mode. If the pnmary mode IS not available, the alternate IS used The access mode we used was RR Val id access modes are R: Pnmary Read/Only access This IS the default. You can opt to not specify an access mode when linking to a user's diSk, and this is the mode which IS used. it will only work If no other links are In effect. RR: This allows read access no maller what links are in effect to that user's disk W: Primary Write access. This is only good if no other links are in effect. WR: If Write is available then ttle link will be made. If not it will gG La Read. M: Primary Multiple access. MR: Resorts to Re<:d if Multi is unavailable. MW: This guarantees write access 110 matter what. If another user has write access to one of your disks whenyou log on your access will be forced to Read/Only. For thL; reason, you should have read access to other disks instead of write. If you wish to see what files have a filernode of zero, then l ink with write access, view, or access those files, then RELEASE the disk and re access it via read to avo i d suspic i o n by Hldl user of unauthorized individlElls gaining write access to his files. I f a user has write access to a disk, you cannot gain write access unless you use a mode of MW. It is not recommenderl to have write access to another's disk if they themselves have write access. CMS cannot guarantee the Integnty of the data on a disk which has mom tilan one person l inked to it with w,ile access Now!f you see that the user is in a d!sronnected (DSC) state through the 0 N AMES rommanrl then I t shouldn't b e 3 problem i f you also have write access since the person is not actIve. I f that person reconnects, however, then it is advisable to RELEASE that disk as soon as possible to avoid any chance of d"ta being destroyed. PASS=PASSWORD. Like the logon password, It can be a 1-8 character string that must match the access mode passworrl for the VADDR1 of the userid which you are attempting to gain access :::' to. Up to three access mode passwords can exist for each mlnidisk-R, W, and M. I f the inst a l lation uses the Password � Suppression Facility, ail INVALID FORMAT � message will be issued when YOII dttempt to - enter the passworrl for a disk on tll(; '�:�lle line ' that the LINK C0r11mand was entered on ':2 O bVIOusly thiS I S to prevent peop le f, om � "spoofing" the password oil the screen or frn;!l printouts found in the tr,'sh. I f this occurs, Ilist nit 2600 December. 1987 Page 7
  • 8. the telecom informer I I ()ue ,uddenl" iOlgotten hO to Ihe lthtOll1 t-.IIlill!c !edttHe" the 11l1'" ,II Suuthc,ern Bell h<lc a Ildlllh "..'11 ICC lIn you. It a 'peel:.d Illtc'I�I(tle !lulllhn that gives you IIlI()lllllllillil 1)[1 hOI to ll',e certain katllll" I"pll'" I lor clil w;utlllg into, 2 I"i ,Iili IUI,lIcilllg. etc."). lhe !lumher h i i,-fl,' i-,"q'i. Kcep 111 nllJl(L though, thill lli'll lIClI lllh tOI lhing cu,tOlll calling katllTc, ,11 Illlm L'Ilinpany tn l"npilll c' prohahlv all heard '1l11ietllln" !lhout thl' "Max Headroom" Illlldent III (hleagu i1 Ideo pirate ',(lllH'illl ,IIUPUlCIL'd thl' 'Igndb ot t 1 [ucili ,til til111' Ull diI !ercnt nighh, diC'N·d ill 1.[. 11"ddll"111l gcar and :ll,t�, li!!__: dt: l'lll' Fl·....1UIL', Vcl' heard ,t:, �illd,,- 1.11 thl'O!ll'" �h to 110v; it d d,)[,,:. 1""t Id lh,'cc' 'lTIll tIl agln� tklt It', Ildll·,Ji"1.hl I.'ih til ()ICrpOICl a IOl,:! ,[;[11<111 ,'!1 tile'! 111Il'l"()II;lIC link, tlie 1',',11 lrll� "III)(illlg thl'lr path. ltll�" thl' t .tpLllll lldlllght 'pcctal·lc. I!<>i !!Ltlil pc'uple- h"It,,'lc' thl' hilildit II ill C'c'1 ill' C·iIU.:.:iIt h,'Cdll'l' apparcntl" thl'rl' 1. ill) 1l..1i ,l� i)! tLI�-'liil� �Ul'il all actioll. nthl'l tllilll h;lIng ,'n, 111Ie',e,. "l' hllrc 1(l hl' ;lhle t(l �:et Ill(IC 'pc'Cilll' Inlllllll;ltlllll. It jl)(If" Iti-.c· 'llllll' lllil Iil", itill'<ld .. I,: I ,lllll Indlil!liI Bel! hilll' Illlk,',1 I"l,'c" to .... lIlih,lt Illn� dhtillln' 11.111(1 I hC11 11,'11 ,,'1 ICC. called thc j{"l'llll" I'l"lL"LlI<III Si,'1ll (tillc,n't t hill ".'lIlId il�" ,I !III,h,tcl tCrlll.') 11I1(l" 111!c'ICcll,lllgl' ldllll'l' tIl ,h,lrc ! ill ill' 1),11 [I'll (111 Ill'! II( Ilk 11l1'U'C ill](1 cledll hl,((lIIL'. (dIIlCI' tli he ilhlc to Ilh!:1111 dat,l 1111 ,'liI" tll illH! Ir,lnl P;lItiLlJ!al 1H1I!lhl'!' til tlacc tlaud nlllrc l·il,lh. l'illtlllPdtlllg l(lllg cll,tillllT l'Oll1pilllll" 1111I,t Iced thclr ncdlt IIIIIllllliltl'lll Illlll the diltaha,e nn 1I1(lllth. I kpClldll� lin thcll Illlll 1IL'l11"1 1.,', till'''' C(lIllj1illllC' clnlld thcn dl'l'l·.... ', till' .... � .... ic·!ll h� lhlll�� ;lll.t1o!2-linL'�, dn'Il.li. ''i 1'1 11,1lL" Itill' 11 lib, 'licil a, thc 111,'1. 1',Iei-,e( llltliIl'll 'l·tllk 111,,' 1"lk'.I1 tilL' 11,lll(l11,i1 ( Ul�1!1Hirlll'�ttlOlh I LJllti ( )[llrdl I kn'mlll'r, I <iX 7 !600 Associalion 01 I-aidax, Virginia havc endllr'.cd thi, ncw scrvicc ....Police hope it tecnage computer "I hi/kid" arre,[ed tor thell and interceptlllg computer data in Burlington, ('anada will help them hust a hacker !lctwork that spall, the cntire provillce of Untand. Ihc II1L"tlgatjdn started III Oetoher when Wcstinghouse Canada complained to Ilamiitoll police that illl outsider had hroken into their Privatc Branch Lxdlill1bC (PH') and hilled Illore than S 1,000 in long-dl,tallcc computer calb to thc C()lllpa Il. A Wcstinghollsc 'pOke'lllilll ,aid the youth la, "ull,elfi,h", pa",ing thc cntlv code i!llHlIlg cUI1lj1utn hackn, alound thc urld. "lie lao, u,lI1g our Cl)IllputCl ,,tcm to lhC othn com[1l1tu, ilnd hulletln hoard,," hc ,ald. Ihl' I lilaI lL'lcpl](lllL� tab could rC�lch S I (),()()O hllt Wl'stinghlllhc ha'Il't del'ldcd it it 1 ill ,cck rcstitutlon III thc courh. I'lllicc ,aid thc ol/th Ilil' w,ing il ha'il' CUlllputer, a (ol11llwdorc (>4, to Incilj., thrllugh "ophl,tIt'ated ,ccllrit'1 ,tUll'>. I he tccn" rcc'ortis ,IHlcd lile other computer ",tem, thrcc belonging to Illultl­ national Cllrporatlolh In Southern Onti110 Ierc clltL'lcd hut cn IIIlilaI cilargc, wercn't lilld hccau,c thc L"lllllpanlc, Inl'n't awarl' of thc Illtru'lons. ..11'1 ha, an!luullccd that Ih l(lng dl,t;lncc unit, l'S. Iran,mi"lo!l S,klm 11K. (l SIS), II ill drop thc surchargc lUI "9)11" c;i11s placcd h ,'u,tll!lln, II ith II I Giliing cards. lllLIitll all illng dlstancc carner, chargc sllb,LTlhn, a Icc to :tcce" "Y)()" ,ell ICC,. I'IC IOllsl, liT card cu'-,toillers paid a )()-ccnt ,ml'hargc lor cach call plaecd over the I l'I lletlork ... BcIISollth 1 ill hc the tir,t Rcgional Bcll ()peratlllg ("oillpam to tr (lilt I hat PIllillIse, to hc it ,lgllJlicallt 1ll'1 "TICl' kn()11 ii' the 111lL"lllgelll 'c'tllllik. Iill, Ilctl ol k 11111 hl ahle to hilildk;1 arict III ta,k, h Illtcrilctlng Iith Ii tclllllJ1 (It Belkoll'-dclclopcd 'PCClilll/L'li diltilha'l" .. cL"llldlng to C'O
  • 9. .faga�III[" the Intelligent :ctwork will IInprme Bell Operating Company (HOC) equipment elficiencie, in the handing ott of X()() customers to interexchange carners, enhance interexehange cOlnpetition, and cnable cu,tomer;, to easily change their interexchange carriers without changing their X(}O numbers. What this means is that cu,tomer;, won't have to change their X(}O numbcrs if they decide to ,witch long distance companies, Call handling willllllt bc limitcd to switches. Calb ill hc handlcd hj' the rcmotely located datahase and distrihutcd thnlllghout thc network.... Hritish lelecom is markcting as part of ib "advanced bw,mcss systems" a product klllln a;, QWER I Yphonc. It's a desk­ t,)P terminal 1 ith alphanumeric, Iullction and telcphone number kcys plu, lour-linc LCD. It's being dellHH1strated as a low-{;ost computer and speech terminal. Ihcy abo arc promoting I.iK lOR, a higlHccurity data cneryption unit that protcct, data agamst eavesdroppers, providc, user authcntieation, and offers a simplified ke' ma nagement ,ystel11. And of course, thnc SkyplhlllC, cnahling travclers to kecp in touch while thcy'rc in thc ,ky Iith thc rc,t of us dlll n here on the gr<lll1d. All paid lor by credit cani. of cour,e. I'llpular features on ne British le!ccom phones: tcn l1urr,!,cr memory, ;,ecrecy but ton , last-numbe,' rc:dial :JIld dual ,ignaling, plus onc ·huttol� a"c'�s, I'l network and PBX L.h.:ilitle:-..... brac! i, creating a cOlllputeri71:d database Iith a wide range of personal information about Arab residenb of the West Bank and GalLi Strip. Accordmg to a report by the Vest Bank Data Base Project, a widely respected lsral'li research in,titutc monitOring developments III the occupied terrilnrtcs, the new hrdcli M inls(n of Defense datahase :t!ll(lil'''' tll a '.:om!1uter<;•.'d clfrot-an<i-,ti':f operation" and ;1 potenli�.d "hig b',ltner" for the e�t B"nk and Ciani Str!p. I he c()mputcr. lrieh began operating ,lilT the ,ummeL IS being programmed with lI1formati()n un property. real estate, lami!) tie�, political attitude" im olvel1lent in illegal activities, licem,iIH !, c'on, pmption patterns, and oecupat'iom 01 Arab residents of the Wcst Bank and (JaiL. It is particularl) dangerous, the report says, because the 110rmal braeli I,IWS and checks and halanees governing the usc of databases do l1llt apply tu the occupied tcrritorie,. By pressing a key on a computer tcrminaL any braeli official working in the occupied te rritories will be able to gain acccss to hts of names of those Arabs who arc "positive" and those who are "hostile". I [lis information could be used to decide lhe late of their application, for anything from car licenses to travel documents. OS'UNY 2600 BBS #1 ,4 vailable 24 hours a day with a wide range of information on computers, telepholles, and hackitl;:;. CALI. l'()DAY! 914-725-4060 THE CENTRAL OFFICE A full range of telephone. radio, computer. and satellite info plus l whole lot more! 2600 BOS #2 914-234-3260 26(jIJ December, 987
  • 10. all about BL V Verification and emergency interrupts are two operator functions that have always fascinated the phone phreak wor l d. Here then is an explanation of just howit all really works. (Note: this article is written solely on the A T& T TSPS process of verification.) . Let's say Smith needs to get ahold of his friend, Jones. Jones' telephone line is busy, and Smith must talk to Jones immediately. He calls the operator, by dialing 00 for an AT&T TSPS Operator (or in some areas, 0 still gets TSPS). The operator answers, and asks if she can help him. Smith replies that he needs to Interrupt a call in progress so he can get through. He tells the operator Jones' number. After a few seconds, he is connected to Jones and they talk. The name for this process is Busy Line Verification, or BLV. BLV is the telco tenn for this process, but it has been called "Verification", "Autoverify", "Emergency Interrupt", "Break into a line", "REMOB", and others. BLV is the result of a TSPS that uses a Stored Program Control System (SPCS) called the Generic 9 program. Before the rise of TSPS In 1969, cordboard operators did the verification process. The introduction of BLV via TSPS brought about more operator security features. The Generic 9 SPCS and hardware was first installed in Tucson, Daytona, and Columbus, Ohio in 1 979. By now virtually every TSPS has the Generic 9 program. A TSPS operator does the actual verification. IfJones was in the314 Area code and Smith was in the 815 Area code, Smith would dial 00 to reach a TSPS that served him. Now, Smith, the customer, would tell the operator he needed an emergency interrupt on a given number, 31 4+555+121 2. The 815 TSPS operator who answered Smith's call cannot do the interrupt outside of her own area code, (her service area), so she would call an Inward Operator for Jones' area code, 314, with KP+314+TIC+121+ST, where TIC is an optionalTenninatingToll Center code that is necessary in some areas. Now a TSPS operator in the 314 area code would receive the 81 5 TSPS operator's call, but a lamp on the 314 operator's console would tell iler she was being reached with an Inward routing. The 815 operator then would say something along the lines of she needed an interrupt on Page 10 December, 1987 2600 31 4+555+1 212, and her customer's name was J. Smith. The 31 4 Inward (which is really a TSPS) would then dial Jones' number, in a nonnal Direct Distance Dialing (DOD) fashion. (DOD by an operator is really called 0000, for Operator Direct Distance Dialing.) If the line was not busy, then the 31 4 Inward would report this to the 81 5 TSPS, who wouId then report to the customer (Smith) that 314+555+1 21 2 was not busy and he could call as nonna!. However, if the given number (in this case, 314+555+1 21 2) was busy, then the process of an Emergency Interrupt would begin. The 31 4 Inward would seize a verification trunk (or BLV trunk) to the toll office that served the local loop of the requested number (555+1 21 2). A feature of the TSPS checks the line asked to be verified against a list of lines that should not be verified, such as radio station call-in lines, police station lines, etc. If the line number a customer gives is on this software list. then the verification cannot be done, and the operator notifies the customer. The 31 4 Inward would then press her VFY (VeriFY) key on her TSPS console, and the equipment would o u t p u l s e ( o n t o t h e B L V t r u n k ) KP+OXX+NXX+XXXX+ST. The KP signal prepares the trunk to accept MF tones, theOXX is a "screening code" to protect against trunk mismatching, the NXX is the exchange or prefix of the requested number (555), the XXXX is the last four digits of the requested number (1 212), and the ST is the STart signal which tells the verification trunk that no more MF digits follow. The screening code is there to keep a nonnal Toll Network (used in regular calls) trunk from accidentally connecting to a verification trunk. If this screening code wasn't present, and a trunk mismatch did occur, someone calling a friend in the same area code might just happen to be connected to his friend's line, and find himself in the middle of a conversation. But the verification trunk is waiting for an OXX sequence, and a nonnal call on a Toll Network trunk does not outpulse an OXX first. (Example: You live at 9 1 4 + 5 5 5 + 1 0 00 a n d wish to call 91 4+666+0000. The routing for your call would be KP+666+0000+ST. The BLV trunk cannot accept a 666 in place of the proper OXX routing,
  • 11. busy line verification and thus wou ld give the cal ler a re-order tone.) Also, note that the outpu lsing sequence onto a BLV trunk cannot contain an area code. This is the reason why if 'J customer requests an interrupt outside of his own NPA, the TSPS operator rnust cal l an I nward for the area code that can outpulse onto the proper trunk. If a TSPS in 81 5 tned to do an IIlterrupt on a trunk in 3 1 4, it would not work. ThiS proves that there IS a BLV network for each NPA. and If you somehow gained access to a BLV trunk, you could only use it for interrupts within the NPA that the trunk was located In. BLV trunks "hunf to find the correct trunks to the right C l ass 5 end office that serves the given local loop . The same outpulslng sequence is passed a long BLV trunk; until the trunk serving tile tol l otfrce that serves the given elld office is found There IS usually 0118 BLV t runk per 10,000 lines (exchange) So. if a tol l office selved tell centlal offices, that tol l office wou ld have ten BLV trunks rUllillng frolll (l TSPS site to that to!1 office. Scrambling the Audio The operator (Ill uSing the VFY key) can hear what IS going on on tile Illle ( modern, VOice, or t1 dial tone, Indicating a phone off-hook). iJut In a scrambled state A speech scramllier Circuit wlthlll the operator console generates a scrt1mb!r, on the line while the operator IS do!:,] a VFY Tilt: scrarnble IS there to keep opelator:, ;rol1ll:steI11Ilg In on people, but It is not enough to keer' Hl operator frorn being able to tel l if a converSdr,Of: modem signal, or a dial tone IS present upon the line If the operator hears a dial tone. she can only report back to the custorner that either the phone IS off-hook, or there is a problem with the line, and she can't do anything about it. ThiS speech scrambling feature IS located in the TSPS console, and not on verification trunks. I n the case of