Popular Content

Showing content with the highest reputation since 07/06/2009 in all areas

  1. 6 points
    Here's the complete collection of recordings I grabbed of the Odessa 1AESS switch before the cutover. The recordings were made during late may, with the last batch (A-D recordings) made on June 2, 2017 -- days before the cutover. The most interesting recordings I found during the calls to the switch: 1AESS-A.wav - Highest quality recording/best example I have of what a normal call to the 1AESS intercept sounded like. Allows you to hear the background SIT-tone noise before recordings. 1AESS-D.wav - Highest quality recording/best example I have of what a normal call to the 1AESS supervision test sounded like. 1AESS-3.wav - Bizarre because the switch cut to busy after intercept, instead of cutting over to reorder like normal. 1AESS-11.wav - Bizarre because the call, without ring, goes to the 1AESS intercept recording for one cycle, then stops for 20 seconds, and returns the Hillsboro 4ESS '121-T!' recording. 1AESS-14.wav - Bizarre because the call, rings once, goes silent for 30 seconds, then returns the Hillsboro 4ESS '121-T!' recording. 1AESS-15.wav - Bizarre because the call, rings once, goes silent for 40 seconds, then returns a reorder. More descriptions on the other calls are available on the 1A_desc.txt file on the dropbox drive. https://www.dropbox.com/sh/xca3wwskn1mzwzt/AABJMpTS0XDL9NQQgiz4LVI4a?dl=0 Enjoy.
  2. 6 points
    Hi all, Been busy for a while and was distracted by other facets of life. Signed in today was reading some of the posts to see if anything major or interesting has happened and not much has changed as I expected (no offence). So it seems no harm there in being temporarily gone. Now as I was reading some of the posts and a reply to my "Everything is Assumed" thread I noticed I had been down rep to -6 so I checked the Binary Revolution forum index page where it has a list of where you were down repped and which it was in like each thread over a long past with no replies as to why...I in some ways don't care but was wondering has another spam bot got lose or some dumb-ass, or did I make a thread that offended some community and they say it and one of them joined and down repped me for that. Anyway I was also wondering if this had happened to anyone else as well. Thanks in advance for any replies.
  3. 5 points
    After reading your comment #4 I also got really annoyed. I agree with Berzerk on this. Correct me if I am wrong, but it seems you don't know the difference between petty theft and hacking. Here is what I consider the difference: HACKING - Taking a computer, and figuring out a way to bypass the password. Disseminating the contents of the drive to find the owner's name, address, and pictures of them to identify them. Being nice and installing programs to help them find their PC if they lose it again. VNC - (to view the system) An SSH server - (to help retrieve their files) An IP beacon - (To say when the PC is online and what the IP address is) [*]Returning the laptop to the owner. [*]Occasionally checking in on the PC to make sure the system is ok, and they didn't lose it again. (What a good citizen!!!) PETTY THEFT - Not using google to find a simple kiddie script. Being an idiot and telling everyone you are committing a crime.
  4. 4 points
    There's another number to that; 3438. If you're hitting a route that gives you g.729 (sorta ruins that catchy song), it's not a bad idea to try both a few times. Interestingly, the transcoding seems to come on after the C5 chirps; those (and sometimes some Australian sounding ring) are always clear as day. So now when I found this - I actually think I found it with radio_phreak, but when I did, I was about as excited as you can expect. But something wasn't quite right. If you do a RESPORG lookup on 3438/7, it comes back as using the MCI/0222 network. If you call the number directly terminating to the Malaysian destination (you'll find it with a bit of searching) over MCI though, it's end to end SS7. After trying a bunch of carriers with no success, the theory we wound up with is that they were re-originating via a third party country; likely Australia, to shave a few cents off termination charges. Interestingly, when you hop on a conference on that access number, it'll allow you the option to contact customer service for the company, which is based out of Denver. The route you get is _definitely_ not C5. For whatever it's worth, there was another number until semi-recently; 3439 that routed a little differently. Usually it was more likely to get a transcoded route, or other weird things - one route had 450 hertz ringback before the call went offhook quite a lot . But anyway, for whatever it's worth, during Hurricane Sandy it gave you an error recording from a Santera OCX. If I remember right, the other numbers worked fine though. One thing I've noticed is during that song they play for hold music, sometimes it likes to disconnect you in weird ways. The hold music in question passes some notes a few times that definitely sound like 2400 hertz, so I wonder if that has anything to do with it (maybe we should pay attention to the supervision status), or if it's just an apathetic operator hanging up on you. Incidentally, when the call tears down with 2600, you'll hear this curious reorder tone from the international gateway that sorta fades in and out. Based on this, I wonder if it's a type 1 EWSD: https://pastebin.com/q1dvEcVw . So this isn't exactly C5, but a while ago, I found some Axtel DMS logs on Scribd. No, seriously. You can see from there they have quite a few R2 trunks provisioned for end users: 142785363-switch-a.pdf . We were playing with this on the bridge a few months ago - something I sorta want to get into again at some point; a few people seemed pretty excited about it. There's one particular number, +52-818-114-1500 (on the AX2P42 trunk group; labeled STA_CATARINA_CALL_CENTER_PBX_R2. If you look at page 224, you'll see the trunk group type configuration for this and many others; there's a bunch of R2 trunks with generic labels) that will send a backwards 4 in MFC (780 + 1140 hertz)to the switch - indicating a network error when it messes up. Which it occasionally does. Dunno how or if these can be seized, but it seemed worth mentioning. Speaking of which, I don't have the number for this; I had the bright idea of putting it on the speed dial for a calling card and then letting it expire, but Russia has some sort of strange signaling - perhaps another R2 variant floating about in their network. This particular call I remember being to Siberia: weirdmfs.flac . A lot of their switches use whatever this is. It enables them to send vacant number conditions and such over their signaling network. All I do here besides try and hit some DTMF is whistle 2600 twice; once to seize the trunk, and another time to make the switch get all angry. The tones you hear are the standard R1 frequency set, but obviously an R1 trunk never barks MFs back at you. EDIT: Crap, I forgot about the Cuba stuff. From what I understand, Havana if no other place has a reasonably modern network of Alcatel gear. As for the fixed GSM terminals, there's some older documents on Cuban telecom infrastructure lying around. All of them seem to point towards the Cuban fixed network being very over capacity. That could have something to do with that particular addition. As for Paraguay, radio_phreak mentioned to me a while back a particular set of numbers that would route to C5 trunks over some carriers. I believe it was +595-528-222-xxx. Back to the C5 stuff though, does anybody know where we can find a protocol spec document for it? That'll probably help us with some of the oddities we've found on some of these trunk groups. Another EDIT: http://www.itu.int/rec/T-REC-Q.140-Q.180/en Holy shit, another EDIT: http://www.binrev.com/forums/index.php?/topic/47028-portugal/#comment-364799 portugal_c5.flac One (hopefully) last thing - for anybody looking for international credit, I've found http://www.call2.com to be pretty good for the most part. Most of their routes look to be resold MCI, the rates are reasonable, and it tends to be decent quality. It is a callback service though, so it can be a little clunky for a large number of calls like in a scan. DMS-10 loops can be a good way to make this a little less painful. I feel kinda gross giving out a plug like that, but given the relative obscurity of the service and the content of the thread, it seems appropriate.