Jones and Srnlth , the 314 Inward would tel l the 815 TSPS, and the 815 TSPS would tell t he custorner. If there IS a convelsation on lille, the operator presses d key marked EMER INl (EMERgency INTerrupt) on Iler console ThiS causes the operator to be added !ilto a three way port orl the busy ililP The EMER IN r key also deactivates the speech SCIambling clleull ana aclivates an alertll19 tone that can be tleJrd by the cal led customer evelY 10 seconds. rhls tone tells the custorner that an operdtor IS on the Ilile. S o m e areas don t have the a lerti n g t Oile. however Now, the operator wouln say 'Is tillS NXX-XXXX?" where N XX-XXXX would be the prefix and suffix oj the number that the 01 iglnal c ust o m e r request r n g tile Interrupt gave the original TSPS. The customer wou ld COnll1lT1 the operator had the correct line. Then the operator would say , 'You have a cal l w<1ltlng from ( custorner Ilarne) Wil l you accept ? " This gives the customer the cI ,ance to say 'yes" and let the calling party be c'lIlllected to hll11, while the prevIous party vI'u.lld be disconnected . If the called customer says "no'. then the uperator tel ls the person WllO requested the internlpt that the cal led custornel wo(ilci 110t accept Thr O[,eralOr can Just Infon11 the lJusy ,.!.lrty tlia: ,00neo'le Ileeded to contact !'II1" or �ler, and ildve Imnliler [1allQ up. and then Intlfy the requestlllg CUSt(lIner that the 1IIIe IS free. Jr, the operator can connect tile calling party aillJ the Intem!ptp,d party Without loss of cOllllectlOri If a customer lequested an Interrupt u,JOn a line WIHlIil hiS [10lile NPA (H��Pii. 'i '�" tii, ()rlyina! ;::mswerinJ � SPS Clper .:tur V/OL:ll1 d�� tr,�: entire "/f;(:flcat;ur: p:(H:r;,(;c; T' ';C;.'-){;t :bH� The ctl:lrges ;:,1 '!ll� (;f; i' "/ area Clt least) rllil $100 l'lr �1,K':I,j tiie a:,' :1 Inte'Tjpt a phone I.'ai: 'ill YJU ell!' �f/ :hrrlligh Thel e IS an 80 cellt char �c , : you ,b� t: I� llperator to verify whetlier the pholle YOllre tryli1(j to reach '"� busy because of ,I 'iCN IiY P'OIJ!eI11 or because of aCOllVersatlofl II tilt !11!el,asnocollversatlon 011 it, there Wil l be nu charqe for the venflcatioll The Aftermath Wilen t�1e CUSlOrner who IIlltlated the emergency Interrupt gets hiS telephone bil l , the charges fur the Iflterrupt cal l wi!1 look similar to � thiS 12-1 530P INTERRUPT C'- 3 1 45551212 00 1.00 The121is Decer1.iJer Filet of 'tHe CUllcnt vear. - 5:30P :s the tllne 'ile Cdl: WdS InC.(j,' to the .:: opelator requesting an !I:errupl IN TtRRUPT CI '.? IS whdt took pl�!ce , that I". illi II1t81111pt (i!! 314 5551212 IS tile number Ihiuested OC,ta!l(;" i,;, Operator dSslsted, Daytlr!lc rill the 1 IS tiw 26tH) Page II
  • 12. D ECEMBE R'S Switch-Hoole Dialing Dear 2600 : A f t e r r E c e n t l y [ f'Cl ci i n g s o m e o l d tcx t f ! l f�s o n sWitch hook d i a l i n g , I 've h e e n t r V l n q t o p r a c t i c e m y s p e e d . SW l lc h - 1 100k d l a i l lHJ comes I n hi mdy w l l ( � n yo u j l l s ! Iw ppe ll to be a t a p h o n e l l ) a t i l Cl S d d i d ! lock o r some other device r e ,; t r I C ! 1 1 1 �l d i a l i n g . I ca n now sW l te l l hooi' d i d l 0 11 a l most a ny phone h il t w l lt! l ) i tr Y t u d o I t on a payphone, I t h imi l y P V t " works prope r l y Why I S t l ) I S } J S D a l las, TX Ti , t ( l ) I l o n A In d We s r e r n t / 1' (' ( fi e /1 I g T /) , 1 Y/J h n f ) e h a s il fl lt.'f e u r ,; " ,vile!.: I f ) II The wa y ti llS work s IS :. VI II'Il [hi' I inuk S Witch IS ,11 .I f ) d/ !yli' d sl I l,/11 h<l// flf lIIercury rolls !lOW!! of llo I Viil (.'l ln/dOs If you were 10 ! afll,lly riC'1!! ess flit.' ,c'- lv/lch hook {)n a fhl ,P,' !()l lI' 11 " ul / /d take Iltne for Ihe hall (It men'{HY I() ! nil hack and forth ! i l ll S 1/I ,' [ i I ! h !l IlJ ' h I' f ll l l l n g of y o ur di d /lilY !I i /! l il l i e I I ta k e s fO f t h e IIlt 'fC{If Y l u 1/)<11: " O f iJl t!aA ('untilct CiJn he /unij Iu d/lfledr thil t you are Iha /III!] d ilt 'W (/"jlt vVh y , /0 / Ja Y phones have tlies/? merCUf Y S Villches In the first (i /ill l: ) liVe d S S l1 n )f' ,(s beca use tl l tT tend til hI' ! I Iore durab le B y the WilY the IJI'st Wil Y to riefeat (J (hal luck IS to ,'.'Implv carry ,) touch (one pad (also knovvf) as , / ' "wi llie iJux ') Pen Registers Dear 2600 : I w a s w o n d e r i n g I f I t w o u l d b e pOSS i b l e fnr y o u to h a ve a I l sl l 1lg o f a l l t h e 2600 s u pp o r t B B S s a ro u nd t h e co u n t r y ! I f u r (m e w o u l d be e xt r e m e l y I n t f � r p s tp d , d l 1rl i n l S L i f e t h e r e d r e m a ny otiw r s o u t t h e ft' i : k(; I n e i i so . Ill y s e h o u l 1 1 a s d ' reg u l a t i on ' pen rp�l l s t f� r 0 1.1 a l l t h P l f i lil e s . I il m c u r r P I1 t l v t r V m q t o (J d l l l a ny i n fo r m a t i o n f r o rn 1 1 1 1 1 d t I c a l l B u t fo r 11 0W, I n eed to k n ow 1 f t I ii, I , ; I S a IlY w a y of deterlTl l ll l nq Pagt.· 1 2 261W I f you have a pen reg i ster on you r l i n e , S t r a n g e t h lll gs h a v e b e e n h a ppe n lll g o n my I lI1 e , a nd I was wonde r i n g if there I S a ny s u re way of te l l i ng if you r l ill e I S b e l llg mon i tored or ta pped by g o o d o l d M a B e l l . A n y h e l p o r suggest ions wou ld be a ppreciated . Norman Bates First off, we ha ve two bulletin boards online at 9 1 4 - 725 -4060 and9 1 4 -234 - 3260 and qUite a few others that have expressed interest in becomllJg 2600 b u lle tlfl b o a r ds. We Will a n n o u n c e their numbers when the time comes. Some p e op le c la im the y can t e ll when there 's a pen register on their I/lle hy healing strange clicks or tones. In Sorllt! cases tIllS may very well be t r U f.' b u t c e r t a l f ) l y n o t in a ll. For e x a mp le, s o m e o n e c o u ld p lug In a RadiO Shack pen register anywhere on your Ime and it would n o t make an y strange nOises over tile phone. The phone compan y I tself IS one of the easier culprtts to track down. If the y have a pen register o n your Ime, you can o ft e n fm d (J u t h y h e friendlng s o m e o n e I n the s Wl t c h r o o rn . It 's a S i m p l e m a t t e r o f a s k i n g a n y acqua!f)tances you have there whether or n o t t h e r e IS s o m e th ing s trange attached to your Ime. When the phone compan y does If legally, the y 're often reqUired to tell you at some pOin t. The harder culprtts are those that are dOing I t o u t S i d e t h e l a w w h e r e t h e posslblltties are almost endless. A s m i c r o w a v e a n d s a t e l l i t e h a c k in g becomes more commonplace, it 's likely t h a t p a s s i v e e a v e s dr opp ing W i ll increase. Smce no direct contact With a p a r t i c ular line I S n e cessary, this method is completely untraceable. A nd naturally, you won 'l hear an y telltale cltcks on your Ime Evil Happenings Dea r 2600 : T h e r e rea l l y I S a b i g "brot h e r " . They a r e t h e C F R . a n d t h e T r i l a t e r a l
  • 13. LEITERS Com m i ss i o n . The i r goa l a one wor l d government a n d a one wor l d money system Computers wi l l play a key role. Th is i s why the crackdown on hack i ng a nd b i l lboa rds IS o n . Paia J ones Thanks for this interesting bit of news Canadian Questions Dear 2600 : I th i n k you have a g reat m a g . I s t here a store that I can go to ever ' rnonth to buy you r mag I n Ca nada I Do YOll kn o'N a Canad i a n add ress where I can get hacking software for the Commodore 64 or an I B M clone? I wou ld l i ke bot h , m o s t l i k e l y c o m m u n i c a t i o n a n d deprotect lon u t l l Ities. PG Toronto We don 't ha ve any distributor in Canada so you word find us in any stores. As far as software, since we really don 't handle that kind of thing we suggest puttlfJg a free ad m the 2600 M a rk e tp la c e or ask ing around on bulletin boards. Speaking of stores, here are the ones you can find us in in New York City: Apostrophes Books, 660 Amsterdam A v e n u e, C o lis e u m B o o k s, ' 7 7 I B r o a dw a y; S o h o Z a t. 3 0 7 We s ) Broadway, Hudson News -Kiosk, 753 Broadway, Spring Street Books, 1 69 Spring Street. Papyrus Books, 29 1 5 Broadwa y; St. Mark 's Bookshop, 1 3 St. Mark Street; Shakespeare Books, 2 2 5 9 B r o a d w a y , B . D a l t o n ' s B ooksellers, 396 6th A ven ue, and College Stationery, 295 1 Broadway The Truth Revealed Dear 2600: What's the d i fference betwee n Box 99 and Box 7527 Chesh ire Cata lyst Besides being on separate ends of the post office with 652 other boxe:, b e t w e e n t h e m, t h e r e is a v e r fundamental difference: Box 752 IS to: subscription mformation and Box 99 I.) for editorial sU/Jmissions and letters You pla yed it safe by sending your letter to both boxes. This is a reply to the le t t e r s e n t to the proper box, namely Box 99 The other letter was sent to the wro/'g box and. as a result. was ripped to sl 'reds "lnd burned. Ingenious SOlution Dear 2600 : I may have fou nd the sol ution to the prob lem of not be i n g able to store issues of 2600 s i nce you went to the " booklet" for m a t . If you take a p l astic d i s kette holder such a s the ones pre­ p u n c hed to fit i n to the sma l l 3 - r i n g notebooks, y o u wi l l see t h a t 2600 IS J u st a l itt le too b i g to f i t i nSide the pocket d e s i g n e d for the d i s k e t t e . However, take a blow dryer a n d heat the p lastic i nsert. When it IS fa irly wa rm, grab each side a nd stretch the i nsert ! Now, 2600 wi l l fit neatly i n S ide the pocket a n d c a n be put in the 3 - r i ng notebook. A whole yea r wi l l f i t n i ce l y i n 6 plastic i n serts a nd now the notebook ca n be placed in you r bookshelf a long with you r other classic books ! These (milI illued (ill paKe 1()) 2600 December. 1987 Page U
  • 14. HACKING IBM'S(COIlliI/lied IW i l l paK£' 7) return after entering the access mode, and wait for the enter password response. Every disk password along with every user's password and other information is contained in the CP D irectory. If the password is "ALL" then a password is not required for any user so you wdl not be asked for one. You will then receive a ready message indicating that the transaction has just been completed. I f you receive the message: "BU BBA 19 1' NOT L I N KED; NO READ PASSWORD", then within the CP Directory, there IS no read password at all. This means that the only way you can gain access to BUBBA's directory would be by getting his logon password. One note-I believe that a user's logon password cannot be any of his access mode passwords. The reasons for this are obvious. If BU BBA wants JOE to access a disk , then h e can give JOE the corresponding disk password. I f this was ident ical to his logon password then JOE could logon as BUBBA and access all of BUBBA's disks with no problem, and at the same t ime possess all of the privs that BU BBA has. Within the CP directory, If there IS no password entry for read access then there are no entries for write or multi I f there is no entry for write then there may or may 110t be an ently for read, but definitely not one for mult i . And finally, if there is no entry for multi then there may or may not be entries for read and write The methods for o b t a i n i n g d i s k access passwords are the same as anything else. Common sense and " P assword Psychology" come IIltO account along with the element of luck. Assume the userid is VMTEST and you are hacking the READ password. Passwords may be: RVMTEST, RVM , RTEST , RTESTVM . Others m a y b e R E A D , R E A D V M , V M R E A D , R EADTEST, TESTREA D , and even VMTEST. Of course it could be something like J2*ZS. Many t imes the same password w i l l be used for R , W, and M access Instead o f t h ree separate passwords. CP keeps track of unsuccessful LI NK attempts due to invalid passwords. When you exceed the maximum n u m ber of I n correct password attempts, which usually defaults to 1 0, the link command Will be disabled for the remainder of Page 1 � December. 1 9117 261)0 your stay on the system. All you have to do is re-Iogon and you will have ful l use of LINK again. I f the LOGON /AUTOLOG/ L I N K joumaling facility is activated, unsuccessful link attempts due to the above are recorded. When the threshold is reached the userid whose password you are trying to hack is sent a message. Therefore, keep track of the number of attempts you make and keep just short of the system threshold After successfully linking to a user's disk, you must issue the ACCESS command in order to get a directory listing or access any f iles on that disk. This is accomplished by .ACCESS VADDR2 B VADDR2 IS the address after ' AS" in your link cornrna.ld l ine, and "B" is the Idemode letter which you wish to access the disk as. This can be anything but the letters which you have already assigned up to a total of 26 (A-Z) AIter accessing the disk to your heart's content, you can then RELEASE it. When you logo f l , the disk IS automat i c a l l y re lease d . Releasing the disk is n o t necessary unless you already are attached to 26 minldisks, and you want to access more. You would then release whatever disks you wish and link to access others. After releasulg a disk , to re-access it you do not have to issue another link command but merely the ACCess command and what filemode you Wish it to be. The Q U ERY DASD command will list the minidisks that most everyone on the system has access to. All of these may or may not be automatically accessed upon logon For this reason, you should issue i t . Then all you have to do is ACCess the virtual address and define the filemode. .0 DASD DASD 1 90 3380 SYSRES RIO 32 Cn DASD 1 9 1 3380 SYSR ES R IW 1 cn DASo 1 92 3380 SYSRES RIO 2 Cn DASD 1 93 3380 SYSRES RIO 1 9 Cn DASD 1 94 3380 SYSRES RIO 21 cn DASD 1 9E 3380 SYSRES RIO 27 cn
  • 15. VM/CMS-PART TWO I n our Q SEARCH l ist, we have access to 19 0 as the system disk, 19 1 as our A disk, 19 2as our D disk, 19 E as the system's Y disk . Both 19 3 and 19 4 are accessible but have not been accessed by us. Thus: .ACC 1 93 B B ( 1 93) RIO Now the 19 3 disk is our B disk and accessible by us. We can perfonn the same procedure lor the 19 4 disk . DlRMAINT The D irectory Maintenance utility can be found on some system s . I I it is runn i n g . D I R M A I N T shou l d b e a v a l i d user i d . The D I RMAINT userid is automatically initialized when the system is started up. It remains in "disconnected" mode awai t i n g t ransact ions which contain directory maintenance commands. I I you come across a system with D I RMA I NT, it will provide you with all the inlonnation you need to know about it. A lew commands are important, at least to the hacker: MOPW: This displays access passwords lor one or all 01 that userid's minidisks. .DlRM MOPW OVHDlR005R ENTER CURRENT CP PASSWORD TO VALIDATE COMMAND OR A NULL TO EXIT: R; T-=0. 1 210. 1 5 1 9:33:34 DVHMDF30 1 1 MINIDISK 1 9 1 : RBUBBA WBUBBA MBUBBA DVHMOF30 1 1 MINIDISK 1 92: RBUBPW BONEHEAD MULTIBUB The reason you must enter the user's logon password is obvious. II someone walks up to a user's tenninal and wants to know what the guy's disk passwords are all he would have to do is enter this command and he would get them, except lor the lact that it does ask lor the user's logon password . thus protect ing the d i sk passwords. Help: Get more info on D I RM commands. PW: This changes a user's logon password. PW?: Find out how long it was since the user changed his logon password. MDlSK: Change access mode, change. add, or delete passwords. LINK: Cause an automatic link. at logon, to another user's mlnidisk. FOR: Enter a D I RMaint command lor another user il authorized. Things You Want Things you want are: more valid userid's to try passwords on, actual logon passwords, and disk access passwords. Obtaining userid's can be accomplished by using the Q NAMES command every t ime you logon. Obtaining logon passwords isn't as simple. There are a couple 01 places that you will want to explore. The AUTOLOG1 or AUTOGP virtual machines (userid's) usually auto-logon other userid's. Now , in order to d o t h i s they must have those users' passwords. These are contained within various