  5. 4 points
    0800 890 595 is now a (quite rare) example of the equipment engaged tone. I haven't done much looking for interesting switching/signalling since the early 2000s. It's got more difficult now because most people and businesses in poor countries have jumped straight to GSM (+successors). Back then, it would (as radio_phreak notes) be much more productive to look in the provincial towns and cities of poor countries than in their main cities. My preferred method was to look online for hotels or businesses in those backwater areas, ideally finding their fax numbers, and call those. Much prefer bothering a fax machine than disturbing a person. Now-a-days you need to do this armed with the country's dialling plan (wikipedia usually has these) - and most of the numbers you find will be mobiles. Re Cuba, I can't reach the supposed second dialtone for the US base via +53 99. The state telco is marketing the "fija alternativa" service - ie a GSM-based fixed service - suggesting aged and interesting POTS equipment exists. Calling from here, it's evident that their international gateway is something not outrageously ancient, because it promptly returns an appropriate SS7 code for incorrect prefixes - eg +53 41 000000 returns the usual SIT+"the number you have dialled has not been recognised" from my local exchange. +53 xx 300000 returns a Cuban intercept - in Spanish then English - after about 5 seconds of delay, where XX is any of the 2-digit areacodes listed at https://en.wikipedia.org/wiki/Telephone_numbers_in_Cuba. Sadly no signalling sounds are evident during the delays - I think I've tried all of them. I had a quick look for hotels in Panama and all the phone numbers I found were +507 6xxx xxxxx - ie mobiles. However, again, I'm hopeful that downstream of the international gateway is something elderly and interesting. +507 900 0000 sometimes gives an intercept - Spanish only - mentioning C&W Panama, again with a significant post-dial delay. +507 800 0000 gives my local telco's equipment engaged tone. +507 811 1111 was answered by a human +507 700 0000 is a different Spanish intercept, with a longer post-dial delay. +507 600 0000 or 500 0000 give my local telco's SIT+number not recognised intercept. +507 400 0000 is the same intercept-after-delay as 900 0000. +507 300 0000 is yet another Spanish intercept, with delay. +507 200 0000 has a very long delay then something times out any my local telco plays SIT+"sorry, there is a fault". +507 210 0000 has a long delay then the 900 0000 intercept +507 220 0000 rings, again after a delay, and is answered by some sort of automated service - in Spanish. No signalling sounds or evident, for me, in any of the above :-(
  6. 4 points
    So I just logged into binrev using this: it automatically generates, stores, and types passwords and looks like a usb-keyboard to your computer. That's a at89c5131 dev-board, this mcu is pretty much an 8051 with usb hardware. I'm probably going to keep touching up the code a little before I start printing boards.
  7. 3 points
    I've worked on this project for quite a while, and have discussed it on the conference, but have never officially posted recordings on here. There is a large presence of analog and electromechanical switches still in service in the former Soviet countries. The following are 3 recordings of me successfully boxing some of these switches: East Ukraine, ATSK Crossbar Using SF (in-band 2600 dial pulse) Signaling -- seizing and SFing another number: http://technotite.com/SF-exampUKR1.wav West Russia, Crossbar Using SF (in-band 2600 dial pulse) Signaling -- seizing and SFing another number: http://technotite.com/SF-exampRUS1.wav East Ukraine, Crossbar Using R1.5 (weird bi-directional MF protocol using R1 tones, used in CIS countries) - seizing and MFing another number: http://technotite.com/R1.5-examp1.wav
  8. 3 points
    If you dial extension 8411-8414 it will make the automated voice say "Lane ""1-4"" Most pharmacies dont have more than two lanes. So if youre there waiting for a script, dial ext 8413 to hear the voice on the loudspeaker say "lane 3" and watch the employees confusion. its hilarious.
  9. 3 points
    Just found this photo and article, figured I'd leave it here. https://www.rcrwireless.com/20171109/network-infrastructure/switching-it-up-bidding-farewell-to-the-1aess-switch-tag6
  10. 3 points
    Long time lurker.... registered recently..... first post... I know this thread is a bit old, figured I could be of some assistance here: Auto-scanned the 630713XXXX exchange (Took about ~15 hours), then did some manual checking: Number Auto-Scan Result Manual Scan, Comments 6307130025 VOICE Voicemail 6307130027 VOICE Subscriber 6307130107 VOICE Voicemail 6307130138 VOICE Voicemail (Nokia) 6307130460 VOICE UMTS Operations Support Group (Nokia -- "Please try again in 15 minutes") 6307130484 VOICE "We're sorry, but the blackout period for the transtition of the 401k record keeper is in effect on January 6th, please call back on January 7th." Repeats, then hangs up. 6307130563 VOICE Subscriber 6307130760 VOICE "Thank you for calling the Nokia workplace resources call center." 6307130869 VOICE Voicemail 6307130990 VOICE Voicemail Access Number, with working directory. 6307130996 VOICE Voicemail Access Number, with working directory. 6307131006 VOICE Subscriber 6307131229 VOICE Subscriber 6307131265 VOICE "Sorry, this automated attendant number is not available at the moment, goodbye." 6307131292 VOICE Subscriber 6307131304 VOICE "The called extension is busy" >> Voicemail 6307131329 VOICE Subscriber 6307131335 VOICE Ring >> Reorder 6307131553 VOICE Voicemail 6307131984 FAX Fax tones 6307132349 FAX Fax tones 6307133200 VOICE Voicemail Access Number, with working directory. 6307133678 FAX Possibly a modem. 6307134150 VOICE Subscriber 6307134389 VOICE Subscriber 6307134433 VOICE Voicemail 6307134484 VOICE Subscriber 6307134633 VOICE Voicemail 6307134967 VOICE Voicemail 6307135012 VOICE Voicemail 6307135163 VOICE Voicemail (reads back extension number) 6307135305 FAX Possibly a modem. 6307135353 VOICE Voicemail 6307135400 VOICE Voicemail 6307136056 FAX Fax tones 6307136081 FAX Fax tones 6307136082 FAX Fax tones 6307136091 VOICE Possibly an elevator?? Buzzing/Static on line. Hangs up with #. 6307136153 VOICE Another elevator phone? Hangs up with # again. 6307137073 VOICE Subscriber 6307137163 VOICE Voicemail 6307137180 VOICE Voicemail 6307137339 VOICE Subscriber 6307138416 VOICE Subscriber 6307138507 VOICE Voicemail 6307138668 VOICE Voicemail 6307138761 VOICE Voicemail 6307139039 VOICE Voicemail 6307139328 VOICE Voicemail 6307139379 VOICE Subscriber 6307139650 VOICE Voicemail 6307139764 VOICE Voicemail 6307139885 VOICE Subscriber 6307139988 VOICE Voicemail If there's any interest I can run a scan on 630979XXXX.
  11. 3 points
    So all credit goes to Ramsaso; he pointed this out on the bridge last night. If you have a T-Mobile phone, try calling 712-451-0011. You should get a recording saying they now charge 1 cent a minute to call it, even if you're on their unlimited plan.
  12. 3 points
  13. 3 points
    I got this bag phone last month and was playing around with it to see if there was some tiny chance that it could connect to any network. As I suspected, there aren't any crumbling remains of AMPS networks anywhere near me. An interesting feature about this phone is there's an "Aux Out" which apparently was for sending faxes. Can't imagine lugging all of that around and plugging everything into the 12v jack in your car...