EXECs within their user directory . II you can o b t a i n a v a l i d d i s k access p assword lor whichever one 01 these is running on your particular system , you can get more passwords and possibly some disk access passwords lor about 10 other userid's. This should allow you to get more disk access passwords and hopefully more logon passwords. Nevertheless, having obtained a few more passwords. and not using them unti l the original one you hClcked dies, will greatly extend your stay Gn the system . EXEC files lrom any user 1l1ay contain more disk access passwords for other users and those users directories may contain EXECs which have more passwords, and so on. 01 course many other types of files may contain this type of infonnation. The CP directory-this is similar to a big bullseye on a target . This directory, as previously explained. contains users' passwords, various system inlonnat ion, and minidisk passwords. T h e d i r e c t o ry u s u a l l y g o e s u n d e r t h e filename/filetype 0 1 USER D I R ECT I t can be "2 anywhere on the system, and can have a different �. name, which in my view would add to system � security. I t is usually found in either or both of � two users' directories which I leave to you to find _ (sorry ) . This is a very big weakness In CMS due to the fact that if you can lind what userid the ::: directory is in, and its disk access password, � you've got the system by the balls. Tile file may :2 2600 December, 1 9117 Page 1 5
  • 16. HACKING VM/CMS -;: also have a filetype of I N D EX which is a � compi lation or sorting of pert inent infonnation ? used for speeding up various procedures the .� system carries out constantly. A typical entry in f the USER D I RECT file would look like :::... � USER BUBBA BUBAPASS I M 3M BG ....-. S· VMUOI OOO § ACCOUNT 1 0 1 SYSPROG � VMUO I O I O IPL CMS VMUOI 020 CONSOLE ODD 32 1 5 VMUOI 030 SPOOL DOC 2540 READER * VMUOI 040 SPOOL ODD 2540 PUNCH * VMUOI 050 SPOOL ODE 1 403 A VMUOI 060 LINK MAINT 1 90 1 90 RR VMUO I 070 LINK MAINT 1 90 1 90 RR VMUOI 080 LINK MAINT 1 9E 1 9E RR VMUO I 090 MDiSK 1 9 1 3350 1 52 003 VMPKO I MR RBUBBA WBUBBA MBUBBA MDiSK 1 92 3350 1 52 003 VMPKO I MR RBUBPW BONEHEAD MULTIBUB VMUO I I OO * The first l ine gives the userid of BU BBA . password BU BAPASS, 1 and 3 Megs o f virtual memory, and Privilege Classes B and G. The next l ine gives the account nUlllber and department or owner of the account . The next few lines define miscel laneous system infomlation. Next. three I)age I II December. I 'JI17 260(1 l ines of what disks should be automatically linked to upon logon. And finally the minidisk ( M D I S K ) virtual addresses and corresponding passwords. Conclusion As usual , there is always more I could add to an art icle l ike this one. I did riot want to keep writing part after part so I wrote a "complete" article on H acking VM /CMS . I apologize for the length but I wanted to mention everything you needed to become famil iar with the operating system and its security/insecurity. I intentionally "forgot" to mention various bits of infonnation w h i c h wou l d put sen s i t ive and destru c t i v e infonnation in the hands o f anyone who reads thiS art icle. The infonnation within this article can and will be different from system to system so don't take anything too literally. This article is comprised of 80% i n format ion from actual system use. 10% eMS help files, and 10% from various CMS documentation. I may write a followup art icle of shorter length as more people become famil iar with CMS. DECEMBER 'S LETTERS i n s e r t s c a n be p u r c h a s e d a t m a n y ;;::; off ice supply stores, d i scou nt centers, -= and department stores. I a m enclos i ng s: a sample i n sert for you to try out. Heat, ::- stretc h , a n d store ! How is that for 2 "a lternat ive technology"? i Sgt. Pepper of Texas ::s We 're gla d to s e e some of o u r .§ readers working imaginatively t o solve � this problem of storage. Perhaps the -:: fo lks at Readers Digest would b e interested as well. How Do Inmates Do It? Dea r 2600: G ot a couple of n ewspaper c l ippi ngs for you . What I 'd l i ke to know is how the cou nty j a i l i nm ates got ahold of a l l those long d i stance codes. I J u st ca n 't p i c t u r e a n A p p l e I I w i t h a u t od i a l modem attack i ng a d i a l - u p node from a ja i l ce l l . The H ooded C law They didn 't need one. A /I they need is human contact with the outside world ( ((J i l l illul:'J (ill pUJil' :!:!)
  • 17. BL V facts (( Olllil1l1cd ImllI I){I,!!,C I I ) length o f the call ( 111 minutes), and the 1 00 IS the charge for the Interrupt. The format may be d i f feren t , depending upon your area and telephone company Verification seems to be on a closed network, only acceSSible by the TSPS . However, there have been claims of people doing BLV's with blue boxes. I don't know how to accornpllsh BLV without the assistance of all operator, nor do I know If It can be done. But hopefully this article 11as helped people understand how em operator does Busy Line Venflcalion and Ernergency I nterrupts. social interaction with phones by Dave Taylor An interesting thing has been happening to O U I telephones throughOilt the worlrJ --they've bee!1 t rclll s i t i o n i n g froll) belll Q Zl person 1 0 person communications deVice to being a lul!-bloWJl Information provider ConSider, Without leaVing illy eilair I can ,lot only cal l up people I know ( the easy part) but I can also track down people by deal ing With I llfoimation (obtaining their addresses as wel l <1:; their phone Ilumbers) , get stock quotes, Iny horoscope, the racing results, summaries of the latest instal lments of varrous popular tel"V!SIl)I; serres [Jut , mucll illore Interestlng!y cal' act ua!ly meet new people too. The phone has been exter'," ',_' to tv; the lI l t llllate III safe SOCial Il1te,ac t l�,n sv::t'�I1lS---­ With the rallYing cry of "profit tb" ; hene company and the FCC has been l i c enSing '10' ,ust 976 numbers, but also IS now offerrng 900 service With a vengeance 1 976 numbers, for those that don't know, are :1 speC i a l c l ass o f phone numbers leased t o Individuals for Just about any legal purpose. Tile person call ing IS charged tYPically a connect cost (usual ly about S1 75) and then a per�millute charge too Tile phone company pockets a Significant percent age of this revenue. and the owner of thf' sr:fvice gets the rest /1, gOO number I S s l m : 1ilr to an 800 nUITlber ( P . g . tne , u i i free phone number area code l but the cal ler :s charged a flat S 50 per cal l to access I t . The numbers operate throughou t tile cont inental U S and t h e person who owns the equipment pockets 5 cents for each call placed I S omew h a t S U p l : S ::l �l l y t tl O lHl h I England and France a while back and I that they're catching on tl lere tool Thten. colorful adverts all over tile Tube I i i I advertiSing a teel! party IllIe, for exan :p'" What's also IIlterestlng tilat not have "call a recordirlCj' system:; (also the name "d1al-il-porn ' due to the prl:: ;I:,1I 1 , ' that type o f recording being a�(lI!�,ii! ' I systems where IOU can call up and "person a ! a d " , il lso h e e F I n l sorneCli l i ( randolTlly ) , but : I s been exter-Icled to p;II ,; l ike they had in tile early days of A frrend of ITlIW: runs a 976 ' ch;Jj In he leases 1 2 phOll'; I Illes from the phone ,md people cal l 1 l1u (;illl r:onnecl to ' I:) to) people al l 111 one )1(1 C0nk': f;llce cal : ;ome bU ilt In I lln i l a iol !�, !)! ' tll[; i aw-�- they ,1 1 i must iernl lllClTI' wltil!l ' i connect clnd by to gil I e make" rt sOlind lwful ) I thlilk 1 11:1' Hw rJevelopl1lC,nt Le; (l ilumber of li l ttel ;rlt reaS()Ils above (lI d ! tile further ut!ll/a!:Or1 of t h i telephone IIs also an excell'mt eXiul1ple of HlP : n s l d l o u s Ci l o w t h a ll d e Il U ' , ' ! I , , · - :�, f technology ()Il OUI ever/d:I '! ' I J(,:; B u t most o f I I I I I r � t !l" stalCIlIt?ll l l")i I ; Ilt� ;'...):1(11 paced SOCletv I've sat V.'IHI rnv h"lel id �1 < r'1c ! ! �) t r;rl�� l ' r ile, or calls otlier l i nes :0 ! I,;a! Ii;)w tfltl' and enost of ali I 'm st ruck With t ilf; :1' rJespa ir and lonel i l :!�ss that '11 1 the e;1 11111 ', have. Undeilleatil tllell ilatitJ!e ( ,mit I!l(li�,: surprising that peJple pay so mudl t o little) I S a group of .Jeople who are unable to succeed SOCial ly III our I know of a womall . qU i te a t t i d ' personable, anrl flln to spend lime With. W i .! 1 used [he 976 personals recording 11Ul11tler ' , Illeet m,�n She's actually enjoyed With the people she's u l t !m;lte!y ITII:t I " :, I ' i iJl!t they a l ! S8P,rn t n va!1i�-J� vV ! l h i n a '}jj.�f�k , i t Yet ;mother person i know C!;J III::, [ ( ;,o t o n l y friel1d he has !I'lat i 1 P hasl1 1 ;i;[ ' pllorH' conferenclng" and t hat ill' f l[lri , : . difficu l t to make friends at par tlee, lind c,' : ' So l il (l rather ClrCLl l i ollS w;;y I SCii (, , 'l1ll1l11l'd ( 11 1 1 1 ( ' / 26{)() December. 1 9S7 P"l:" .i i
  • 18. social interaction (, ( illill llled /'-(11 1 / !'nT/OIl I !!Ilgcj we l e 110t seeing the usage of these new phone selV lces ( and they are used an astounding amount , III excess of a b i l l ion dollars wortil of phone l evenue per year I n the U S ) as Indicat ive of l ile gradual changes that are t l ansformlng our cu lture and society I II some sense, tiley're a direct paral lel to computer bu l letrn board systems-a few years d90 when t hey started to become popu lar a group o f people sprung up t llat used them as their pl llllcHY place fOI making new friends The pal d l l els are l eal l y q U i t e stl l k l n g . (And the CUl l en t computer confelence systems , l ike tile U S l N ET , are an outgrow th of t hese early B BS's IOU, wllh sli n r iar deIl10l1rClpll I CS . ) f ile ol her quest ion thelt ar ises . and I tlel leve IS lil8 CIUX of dl f of 1 11 1 S , IS where (lid tillS clique (1)1I 1t: fI UIII ) I s It d new group of people, tilese ; l l d t u s e l eclmo l ogy a s a vehicle f o r SOC ial I l l tcr acl lo n , 01 IS I I a nalul el i OU tglOWtll of ot hel I delOI s 7 M y SI:SP I C I Oll I S t h a t Its all Ullsurpl lslIlg resu l t uf t ile CXpelilS IOll o f med ia and t he consequen l ,t l cngt ilel1 1119 of t he Illedla s periec t per son T il e t;X p e c Ll t l o ll s I II s o c i e t y l ea l l y h a v e 1'lldllCJed qU i t e dr dmat lca l ly III t ile last few yeals I Il(; l lcve (l I te Illust el tllel tJC p a l t of t ile popu lal ( u l l l l ! " ( I� 11 I ll(; so c dl leet Ined l a stel (�.Jtypes ) 01 I l l e y W i l l I l d v e a d i f f i c u l t t l ill e s u c ceed l ll (j ,(li i d i l y ;, ". C l iVI: Bdl kt;r ( d l l ec t o l O f t ile Ilew f l llll ti t'lll,i/SCI ) ,dy� III tile IlldCJd2 1 ne S lgM cillO :;, llIlIel I d 111111<'1 cll a r d e l (:1 III t i le lll lQ l llil l has : ) (; e l , I U l f l e r! I l l t O t il l: s " c o n d l e a cl I I I t il e dlidp l , l IOII ,Jl ILi poi lsiled l!fJ (lS a Illo r e or less I lJl1V(�l l I l tlllal l1t: I O l lle I I l i ked t ile lact t h a t I II t he ' I u v e i l d I l le (j I l l was a t o t a l l o:;el You call l ive W l t ll StlilleOI1C l ike t lla t fOI t ile lell g t h of a novella YULI CUI t fOI d 1110V le What eXdc t ly IS t il l S say lllC) abOu l OlJl c u l t u l e 7 I ve s t l ayed d il l t o f f t ile bea t en path but I ,vtlll l lj De 1 110St I l l t er est ed l ll ilearr ng about otller p t: l l jJ l e S l lliJ lI g il t s a ll t il l S e S fJ e c l a l l y t h o s e ilu t s l cte of tile U i l i ted S t d t (:S Ronlan /fackers TlIf' fo!loWlIlfj ,lltlcle IS dliotlJcr III ci seues of 1 ' '1;1 , ,:. 1 tdle, u ( IJdcklllfj dnd pIJledk,llfj IJy Hal from Rome I IldVt: seell t l l a t sOllle! l i j1P'� you g i ve space to I'a gl' I X I h'(" lllher. I IJX 7 foreign contributors, so I hope to tel l you some things that could be Interest ing In Europe we sti l l have t he pulse dial system a n d 111 I t a l y we p r o b a b l y h a v e the o l de st telephone system in Europe I n my COUlltry w e make every effort to be compared with th e rest o f the worl d . So even i f we do have a ba d telephone organization, we miraculously have a lot of serv ices and our fantasies make up for the faults of the Govemmen t . W e h a v e s u c cessf u l l y c r e a t e d a g o o d organ izat ion of people who use a modem and through thiS orgallization we successfully hack a lot of t hings. F i rst of a l l , dS descrrbed rn the M ay 19 87 I ssue , we learned how to easily cal l free from the pilone booths. f llSt uSing a l ittle tool ( an electric wire) and then Without any toolS-Simply by h a n g i n g t h e h a n d s e t up q U i c k l y , t h ereby ' uil lockl llg ' the l i lle fOI cal l ing everywhere U nfortullately OUI company locked a l i of the booths III J u ly so we're t rying to find another way We ale also able to use "black boxes" when receiving a cal l If someone cal l s , you can SW itch on tillS elec t l lc box cOllnected to t he I rne, 11ft up t he lecel ver and talk w h i le the phone is st i l i I l ll g l llg ' 1 11 thiS case the person who has cal l ed you doesn t pay clily t h l llg because tillS box makes t ile telepllolle exchange bel ieve that you dJdn t 1 1 f t t ile l ecelver So tile exchange bel ieves the t e l e p t1 0 ll e I II y o u r Il o u s e IS s t i l i l i n g l n g l S Olllct lilies you lTlay have to p u t up W i t h a l igh t I l lig while you t a l k On local cdl ls you can talk dS long do you wan t because the phones call ling fOl evel O ll ext l a local" c a l l s ( w e cal l them . extra u l ban ca l ls ) , the l ine Will be cut after t hree millutes and you W i l t have to dial agarn Hacking via Modem We also have a network for long dlstallce calls v i a modelTl Whi le t rle U nited States has Telene1 . Tymnet , etc , we fortuna tely have only one n e t w o l k tl e c a u s e t h e t e l e p h o n e sys t em I S con t rol led b y t ile Government 0 1.11 network I S cal led ITA PAC and , a s you can IImglne once you �et 3 passwol d to lise It you '.'all ca l l all of the lJ l gges t COll iputel s III tile wOl ld i. B I X , D I A LOG , C O M P U S E RVE etc ) alld oil l y spenrJ money for a l ucal ca l l W e Ilave :,�Vt;1 el l uf t hese PdSSWOI d s and w e re q U i t e sUle t iley won t chelnge soull lJecause t hey (, I '/II/I I/I< d ( II / ! '<ig< , _'I I )
  • 19. Z600 marketplace 8 0 3 8 C H I P W I T H S P E C S H E E T , b lock d i a g r a m a n d p i nout-very l i m ited q u a n . $ 1 5 .00 each postpa id, checks, m . o . to P E L , cash, m . o . s h i pped sa me day, checks m u st c l e a r . Pete G , P . O . Box 4 6 3 , M t . La u re l , NJ 08054. WANTE D : Any hacker and ph reaker software for IBM compat ible a nd H ayes compat i b l e mode m . If you are se l l i ng or know a nyone who is, send rep l ies to M a r k H , P O Box 7052, Port H u ron, M I 4830 1 - 705 2 . F O R S A L E : O k i d a t a M i c r o l l n e 9 2 persona l p r i nte r . I nc l udes m a n u a l for i n st r u c t i o n s . H a r d l y u s e d . M a k e a n offer a nd I f it's reasonable, I wi l l pay postag e . Matt Kel ly, 3 1 0 Isbe l l , H owe l l , M 1 48843 . TAP BAC K I S S U E S . Comp l ete set, vo l . # 1 t o a n d i n c l u d i n g vo l . # 9 1 , i n c l u d i n g s c h e m a t i c s a n d s p e c i a l reports. Copies i n good to exce l lent cond ition . $ 50.00, no checks, i n c l udes postage. T . G enese, 2 1 9 N. 7th Ave . , M t Vernon, N Y 1 0550. DOC U M E NTAT I O N on e l ectronic and d i g ita l switch i n g system s a nd PBX's. W i l l i n g to p u r c h a s e / t r a d e . A l s o look i ng for other parapherna l i a such as Be l l System Practices. Write to B i l l , c/o 2600, P O Box 752C, M idd l e I s l a nd , NY 1 1 95 3 . B LU E BOX I N G ? Let 's excha nge I nfo on phone n u m bers, pa rts, a nd etc . Write to: B l ue Box, P . O . Box 1 1 7003, But i i ngame, CA 940 1 1 , Attention D . C . FOR SALE : 8038 m u lt i - pu rpose tone generator c h i ps, p r i m e q u a l ity $ 7 . 