  14. 3 points
    This is just a beginning to get people started. Feel free to add onto more if you wish. The 'Threads' links you will see are from threads from these forums where the topic has been discussed before. I wrote this a few months ago so there may even be more threads about them if you search around. This list was made from numerous threads about the same topics; to stop the bitching from the Department of Redundancy Department. 1. How do I use exploits? ::Discussions - 1. ::Programs for assistance - Nmap and Nessus. ::Reference material - Security Focus, and Irongeek. 2. How do I get the admin password for Windows XP? ::Discussions - 1. ::Programs for assistance - Login recovery, and John the Ripper. ::Reference material - Password Recovery, Irongeek.com, and many others. I would suggest reading the discussion thread. 3. How do I hack a website? ::Discussions - 1 , 2, 3. 4. How do I get around web filtering like Websense? ::Discussions - 1, 2, 3. ::Programs for assistance - It is probally easier to use a proxy to get around web filtering software. ::Reference material - Babelfish, Proxy Blind, and Proxify. 5. What are proxies and how do they work? ::Discussions - 1, 2. ::Programs for assistance - There are tons of proxy server lists out there. Suggest doing a Google search for "Proxy", "Proxies", "Proxy Server", etc. ::Reference material - Wiki Proxy Info. 6. Where can I find more Hacker media like HackTV or BRR? For general Hacker Media information check out the Forums. ::Reference material - Hackermedia, Infonomicon, Old Skool Phreak, WhiteSword TV, Packet Sniffers, Hak5. 7. What are some good books to read that will teach me about hacking? This all depends on what you are interested in learning. ::Reference material - Cryptography, Programming, Networking, and Social Engineering. 8. Where can I find a meeting to attend, and what if no one is in my area? If no one is in your area then start up your own meeting, and let others know about it! ::Reference material - Bin Rev meetings - BRR listeners map, DefCon groups, 2600 meetings, and also search for a LUG (Linux User Group) in your area. 9. What Linux distro is the best? ::Discussions - 1. ::Reference material - Rundown on different distros, a test that may help you decide which is best for you, and you may also want to check out more distros' for yourself. 10. How do I learn how to hack? ::Discussions - 1, 2. 11. I want to program, where should I start? ::Discussions - 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22. C Book, Tutorial, Windows Compiler, *nix Compiler, *nix Compiler How-To. Python Website, Book, Tutorial, Compiler, Compiler How-To.
  15. 3 points
    Hey Samo! Good to hear from you again. Sorry to give you a wall of text here, there's really no concise way to explain this. In short, if you want to explore a long distance tandem, your best bet is to use a PIC code. There's a very simple trick that lets you push any destination you want directly into the tandem. We'll use Worldcom as an example, since it works from basically anywhere in the United States. Ready? Dial 101-0555. That's it; no zero, nothing. What you get next is a dialtone straight from the tandem. In the case of the ex-Worldcom tandems, it's not quite as fun as it could be; it wants an authorization code a-la 950 calling card. Here's an example of what you might find - http://thoughtphreak..._800223110.flac That's from a DMS (500, I think) owned by Integra, one of the local CLECs. Most long distance tandems (AT&T's aside - we'll get into that in a bit) don't like terminating toll-free calls, so you'll end up getting weird messages that you'll never be able to hear normally unless your switch loses it's mind. What's so great about this is you're completely free from the dialing restrictions of a normal end office. Want to dial an NXX starting with 1 or 0? A code starting with #? *? There's nothing standing in your way. Sprint in particular stuck a speed dial function on their tandem for some weird reason in the #xx range. #99+anything seems to be it's own little exception - it'll wait for a very large amount of digits before eventually giving you a generic CBCAE recording. This might indicate they're hiding something else here. There's one downside to this technique; if you're not subscribed to a carrier, they won't always let you play with the tandem. ex-MCI (0222) and Sprint are a couple good examples of this, but Sprint will give you a cool message as a consolation prize. Depending on your area, you might have better luck too. For example, the Qwest long distance network has a combination of DMS-250 and Sonus switches. Sonus isn't fond of letting people have fun on the phone, so you'll just get a generic error recording. If you encounter Global Crossing's Sonus switches, you won't even get a custom recording, you'll get the Sonus stock one. It's worth a laugh if you ever hear it. It's under three seconds, and was clearly made last minute by an engineer. Speaking of Global Crossing, like MCI/0222, they have a number of Alcatel DEX switches floating around. Dialing 101-0444 will just get you an error, though. The solution? 950-1044! What dialplan they're using is absolutely beyond me, though, so you're on your own there. There's suggestions - like 800-223-1104 (but only without a 1) going to an invalid code recording that suggest it might be for calling card use, but most things I can think to try just go to a CBCAD. And then we come to AT&T's 0288 network. I'll level with you, this is something I haven't figured out at all. Whenever I've been fortunate to get a dialtone back, it's always been from one of their 5ESS toll tandems. If there's such thing as a pushy phone switch, this is it. It'll let you know right away if it thinks you're doing something wrong. And putting a 1 in front of your destination number is wrong. I haven't had time or an opportunity to just sit down and investigate this, but what I do know is it's unique from a lot of other switches. For one, it'll terminate toll-free calls, but only on specific carriers. I believe just AT&T and Global Crossing toll-frees. Sometimes, it gets a little weirder - like, if you dial 800-244-1111, you'll get a recording from a McLeodUSA DMS. What this means I'm not sure exactly, but my guess is since the 5E toll tandems are responsible for lending a hand in connecting toll-frees, they'll store translations for those toll-frees. If it happens to have one - outdated or not, it'll just use that instead of doing an SMS-800 dip. Also of note on the AT&T tandems is the 600 NPA. Instead of just intercepting it like any invalid NPA, it'll pass this onto the 4ESS. This might indicate AT&T stashed something in there. As for your question - is SS7 relevant to phreaks? Absolutely. The very core practice of phreaking - introducing unorthodox input into the phone network - is fair game to everything, in or out of the speech channel. In the past, we've proved ISDN cause codes can trigger calls to take a different route, and it's been demonstrated that originating a ghost call (in short, an ANI fail on steroids - a call originated with no field other than the destination number) can be enough trouble that phone companies would probably scratch their heads as to whom they should send the bill to. It's understandable that figuring these things out is a challenge, but if anything, that should be a motivator. We're phone phreaks, we've got the resourcefulness to identify a piece of telco hardware by nothing more than vague sounds, and have fun in the process. This should be a reminder that there's always more to explore, and always another limit to break.
  16. 3 points
    It's a mindset. You hack to learn, you don't learn to hack.
  17. 3 points
    That sounds like a lot of work! Can I just send you my bank account numbers and social and have you help me out?
  18. 3 points
    Not to stir shit up, but I certainly agree that this forum shouldn't be a place where fake accounts come along and post allegations which result in people being terminated from their employment. If "unlucky" was indeed the victim of a violation of his privacy by an employee of trapcall/spoofcard then he should have contacted them. Also, if Lucky was fired without any evidence of a particular account being accessed by an employee, then he worked for a piece of shit company. If I were a mod, i would have deleted this thread because even if the allegations were true, there was not a shred of evidence provided, and I do not believe that this is a place for such things. perhaps if "unlucky" simply voiced a concern over the privacy expectations when dealing with a particular service, but he didn't - he made an accusation directed at one man, without anything to back it up. That being said, it's probably all true. ...seriously.
  19. 3 points
    Stop paying for tv service Look into "FTA" or "FTA Receivers" Etc. Just read up on the "Free to Air broadcasts" You just buy a receiver, point your satellite at the orbiting satellite and you can get over 1,000 channels Free.