50 e a c h p p d . I n c l u d e s c o m p r e h e n s i v e a p p l i c a t i o n s d a t a . T w o c h i p s w i l l generate a ny d u a l tone format. These are no longer in prod u ct i o n . G et 'em wh i le they last. B ruce, P . O . Box 888, Stinson Beach, CA 94970. S U M M E R C O N '88-com i ng to NYC . Watch t h i s space for more i nfo. FOR SALE : RadiO S hack C PA- lOoo Pen R eg ister . J u s t l i ke new. $70.00. J . C . D e v e n d o r f , 2 9 2 6 1 B u c k h a ve n , Lag u na N ig u e l , CA 92677- 1 6 1 8 . FOR SALE : Ex-Be l l b l u e boxes, old and sty l i s h , may eve n work! Also a wide range of old B e l l comms eq u i pment. Ca l l (5 1 4) 393- 1 840 and ask for R ick for deta i l s . F O R S A L E : SW f P C M od e l CT - 8 2 i nte l l igent video term i n a l . Completely p r o g r a m m a b l e ( 1 5 0 s e p a r a t e fu nctions), R S - 232C & para l le l pri nter ports, fu l l ASC I I keyboa rd w/cu rsor control pad, 9 " P- 3 1 CRT w/7x1 2 dot matr ix-up to 92 col u m n capa b i l ity, 32 baud rates to 38.400--much more. E x c e l l e n t c o n d i t i o n w i t h f u l l doc u mentat i o n . O r i g i na l ly $800, sel l for $ 1 25 o r best offer . Bern ie S p i nde l , 1 44 W. Eagle R d . , S u ite 1 08, H averton , P A 1 9083 . 2600 M E ET I N G S . F r idays from 5 - 8 p m a t t h e C i t icorp Center i n the Ma rket (lobby where the tables a re}-- 1 53 East 5 3 rd Street. N ew York C ity. Come by, drop off a rt i c les, ask q uestions. Ca l l 5 1 6-75 1 - 2600 for more i nfo. G OT S O M ETH I N G TO S E LL? Looki ng for somet h i ng to buy? O r trade? T h i s is the place ! The 2600 Marketplace is free t o s u bs c r i b e r s ! J u s t send us whateve r you wa nt to say (without m a k i ng it too long ) a nd we ' l l print it! O n ly peop le please, no busi nesses. Add ress : 2600 M a rketplace, P.O. Box 99, M idd le I s l a nd, NY 1 1 95 3 . I n c l ude you r address l a be l . Deadline for Spring issue: 2 / 1 5/88. 2600 Drcember, 1 987 Page 1 9
  • 20. Ranzan Hackers (colltillued/rolll page 18) belong to the telephone company! Strange but true: in I taly it is easier to find passwords that belong to the telephone company instead of hacking private passwords. This is because our telephone company ( cal led " S I P") doesn ' t believe there are very many hackers and so it doesn't care too much about keeping their passwords secret! Now using ITAPAC , I very often use systems in the United States and one of my favorite ones is an outdial system-one that you can call and say, "OK, now dial this number in the USA." So using this outdial l can connect to every number via modem in the United States and I can join a lot of BBS's nonnally not connected on the network. I hope this is of interest to those of you in the United States. Please contact me on BIX (write to "capoccia" and if you want I can give you my password for a while so you don't have to spend anything and so we can write to each other) or write me a number of a BBS at which I can reach you In I taly, there isn't actually any law against hackers, so you can use this infonnation as you want. I'm not airaid at all and you can publish my address. Hal (from Rome) c/o Enrico Ferrari Via Giuseppe Valmarana 43 001 39 Roma I taly Phone 01 1 -39-6-81 0761 Because of existing laws in the United States a n d because we a re a / w a ys w a ry o f overconfidence, we have omitted any references to specific hacking on specific systems. More Long Distance Unpieasantries Recently I decided I wished to have legal access to a long distance carrier's facilities, so I began to gather toll-free 800 customer service numbers to the major interexchange carriers that served my area. A quick call to 800 DA got me the correct number to US Sprint Customer Service for my area ( 800531 4646), and the correct number for A LC Comm u n i cat ions, otherwise known as Allnet ( 800521 0297 ) . I then called US Sprint and inquired about getting a travelcard, or a code on one of their 950 or 800 Page 20 December, 1987 2600 access numbers. H owever, the person who answered the telephone was insistent upon trying to get me to sign up with US Sprint as my equal access carrier. I didn't want Sprint as my equal access carrier. But one of their travelcards would cost me $1 0 a month plus charges incurred if I didn't choose them as my Equal Access carrier. I didn't want to have to fork over this ridiculous charge just for a simple code which could be hacked for free. They lost a prospective customer by being so stubbom about getting my Equal Access dollar (this is understandable, as Sprint has invested a huge amount of money in their Equal Access campaign) . Another bad point concern i n g U S Spr i n t is the fact that its authorization codes have been widely abused and posted on electronic bulletin board systems, where they are then spread to more and more people who are potential abusers. I rarely saw an M C I code, or an ALC code posted on a BBS , and when I d i d , they went bad very q u i c k l y , especially in the case o f Allnet. This i s due to ALC having the city name of the general area that you called from included in their records. When calls come from different points at the same or close to the same time in excess, the customer can be con tacted and t h e code changed. Anyway, back to the pushy representative: I hope this experience opens the eyes of any poten t i a l U S Spr i n t customers . O h , and incidentally, GTE, which owns U S Sprint, is a n u c l e ar w e a p o n s c o n t r a c t o r w i t h t h e govemment . Another bad point (see 2600, M arch, 1 987) . Next, I decided to t ry MCI . A quick call to 800 DA revealed their 800 customer service number to be 8006246240 . I knew this number was incorrect. I recognized the 624 exchange as the o n e where Me I had a node, wh ich was 8006241 022 and has since been replaced with another 800 number (8009501 022) that belongs to MC I and also receives A N I (the phone number you're call ing from) when you call it (see 2600, July 1 987 ) . Anyway, I then decided to get "assistance" from a local Bell TOPS operator, who was quite friendly, and completed several calls for me in an effort to find the right customer service number. The TOPS called 800 DA for me and I requested any other numbers they might have for MC I , explaining that the number they had was no longer valid. They gave me a number
  • 21. more long distance horrors listed as MC I Sales' , which was 8006242222 . The TOPS (who did not disconnect) then dialed KP FWO+8006242222 +ST III an attempt to reach MCI Sales. This numberwas answered by a Bel l O N I I n tercept O perator (an i ntercept operator who didn't know the number I was call1rlQ: I had to verbally tel l it to her) She then told me that the new number was 8004442222 . So, after three attempts, I finally received tile correct number tor MCI Customer Serv ice. or so I thought I cal led this numbel and Infonned them of the trouble I had Irl gettlrlg the new customer service number, and the woman who answered the phone said she would look into It. I wandel why AT&T was so slow In getting the new customer service number for one of their major competitors? U pdates to the 800 Directory are supp osed to be han d l ed automat i cal l y , by computer It seems that someone put a low prrori ty UPOll this partIcular company, as I had no problem With any of the others. Anyway, I tilell began asking the wOlllan some general questions about their service, and only when she asked me my area code was I told that I needed to talk to t h e S o u t h w e s t D i v i S i o n , reac h a b l e at 8004 441 21 2 . So, after all this hassle, I finally called and had a chat With what sounded l ike a J apanese- speak ing person who sounded intox icated. I leamed several Interesting thillgS from talking to thiS person . One such thing IS that MCI Customer Selvice reps have access to rate Information via a computer. They enter the , orrglnating N PA-NXX, and the terrnillatlllg N PA· N XX , and the computer displays rate infollllation tor a II three rate classifications (day, evel ling, and night/holiday) I also discovered that to get a travelcard With MC I , you usually have to pay a one-time fee of $1 0 30, but they had some sort of spec ial gOing where you could get the travel card free at this specifiC pOint rn time. I also asked aboLJt MCI operators, assuming that they would be Implemented shortly. The man told me they would be there by the end of 1 987 . ThiS was all fine and well , but i t would then take tilem 1 0- 1 4 working days to activate my service I found out other Interest Illg thrngs about theni that I plal1 Oil rnclLJdlng III a separate article which will be released at a later date. Olle last bad pOi n t about MCI -they, like GTE, are a nuclear weapons cont ractor (see 2600. March. 