  20. 3 points
    SCO doesn't own UNIX, at least not yet. The actual "ownership" and copyright to UNIX is a very complicated issue. All this court decision did was "reverse material aspects" of the earlier verdict from 2007 that found Novell to be the rightful copyright owner. Now there's going to be yet another trial case to determine whether SCO does in fact own the copyright. I don't think anybody seriously gives a shit about System V UNIX, UnixWare or any of SCO's other crappy, outdated products. But a company like SCO, which has been in bankruptcy for over 2 years, has virtually no market share and appears to exist these days only for the purpose of suing other companies, might well gain legal ownership of the original System V UNIX code. In other words: they might gain a legal "leg to stand on" and cause more trouble for OSS creators and vendors. For years, SCO has been bitching that Linux infringes on a copyright for the original UNIX code that it assumes it holds. They have sued companies like IBM and Novell which produce Linux-based software and distribute Linux as an OEM OS. They have disseminated propaganda to Linux users, accusing them of copyright infringement and alleging they could be liable for damages simply by running Linux. They have sued their own (former) customers who switched from using their products to using Linux. SCO is also known to have received financial backing from other, far more powerful interests whose goal is to ruin the open source software movement by any means possible. At this point, SCO clearly has nothing to lose, and Microsoft doesn't have to dirty their hands or risk hurting their own public image by attacking open source developers in court. Microsoft can just sit back and bash the OSS movement in the press, allege IP infringements, negotiate cross-licensing agreements and provide financial support to companies like SCO to file anti-OSS suits. This may not be a potent threat to the very existence of Linux, but it could definitely harm Linux in the business market and lead to some very bad precedents regarding OSS and software copyright/patents in general. BTW, I'm not the one who voted down your post. It's an interesting bit of news on a case I haven't really followed in awhile. Thanks for posting it.
  21. 3 points
    The above is the 'offical' Postal Regulation for an IBI or Information Based Indicia. All this information is contained in the 2-D barcode to the upper left of a piece of metered mail. Look at some of your junk mail and it will be very clear what I mean. It's that box that looks like Lattera's avatar. The column that says barcode are all of the data items in that 2-D barcode that I'm talking about and the Human Readable is what you can decipher when you look at it...date, time, etc. The information is digitally signed so that when the Post Office reads the mail it can be fairly certain that it came from a particular licensed meter. What's crazy is that the meter internally communicates with 'itself' using an asymetric key system...public/private. That is the meter contains a postal security device which is tamper resistant (of course resistance is a relative term) that sends out commands to create and sign the indicia with all the signals being encrypted. Think of it like an HTTPS setup for internal communications or more appropriately like each command being digitally signed. Digital signatures use the public/private key system so this is closer to what is happening. The whole postage meter industry is so wacky. What I mean is that to actually attack the meter directly is incredibly hard but not impossible;however, there are far easier ways to 'hack' a meter. The meter itself and access thereof is fairly easy due to primitive security. If you have physical control of a meter and a system that can interface with it you can do pretty much whatever you want. But not to be too much of a worry wort...printing postage is printing money; stamps are a legal form of tender so if you play games with this stuff the penalties are insanely harsh because of that. I know some smartass is saying to himself, "Oh then I can use it to buy my groceries?" Not exactly...unclaimed stamps can and must be refunded by the post office. If you show up with a stamp that is legally yours or if you can 'somehow' prove that that is a stamp of yours the post office refunds the amount on the stamp. Of course it isn't an immediate refund. You can't just show up with a meter label for a hundred bucks and walk away with a c-note.
  22. 3 points
    Ohm, you obviously get off on policing binrev. Seriously, I've seen you crush countless topics with your sense of superior morality. The only thing that impresses me about you is that you always find some way to condescend. You've got a real talent.
  23. 3 points
    Clearly the best was Windows 95. Don't you miss 3 reboots a day? As for XP, it was received pretty badly at first. Pre-SP1, XP was quite buggy. Also, for the time it was resource heavy, so a lot of people complained they couldn't run it on their current machines. I always got a chuckle when people bashed Vista, yet praised XP which had similar problems at the start. Of course people were willing to bite the bullet since the alternative was Windows 98 (or for the enlightened few, Windows 2000). Now, you have XP which works and is stable, so you can sit back and poo Vista all you want. I've also had no problems with Vista. If you have a fast enough machine, there's just not much to complain about. It works, what more do you want? As long as you're listing future OSs, why not list Ubuntu 9.10?
  24. 3 points
    Great link. Who wants to mirror this and stick up a torrent?
  25. 2 points
    I was pretty active back in 2009/2010 with exploration and scanning, this is to the best of my recollection In the UK there was some widely shared numbers that in the 90s were C5 directs as well as being free to call (0800 numbers), by 2009-2010 time only two remained: Bahamas on 0800 890 135 (it had some kind of filter on and you wasn't able to seize at any point during the call) and Paraguay on 0800 890 595, outside of the capital city sometimes numbers in Paraguay would travel over C5 routes too. In addition to this pre-earthquake calls to certain parts of Haiti would travel over C5 lines when you called numbers outside of Port-au-Prince, post earthquake in 2011 they for obvious reasons no longer worked. As far as numbers I'd have to dig through my old notes which are put away goodness knows where. Cuba was a place that I was planning on scanning before I became too busy with life and dropped out, I believe they have (had?) a mixture of the latest Chinese stuff in Havana and some of the older Soviet era crossbar stuff.
  26. 2 points
    Yeah, there are USB isolators you can get from industrial suppliers that will protect your machine, too (used to prevent a catastrophic failure on a machine tool from blowing up the control system). I would probably just grab the cheapest throwaway laptop in the parts heap/thrift store/whatever and use it, if I were going to check these out. Another thing to look at is local geocaches. I've found a few on hikes that had USB drives in them.
  27. 2 points
    I still use flash drives to take stuff to untrusted computers -- for example, when I take something to the print shop to be run off in large format. These types of places (print/copy shops, library, et c.) don't run a primary business of having safe, secure computers, and they let you plug in and run pretty much anything, so I will typically use a flash drive to take files, then nuke it when I get home. I don't log into anything on those computers, I've seen people at the print shop logged in with their cloud storage, email, whatever. Seems like a great way to get keylogged or your session cookie swiped or something. For moving stuff around between computers I trust, yeah, I don't really use flash drives anymore. Ironically I do still use floppies -- but that's only because part of my business is legacy systems repair/maintenance.
  28. 2 points
    So the title says a lot... I broke down and am getting POTS service to my house via Windstream for funsies. Well, not just for funsies, there's some influence in the name of 'research'. *snicker snicker* So I want to get some software to jan hundred groups with audio (for sure) and call progress detection (would be nice), and was wondering if anyone had any recommendations. Yes, I will accept "Don't use Win10" as advice if someone can give me a better solution. Also, I'll need a good modem solution for a laptop so I can do this.