1 987) , so I decided not to deal with them The next vai ner up was A l l lle! . or 1 11 tru til , A LC COlllmLJl1 lcat!0I1S ( formed when A l lnet merged With Lex ! t c l ) H owever, 800 0, dldn l have any IIStll1g for ALC Co�n:nu i l lcdt lollS . bu t they did have a number k" A l l net Customer Selv lce' I called thiS IlLlll r)p,r and t l18 tele�ilCllle was allsweled by a [it W Th,:, pe[ " oll was velY helpful and dllswcl ed a i l ot ' f:y QI I(;:;l lons with flO hassle 1 Inct hac ! h-) �ljrUldrge 'or thf: LJ':e of �l :i" Jei car d dilli (i!c1 flul :ry to push I ll €) IlltO SIF I ng up with tile;1 " " my Equal Access camer S'l III other words, I was able to get a code 011 A l lret easily Without much hassle From the t h r ee ear llers I sJlllp l ed , A l lnet was by far tfle most helpl: J I I f you ale tll!rlklllg of get t ing youl OWll tl (lVeICaf d , I wou l e! 3uggest Aline! They are, of course, a major reselier of othel COll1panleS' l i nes ThaI I S tD say they do not have their own network l ike Mel 01 US S p . illt Thus you w!11 have to Di;t up with slightly lowel l ines, but they ell,) s t i l i IIIore tharl allequ,lte fOI vOice and data 1 c:11SllliSSlons When ChOOSlllCi, be sure to cOlllpare the lon) distance services :hat are available III your arc;; before you dec r, Ie to pick one Ask them questions but dOll t be rude MCI III particulal has thell custoiliel service numbers set "p III ttlel! OWIl 800 exchall(J8 ,md calls to lills exchange wrll receive ANI So being polite '1nrj tactful IS adVisable when cleallllCj With !rlenl from a hOllle telephone . Also keep In ITllnd that ille ClistDmer service numbers listed here are for !ny area code You will have to get your own number s for youI area code If you Wish to enCJlneer th{;se companies O n e l a s t 11 0te rean e r s , s h a r e y o u r experiences I O n l y through a n I ll t e i l i gent COInrnUlllcatlons forum l i ke 2600 call we Inform each other and the general publ ic of the good/bad aspects of telephol18 systems here and abroad. SOME N U M BE R S 1 00 4 1 - 1 -700·777·7777 ALLNET conference line in NY·-- $1 a minute 1 0220· 1 700 · 6 1 1 · 6 1 1 6 Western U n ion Help Line , ·800 - 988·0000 Western U n ion Long D istance Customer Service 1 - 800· 988-4726 Western U n ion Telegram Operator 260() I)ec�rnber, 1 9X7 Page 2 1
  • 22. (( ( !lIlilllll'li jrulll /)(Jgc 16) D ECEM B ER 'S LEITE RS G u a rds can pre vent vis itors from brmgmg in kmves and guns, but so far they 've been unable to keep people from recitlf7g numbers. Someone could also easily set up a voice mailbox to read out this month 's Sprint codes. A ll an inmate has to do IS call that number and write down the codes. But isn 't it true that all calls from a prison have to be collecr? That 's no problem -Simply mak e th e first part o f the voic e m essage s a y "Sure, I ' ll accep t " or something slfnilar. BBS Thoughts Dear 2600 : F i rst off, I 'd l i ke to comp l l fnent you on yo u r magaz i n e I t rea l l y shows how l i t t l e t h e a v e r a g e p e r s o n k n ows o f what 's happe n i ng I n ou r techno wor l d . Second ly, I s a w you r com ment a bo u t wa n t i ng to s e t u p a network o f safe B B S ' s . J u st In t l rne - I was t h i n k i ng abo ut re-ope n l ng m i ne, yet abhor t h e t h o u g h t of r u n n i ng a p i rate BBS aga i n ( a s I n softwa re hack i n g ) . I 'd love t o r u n a "2600 a uthor ized B B S " . I wou ld be r u n n i ng on an Am lga 1 CXlO, 3 ' /L I nch d r ive, a nd 300/ 1 200 B PS . It wou l d be 24 hou rs a day. I ' m st i l i l ook i n g for t h e r i g h t software to r u n , b u t a n y that I c h o o s e w o u l d e a S i l y m e e t y o u r req u I rements P . A . Z . We ha ve some additIOnal reqUire ­ ments that we can go o ver with you at a future date. We expect to start addmg n e w b o a rds sometim e in Jan u a r y. A n yone e ls e wh o 's Interested in running a 2600 board should contact us The Missing Chip Dear 2600: As p e r t h e " :ost " 8038 c h i p for trle b o x p l a n s I C L 8 0 3 8 p r e c I s i o n w a v e f o r m g e n e r a t o r vo l t a g e c o n t o s c i l l a t o r , m a d e by I n t e r s l i - n ow G E R C A a n d a v a i l a b l e f r o m t h e , COIll ITlOn " ' d l s t l l bu tors I n most c i t ies Page .2 2 DccclIIllI'r, I 'IX7 26()() ( I e A r row E l e c t r o n i c s , S c h we b e r E l e c t r o n i c s , H a m l i t o n / A v n e t E lectron ics) or to the " hobbiest " from Ja meco E lectron ics, 1 355 S horeway Road, B e l mont, CA 94002, (4 1 5 ) 592- 8 0 9 7 , F A X 4 1 5 - 5 9 2 - 2 5 0 3 , T e l e x 1 76043 ( lC L8038CCJ D $ 3 .95 w/ $ 20 m i n i m u m order) Yet Another Telco Ripoff Dea r 2600: H a ve you ever bee n ta l k i n g on a payphone a n d had you r time r u n out? F i rst the phone col lects you r money a n d t h e n t h e n ice m a n asks you to d e p O S i t a n i c k e l f o r a n o t h e r f i v e m i n utes. You reach I n to you r pocket and a l l you h a ve IS a q u a rter. You depOS i t yo u r q u a rter a nd a re left a lone for o n l y a nother five m i n utes ! It seems q U ite u nfa i r that no m atter what you depOS i t is t reated a s a n icke l . I ca n u n d e r s t a n d t h a t u n d e r p r i m i t i v e centra I off i ce equ i pment the phone J u st ch ecks to see If t h e re I S a co i n g rou n d . B u t today s i nce most b i g cit ies h a ve a m ajor ity of the i r ce n t r a l off ices cut ove r to ESS, why ca n ' t someone at the phone compa ny mod ify t h e i r SWitches to a ccept d i mes a s d i mes and q u a rters a s q u a rters7 Mary M , Cornland, Iowa Wh y in de e d ? L e t ' s h e a r s o m e "explanations " for thiS one from the folks on the InSide. If We don 't get a s a t is fa c t o r y a n s wer, y o u ma y b e looking at next years project to combat consumer fraud. The correct address to send a letter or to forward an article IS: 2600 Editorial Dept. P. O. Box 99 Middle Island, N Y 1 1 953
  • 23. Attention Readers! 2600 is a lways looking for i nformation that we can pass on to you . Whether it is a n a rticle, data, or a n i nteresting news item-if you have someth i ng to offer, send it to u s ! Remember, much of 2600 is written by YOU, our readers. N01E: WE WIll.. ONLY PRINT A BY·UNE IF SPEClFlCALl..Y RE.GX.IES1ED. Ca l l our office or BBS to arrange a n upload. Send US ma i l to 2600 Ed itorial Dept. Box 99 M iddle I sland, NY 1 1 953-0099 ( 5 1 6) 75 1 -2600 The Telecom Security Group SECU R ITY PERSON N EL: H ackers play a role i n violat i ng YOUR com puter's secur ity. LET OUR TEAM PUT YOUR FEARS TO REST with our complete "system penetration" services. We'll also keep you up to date on what hackers know about yOU . CALL OR WRITE FOR MORE INFORMA TION. The Telecom Security Group Office: 91 4-564-04J7 366 Washington Street Fax: 91 4-564-5332 Newburgh, NY 1 2550 Telex: 70-3848 2600 December. 1987 Page B
  • 24. CONTENTS IMPORTANT NEWS... . . . . . .. . . . .. .. 3 IBM'S VM/CMS SYSTEM. .. 4 TELECOM INFORMER. . . . .. . . . 8 BLV. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . _ . .... .. . 1 0 LETTERS............ . ........................ 1 2 SOCIAL INTERACTION . . . 1 7 ROMAN HACKING. . . . . . . . .. .. 1 8 2600 MARKETPLACE. . . . . . . .. 1 9 L.D. HORROR TALES. . . . . . . . . .. 20 2600 Magazine PO Box 752 M iddle Island, NY 1 1 953 U SA. Forwarding and Address Correction Requested WARNING: MISSING LABel SECONO CLASS POSTA GE Permll Pendln9 �t E iI,t Selluke-t. N Y. 1 1 733 ISSN 014�38S'