  29. 2 points
    So for a while, I've been experimenting with the concept of a semi-automatic scan. So last week, I just set a modem down on a toll-free range, and woke up several hours later to a recording with a thousand (or so) numbers in it. So far, I've got to say - this has just been tedious and exhausting. Probably not something I'll repeat unless I'm going on a long plane trip or something, but it definitely got results. 800-860 0000 - Call center 0001 - Ad 0002 - ex-Embarq VMB, full 0003 - Ringout 0004 - NIS via SS7 0005 - Ad 0006 - DMS-100 ringout 0007 - Ad 0008 - Ringout 0009 - Ad 0010 - Worldcom DMS-250 NIS 0011 - Ad 0012 - Cannot be reached from calling area 0013 - Business w/Avaya PBX. IP Office? On analog line. (Frontier TF) 0014 - Shitty sounding call center 0015 - Ad 0016 - Ad 0017 - PBX ringout (Excel TF, eventually times out to no answer rec from 156T) 0018 - AT&T toll 5E CBCAD 0019 - Ad 0020 - Ad 0021 - Beyond Human Testosterone order line, no IVR 0022 - PBX NIS rec, responds to DTMF 0023 - Weird NIS (Interactive Tel/JNL01/888-290-0038 TF) 0024 - NIS rec via really weird IVR, spits out DTMF error code (Sprint TF) 0025 - Global Crossing invalid rec 0026 - Wrbly business w/PBX. *9 makes it return "This is Callbridge. Please enter extension number and #" (Ringcentral TF) 0027 - Ad 0028 - Ad 0029 - Ad 0030 - PBX ringout (Excel TF, eventually times out to no answer rec from 156T) 0031 - Fax? 0032 - Ad 0033 - Centurylink LD customer care IVR 0034 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF. Ad?) 0035 - Fax 0036 - Fax 0037 - Global Crossing invalid rec 0038 - Global Crossing invalid rec 0039 - Ad 0040 - Bank IVR, info line (Global Crossing TF) 0041 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 0042 - Global Crossing invalid rec 0043 - Cannot be reached from calling area 0044 - Business w/unknown PBX (Excel TF) 0045 - Cannot be reached from calling area 0046 - Cannot be reached from calling area 0047 - Global Crossing invalid rec 0048 - Ringout (Comcast TF) 0049 - Cannot be reached from calling area 0050 - Ring x1 to SS7 cause code 0051 - Reorder 0052 - Global Crossing invalid rec 0053 - Global Crossing invalid rec 0054 - Global Crossing invalid rec 0055 - Reorder 0056 - Global Crossing invalid rec 0057 - MCI CBCAD rec 0058 - Ring x1 to reorder 0059 - Ringout to shitty sounding Cisco VMB 0060 - KT (South Korean) network error rec (Sprint TF) 0061 - Reorder 0062 - CBCAD via SS7 0063 - Business w/Freedomvoice account 0064 - Ad 0065 - Ad 0066 - Ad 0067 - Ad 0068 - NIS via SS7 0069 - NIS via SS7 0070 - Weird platform, forwards to cell phone 0071 - Global Crossing invalid rec 0072 - Same as 0024 0073 - 0074 - Ad 0075 - Shitty sounding call center 0076 - Ad 0077 - Ad 0078 - Ad 0079 - Ad 0080 - Cannot be reached from calling area 0081 - Ad 0082 - Business w/DMS-100 line?, Avaya Partner system (AT&T TF) 0083 - Call center 0084 - McLeodUSA DMS-500 CBCAD 0085 - Government agency w/Nortel PBX (AT&T TF) 0086 - Hipath Xpressions VMS 0087 - Reorder via SS7 0088 - Ad 0089 - Ad 0090 - Business w/wrbly Shortel PBX 0091 - Business w/Cisco Callmanager (TDS TF) 0092 - Busy signal 0093 - Call center w/stock Asterisk MOH 0094 - Reorder 0095 - Business w/unknown PBX 0096 - Silence? 0097 - Shitty sounding VMB 0098 - Ad 0099 - Ad 0100 - Ad 0101 - Really old sounding answering service? (MCI TF) 0102 - Ad 0103 - Same as 0024 0104 - Ad 0105 - Ad 0106 - Fax 0107 - Ad 0108 - Skytel VMS 0109 - Weird VMB 0110 - Ad 0111 - Ad 0112 - Business w/hosted PBX? (ANI Networks TF) 0113 - NIS via SS7 0114 - EDRAM stock CBCAD (Worldcom TF) 0115 - Business w/NEC PBX (XO TF) 0116 - BUsy signal 0117 - Ad 0118 - Ad 0119 - Call center 0120 - Ad 0121 - Ad 0122 - AT&T toll 5E CBCAD 0123 - Call center 0124 - Ad 0125 - EDRAM stock ACB rec (Broadview TF) 0126 - Reorder 0127 - Business w/unknown PBX (Integra TF) 0128 - McLeodUSA DMS-500 CBCAD rec 0129 - Ad 0130 - Same as 0024 0131 - Ad 0132 - Business (Verizon/Bell Atlantic TF) 0133 - SS7 cause code. Some switches respond to this by generating ringback 0134 - Ring x1 to busy signal 0135 - Busy signal 0136 - Business w/Shoretel PBX 0137 - McLeodUSA DMS-500 CBCAD rec 0138 - Order line, pulls last name/street address number 0139 - 711 number 0140 - Call center 0141 - Fax on DMS-100 line 0142 - Business w/Asterisk 0143 - DMS-10 line, ringout to ex-Embarq Centurylink VMB (Qwest TF) 0144 - 5ESS line, ringout to newer Panasonic VMB 0145 - 5ESS line, ringout to AT&T UM VMB (Qwest TF) 0146 - Ad 0147 - Business w/AM, Meatswitch line 0148 - Business w/Avaya Partner system, 5ESS line? (Qwest TF) 0149 - Business w/Avaya Definity PBX, Audix (Qwest TF) 0150 - Ad 0151 - Call center 0152 - Ringout 0153 - Ad 0154 - Reorder via SS7 0155 - Reorder via SS7 0156 - Fax 0157 - Ad 0158 - Business w/IVR (bandwidth.com TF) 0159 - Busy signal 0160 - Ad 0161 - Busy signal 0162 - Ad 0163 - Same as 0158 0164 - Same as 0158 0165 - Fax 0166 - SS7 cause code. Some switches respond to this by generating ringback indefinitely 0167 - Ad 0168 - Skytel VMS 0169 - (Crunchy, 6 khz sampled prompt) "This is the West Interactive Audio System. Enter your access code now." (Intercall TF) 0170 - Paetec DMS-250 call not allowed rec 0171 - (disconnects immediately) 0172 - Ad 0173 - Reorder 0174 - Same as 0158 0175 - Cannot be reached from calling area 0176 - Reorder 0177 - Reorder 0178 - Ad 0179 - Custom Asterisk NIS 0180 - 4E toll-free DISCO rec 0181 - 711 number 0182 - Same as 0158 0183 - Business w/PBX 0184 - NIS via SS7 0185 - Cognitronics NIS rec 0186 - Cognitronics NIS rec 0187 - Same as 0158 0188 - Business w/answering service (Frontier TF) 0189 - Ad 0190 - Ringout 0191 - Ad 0192 - AT&T 4ESS CBCAD rec 0193 - Callsource NIS rec 0194 - Business w/hosted PBX (Ringcentral TF) 0195 - Weird NIS rec, "This number is no longer in service. Message 10114. Goodbye." 0196 - Ringout 0197 - Callsource NIS rec 0198 - Skytel VMS 0199 - Reorder 0200 - Ad 0201 - Ad 0202 - Fax 0203 - Shitty sounding call center 0204 - Fax 0205 - Busy signal via distant end 0206 - Ad 0207 - Ring x1 to busy signal 0208 - Fax 0209 - Nortel Meridian ringout (Qwest TF) 0210 - Ring x1 to busy signal 0211 - Ad 0212 - LD CBCAD rec from Telica Plexus 9000/Lucent Compact Switch 0213 - Business w/hosted PBX 0214 - Ad 0215 - Order line, pulls docs 0216 - Business (Nuvox TF) 0217 - 711 number 0218 - Business w/Mitel Intertel VMS 0219 - Ad 0220 - Ad 0221 - Centurylink internal VMS (Cisco) 0222 - Ad 0223 - Busy signal 0224 - Call center 0225 - Ad 0226 - Business w/NEC PBX (AT&T TF) 0227 - Ad 0228 - Ad 0229 - Business w/hosted PBX? 0230 - Ring x1 to busy signal 0231 - Ad 0232 - Business w/Centigram/Mitel VMS 0233 - Ringout 0234 - Business w/PBX 0235 - Ad 0236 - 711 number 0237 - Fax 0238 - Ringout 0239 - Ad 0240 - PBX rec?, "This number is not in service." 0241 - Busy signal 0242 - Ad 0243 - Satellite NIS rec 0244 - NIS via SS7 0245 - Ad 0246 - Ringout 0247 - Satellite NIS rec 0248 - Call center 0249 - NIS via SS7 0250 - Global Crossing invalid rec 0251 - AT&T toll 5E CBCAD 0252 - AT&T 4ESS toll-free disco rec 0253 - Call center 0254 - Comcast line, ringout (Ringcentral TF) 0255 - Business w/DMS-100 line 0256 - NIS via SS7 0257 - ACB via SS7 0258 - NIS via SS7 0259 - Ad 0260 - NIS via SS7 0261 - Ad 0262 - Ad 0263 - NIS via SS7 0264 - Ad 0265 - Order line 0266 - NIS via SS7 0267 - 5ESS NIS rec 0268 - 5ESS NIS rec 0269 - 4E toll-free DISCO rec 0270 - Same as 0265 0271 - Satellite NIS rec 0272 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 0273 - Fax 0274 - Ringout 0275 - Fax 0276 - Dialogic NIS rec? (0222/MCI toll-free) 0277 - Ad 0278 - Satellite NIS rec 0279 - Reorder 0280 - NIS via SS7 0281 - Ad 0282 - Business w/unknown PBX 0283 - British ringout (0222/MCI toll-free) 0284 - Fax 0285 - Shitty sounding call center 0286 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 0287 - Business (AT&T TF) 0288 - Ad 0289 - Business w/newer Panasonic AM (AT&T TF) 0290 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 0291 - NIS via SS7 0292 - AT&T 4E toll-free DISCO rec 0293 - Business w/hosted PBX (Grasshopper PBX) 0294 - Fax 0295 - Business w/DMS-100 line (Verizon/Bell Atlantic TF) 0296 - Cannot be reached from calling area rec 0297 - Reorder via SS7 0298 - Ad 0299 - Fax 0300 - Business w/Mitel Intertel VMS 0301 - Ad 0302 - NIS via SS7 0303 - Sonus stock rec, "No routes found", sends SS7 cause code 0304 - Business w/PBX 0305 - Call center 0306 - Reorder 0307 - Global Crossing invalid rec 0308 - 711 number 0309 - Ameritech NIS rec? 0310 - Ad 0311 - Ad 0312 - Ad 0313 - Ad 0314 - Sex line 0315 - Weird NIS rec 0316 - Sprint DMS-250 CBCAD 0317 - Fax 0318 - Ring x1 to busy signal 0319 - Fax 0320 - Sex line 0321 - Weird rings, forwards to business w/DMS-100 line 0322 - Global Crossing invalid rec 0323 - NIS via SS7 0324 - NIS via SS7 0325 - 711 number 0326 - Fax 0327 - Fax 0328 - Busy signal 0329 - AT&T Easyreach 800 0330 - Business w/PBX 0331 - Shitty ringout 0332 - AT&T toll 5E CBCAD rec 0333 - Ad 0334 - Ad 0335 - Ad 0336 - AT&T 4E toll-free DISCO rec 0337 - Ad 0338 - Business w/hosted PBX (Ringcentral TF) 0339 - Reorder 0340 - Ad 0341 - Ad 0342 - AT&T 4E toll-free DISCO rec 0343 - Avaya Aura VMB (TW Telecom TF) *0344 - IVR, federal employee program 0345 - Reorder via SS7 0346 - Global Crossing invalid rec 0347 - Global Crossing invalid rec 0348 - Shitty sounding PBX 0349 - Reorder 0350 - Cell phone 0351 - Fax 0352 - Service suspended rec, TTS, plus weird, really slowed down message (Level 3 TF) 0353 - Ad 0354 - Ad 0355 - Reorder 0356 - Call center IVR 0357 - Business w/Comcast "phone" 0358 - AT&T 5E toll rec, "The toll-free number you have dialed has been changed. Please review our recent mailings to you for our updated telephone number listings." 0359 - Order line 0360 - NIS via SS7 0361 - Ad 0362 - Ad 0363 - Ad 0364 - IDT calling card 0365 - Global Crossing invalid rec 0366 - Global Crossing invalid rec 0367 - Fax 0368 - TTS recording, NIS 0369 - Ad 0370 - CBCAD via SS7 0371 - Ring x1 to busy signal 0372 - Ad 0373 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 0374 - Ad 0375 - Business w/ridiculous music bed, hosted PBX? (Ringcentral TF) 0376 - Ad 0377 - Ad 0378 - Ad 0379 - Ad 0380 - Call center 0381 - Ad 0382 - Ad 0383 - Ad 0384 - Ad 0385 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 0386 - AT&T wireless subscriber 0387 - Reorder via SS7 0388 - Ad 0389 - Call center 0390 - Reorder via SS7 0391 - Shitty sounding jazz MOH. Call center? 0392 - McLeodUSA DMS-500 CBCAD rec 0393 - Ad 0394 - Sprint DMS-250 CBCAE 0395 - Order line 0396 - Ad 0397 - Global Crossing invalid rec 0398 - AT&T toll 5E rec, # cannot be reached from calling area 0399 - Reorder 0400 - Ad 0401 - Ad 0402 - AT&T toll 5E CBCAD 0403 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 0404 - Ad 0405 - Ad 0406 - Business w/Toshiba PBX 0407 - Ad 0408 - Freedomvoice account 0409 - Cell phone 0410 - Ad 0411 - Ad 0412 - Reorder 0413 - Shitty sounding forward to German VMB? 0414 - rec, "You do not have any credit. Goodbye." 0415 - Fax 0416 - Reorder 0417 - Call center 0418 - Ad 0419 - Ad 0420 - Ad 0421 - McLeodUSA DMS-500 CBCAD rec 0422 - Call center (Ringcentral TF) 0423 - Call center 0424 - Ad 0425 - Ad 0426 - Really shady ad 0427 - # changed rec via PBX? Refers to 800-234-1690, allows you to enter extension anyway after recording 0428 - Same as 0358 0429 - Call center 0430 - Ringout 0431 - Same as 0358 0432 - Ad 0433 - Ad 0434 - Ad 0435 - Same as 0358 0436 - TTS NIS rec 0437 - Disconnects immediately 0438 - Same as 0358 0439 - Call center 0440 - Ad 0441 - Shitty sounding PBX 0442 - Business w/PBX 0443 - 4E CBCAD rec 0444 - Singles line, prompts for personal ID 0445 - Ad 0446 - Skytel VMS 0447 - Ad 0448 - Ring x1 to reorder 0449 - Ad 0450 - Ad 0451 - Call center 0452 - CBCAD via SS7 0453 - 5ESS ringout (Qwest TF) 0454 - Ad 0455 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 0456 - Ad 0457 - Ad 0458 - Reorder 0459 - Reorder 0460 - Reorder 0461 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 0462 - Ad 0463 - Business w/Cisco Unity VMS 0464 - Southwestern Bell DMS-100 NIS rec 0465 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 0466 - Ad 0467 - Ad 0468 - Reorder via SS7 0469 - Ad 0470 - Ad 0471 - Ad 0472 - Reorder 0473 - Business w/ESI PBX? 0474 - Reorder via SS7 0475 - 711 number 0476 - Burst of wrbly ring + NIS via SS7 0477 - Ad 0478 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 0479 - Business w/shitty sounding PBX 0480 - Ad 0481 - NIS via SS7 0482 - AT&T Easyreach 800 0483 - AT&T toll 5E CBCAD rec 0484 - AT&T toll 5E CBCAD rec 0485 - Reorder via SS7 0486 - Ad 0487 - Ad 0488 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 0489 - Conference call service 0490 - Asterisk NIS rec 0491 - NIS via SS7 0492 - Loud ringout 0493 - Fax 0494 - NIS via SS7 0495 - Shitty sounding IVR 0496 - CBCAD via SS7 0497 - NIS via SS7 0498 - Asterisk NIS 0499 - Call center IVR 0500 - Business w/PBX 0501 - Several generations of shittier sounding rings, eventually business answers 0502 - AT&T 5E toll CBCAD 0503 - Ad 0504 - Ad 0505 - Ad 0506 - Fax 0507 - CBCAD via SS7 0508 - Busy signal 0509 - Same as 0358 0510 - Business 0511 - GTD-5 Ringout to Glenayre/GTE VMB (Frontier TF) 0512 - Busy signal 0513 - Busy signal 0514 - Busy signal 0515 - GTD-5 Ringout (Frontier TF) 0516 - Call center 0517 - CBCAD via SS7 0518 - Reorder via SS7 0519 - AT&T toll 5E CBCAD 0520 - Ad 0521 - Subscriber 0522 - Fax 0523 - Ring x1 + TTS "End of call" 0524 - Ad 0525 - Ad 0526 - Global Crossing invalid rec 0527 - Business w/Shoretel PBX 0528 - NIS via SS7 0529 - Weird sounding ring, ringout (AT&T TF) 0530 - Weird NIS rec or NIS via SS7, depending on calling location (Intelemedia TF, call terminates using Sonus switch) 0531 - Business w/PBX 0532 - Ringout 0533 - NIS via SS7 0534 - Ad 0535 - Business w/ESI PBX (MCI TF) 0536 - Ringout 0537 - Shitty sounding rec, "Thank you for calling. Goodbye." 0538 - Fax 0539 - AT&T toll 5E CBCAD rec 0540 - SS7 cause code. Some switches respond to this by generating ringback indefinitely 0541 - Business w/Norstar key system, softswitch ring (CIMCO TF) 0542 - Ad 0543 - NIS via Easyreach 800 platform, 203-01SG 0544 - Call center 0545 - Ad 0546 - Call center 0547 - Ringout 0548 - 800 # changed rec 0549 - Business w/PBX 0550 - Calling card platform, Encompass/whatever made Phonehog work 0551 - ACB via 4ESS 0552 - Ad 0553 - Asterisk NIS 0554 - AT&T toll 5E CBCAD 0555 - Ad 0556 - Ad 0557 - Bellsouth DMS-100 NIS rec (Level 3 TF) 0558 - Ad 0559 - Ad 0560 - Ad 0561 - Ad 0562 - Business w/answering service 0563 - Ad 0564 - Business w/PBX 0565 - AT&T toll 5E CBCAD 0566 - Ring x1 to busy signal 0567 - NIS via SS7 0568 - Call center 0569 - CBCAD via SS7 0570 - Busy signal 0571 - Call center, UK? 0572 - Fax 0573 - Reorder via SS7 0574 - Busy signal 0575 - Call center 0576 - Ad 0577 - Fax 0578 - Reorder via SS7 0579 - Ad 0580 - Reorder via SS7 0581 - SS7 cause code. Some switches respond to this by generating ringback indefinitely 0582 - Call center IVR 0583 - NIS via Spanish speaking country (AT&T TF) 0584 - UK ringout (AT&T TF) 0585 - Call center 0586 - 4ESS Int'l CBCAD rec 0587 - Ad 0588 - NIS via SS7 0589 - Skytel VMS 0590 - Fax 0591 - Busy signal 0592 - Ad 0593 - KDDI IVR, prompts for PIN number (AT&T TF) 0594 - "Please hold while I try to connect you" + MOH, eventually forwards to VMB (Ringcentral TF) 0595 - rec, "The number you are calling is temporarily unavailable. Thank you for calling. Goodbye." + busy signal (Ringcentral TF) 0596 - TellMe IVR, order line (AT&T TF) 0597 - VMB, fraud hotline, Cisco VMB (AT&T TF) 0598 - Skytel VMS 0599 - Business w/Norstar key system (Nuvox TF) 0600 - Ad 0601 - Ad 0602 - Asterisk call center 0603 - SS7 cause code. Some switches respond to this by generating ringback indefinitely 0604 - Reorder via SS7 0605 - After hours rec 0606 - Ad 0607 - Asterisk call center 0608 - Ad 0609 - Order line, pulls last name/street address number 0610 - Call center 0611 - Ringout to AM. 0612 - Busy signal 0613 - Ringout, forward to other ringout 0614 - Ad 0615 - Call center IVR 0616 - NIS via SS7 0617 - Ad 0618 - Fax 0619 - Business 0620 - PBX rec, "You've reached a non-working number" (Qwest TF) 0621 - IVR, addiction treatment hotline 0622 - Ad 0623 - Ignite Media Solutions NIS rec 0624 - AT&T toll 5E CBCAD rec 0625 - Fax 0626 - Ringout 0627 - 711 number 0628 - Answering service 0629 - rec, "The party you called cannot be reached. Goodbye." <plays in Spanish> 0630 - Busy signal 0631 - Crackly trunk, call center 0632 - Ad 0633 - Busy signal 0634 - Ad 0635 - NIS via SS7 0636 - Same as 0358 0637 - Reorder via SS7 0638 - Call center IVR 0639 - Reorder via MCI tandem? 0640 - Busy signal 0641 - rec, "I'm sorry, the application you're trying to reach is not available at this time." 0642 - Ad 0643 - Ring x1 to busy signal 0644 - Call center 0645 - Ad 0646 - Ad 0647 - Call center 0648 - Shitty sounding call center 0649 - Ad 0650 - VMB in UK? (Timeshift TF) 0651 - AT&T toll 5E CBCAD 0652 - NIS via SS7 0653 - CBCAD via SS7 0654 - Global Crossing invalid rec 0655 - Ad 0656 - Ad 0657 - AT&T Easyreach 800 0658 - Ad 0659 - Ameritech NIS rec 0660 - Ad 0661 - AT&T toll 5E # cannot be reached from calling area rec 0662 - Ad 0663 - Call center 0664 - Ad 0665 - CBCAD via SS7 0666 - Ad 0667 - Answering service 0668 - Ad 0669 - Shitty souding NEC PBX 0670 - NIS via SS7 0671 - CBCAD via SS7 0672 - NIS via SS7 0673 - Call center IVR 0674 - NIS via SS7 0675 - Ring x1 + TTS voice, "End of call" 0676 - Call center 0677 - Fax 0678 - Reorder 0679 - Cell phone 0680 - Ad 0681 - Business w/AM 0682 - Ad 0683 - Ad 0684 - Call center 0685 - Busy signal 0686 - Business w/ESI PBX (Qwest TF) 0687 - Ad 0688 - AT&T AIS report, 214-824-7351 DISCO 0689 - Fax 0690 - Ad 0691 - Ad 0692 - Weird proprietary modem thingie 0693 - Ad 0694 - Fax 0695 - AT&T Easyreach 800 0696 - Weird order line 0697 - Ad 0698 - Call center IVR 0699 - Shitty sounding ringout 0700 - Business 0701 - Ad 0702 - Ad 0703 - Business w/Mitel Intertel VMS 0704 - Fax 0705 - Global Crossing invalid rec 0706 - Ad 0707 - Ringout (Deltacom TF, times out to DEX reorder in some places) 0708 - Worldcom DMS-250 NIS rec 0709 - Ad 0710 - Reorder via SS7 0711 - Fax. When in use, redirects to Verizon VMS 0712 - Call center 0713 - Ringout to VMB on Toshiba PBX, dials 9121 before VMB answers 0714 - Ringout to newer Panasonic AM, softswitch ring 0715 - Ad 0716 - # cannot be reached from calling area rec via SS7 0717 - Reorder via SS7 0718 - Comcast VMB, 770-591-5733 0719 - Ad 0720 - Qwest AIS report, 602-253-1527 DISCO (Sprint TF) 0721 - Ad 0722 - # cannot be reached from calling area rec via SS7 0723 - Spanish call center 0724 - Reorder via SS7 0725 - Ad 0726 - Southwestern Bell DMS-100 CBCAD rec 0727 - Reorder 0728 - NIS via SS7 0729 - IVR, national telemarketing company 0730 - Shitty sounding PBX Ringout 0731 - Ad 0732 - Reorder via SS7 0733 - NIS via SS7 0734 - Ad 0735 - Reorder via SS7 0736 - Ad 0737 - Really old IVR, # changed rec 0738 - Ad, had Cisco Callmanager default MOH 0739 - Call center IVR 0740 - Ringout, forward to other ringout 0741 - Call center IVR 0742 - Ad 0743 - Call center IVR 0744 - Ad 0745 - PBX DISCO rec 0746 - Ad 0747 - Ad 0748 - Ad 0749 - Ad 0750 - Ad 0751 - Brief MOH, hangs up (Bell Canada TF) 0752 - Business w/PBX, older, weird VMS (Bell Canada TF). Custom? Mentions "EYCom ID" 0753 - Call center 0754 - Callsource NIS 0755 - Ad 0756 - Ad 0757 - GTD-5 ringout (Frontier TF) 0758 - ACB via SS7 0759 - Worldcom DMS-250 NIS rec 0760 - Ad 0761 - Ad? 0762 - Ad 0763 - Shitty sounding call center 0764 - CBCAD via SS7 0765 - Call center? 0766 - Business w/PBX 0767 - Silence, eventual reorder 0768 - Busy signal 0769 - Reorder via SS7 0770 - rec, "We're sorry, you're only allowed one entry per telephone number. Goodbye." 0771 - Ad 0772 - Ad 0773 - Sprint cell phone 0774 - Reorder 0775 - Ad 0776 - rec, "D241. Test successful." 0777 - Wrbly Callmanager vacant code rec 0778 - Reorder via SS7 0779 - Reorder via SS7 0780 - Ad 0781 - Ad 0782 - 5ESS ringout 0783 - Ad 0784 - Asterisk rec, "That service is not implemented" 0785 - Asterisk rec, "That service is not implemented" 0786 - IVR 0787 - Ringout 0788 - Busy signal 0789 - Reorder 0790 - Business (Birch TF) 0791 - Busy signal 0792 - AT&T 5E toll CBCAD rec 0793 - Business w/DMS-100 line, newer Panasonic AM (AT&T TF) 0794 - Calling card platform 0795 - Asterisk rec, "That service is not implemented" 0796 - Business w/PBX 0797 - NIS via SS7 0798 - Same as 0358 0799 - Ad 0800 - Sprint DMS-250 CBCAD rec 0801 - Ad 0802 - Ad 0803 - SS7 cause code. Some switches respond to this by generating ringback indefinitely 0804 - Fax 0805 - Loud ring x1 + NIS via SS7 0806 - Uverse line, ringout to AT&T UM VMB 0807 - Ad 0808 - Ad 0809 - Busy signal 0810 - ACB via SS7 0811 - Reorder via SS7 0812 - Ad 0813 - Ad 0814 - # not yet in service rec, via Glenayre VMS? 0815 - Call center 0816 - Global Crossing invalid rec 0817 - 4E YCDNGT 0818 - Reorder via SS7 0819 - Ad 0820 - Ad 0821 - Ad 0822 - Ad 0823 - Ad 0824 - Ad 0825 - Ad 0826 - Ad 0827 - Ad 0828 - Ad 0829 - Ad 0830 - Busy signal 0831 - Cannot be reached from calling area 0832 - Call center 0833 - Call center 0834 - PBX non-working number rec, refers to 800-821-2797, 800-822-2200, 877-979-8498, 888-339-7887, 800-275-9376 0835 - IVR, Xerox test application 0836 - Ring x1 to busy signal 0837 - Shitty ringout 0838 - # not yet in service rec, via Glenayre VMS? 0839 - Reorder 0840 - Call center IVR 0841 - SS7 cause code. Some switches respond to this by generating ringback indefinitely 0842 - Skytel VMS 0843 - Ad 0844 - Call center 0845 - Shitty sounding business w/PBX 0846 - NIS via SS7 0847 - Ad 0848 - Fax 0849 - Ad 0850 - AT&T toll 5ESS cannot be completed from calling area rec 0851 - Ad 0852 - Business w/unknown PBX 0853 - Ad 0854 - Business w/Nortel Meridian PBX 0855 - Ad 0856 - CBCAD via SS7 0857 - CBCAD via SS7 0858 - Ringout 0859 - Ad 0860 - Ad 0861 - Ad 0862 - Asterisk NIS 0863 - Business w/analog line 0864 - Business w/PBX on cable line (Cox TF) 0865 - Reorder via SS7 0866 - MCI tandem CBCAD rec 0867 - (Crunchy, 6 khz sampled prompt) "This is the West Interactive Audio System. Enter your access code now." 0868 - Reorder 0869 - Disconnects immediately 0870 - Business w/shitty sounding, unknown PBX? 0871 - 4E toll-free DISCO rec 0872 - Ad 0873 - Call center w/Cisco switch 0874 - Weird proprietary modem thingie 0875 - ACB via SS7 0876 - Reorder via SS7 0877 - Ad 0878 - Ad 0879 - 4E toll-free DISCO rec 0880 - Cell phone 0881 - Ringout, forward to other ringouts 0882 - Ad 0883 - Call center 0884 - VMB w/really shady sales pitch 0885 - Business w/Mitel PBX on analog line 0886 - Ad 0887 - Ad 0888 - Business w/cable line 0889 - Shitty sounding call center 0890 - Ad 0891 - Shitty sounding call center 0892 - Ad 0893 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 0894 - Disconnects immediately 0895 - Shitty sounding call center 0896 - Order line 0897 - NIS via SS7 0898 - Wal-Mart pharmacy 0899 - Ad 0900 - Ad 0901 - NIS via SS7 0902 - Find me/follow me IVR, using Dialogic hardware, lets you set ANI w/fail 0903 - Ad 0904 - Ad 0905 - Call center 0906 - Call center 0907 - Business w/PBX 0908 - Ad 0909 - Ad 0910 - Ad 0911 - Business 0912 - Business w/analog line 0913 - Reorder via SS7 0914 - Southwestern Bell NIS rec 0915 - Cannot be reached from calling area 0916 - Shitty sounding business w/PBX 0917 - Sales IVR 0918 - NIS via SS7 0919 - Reorder 0920 - Business w/AM, GTD-5 line 0921 - Shitty sounding call center 0922 - Business w/DMS-100 line, ringout to Anypath VMB (Rogers TF) 0923 - Ring x1 to reorder 0924 - 4E toll-free DISCO rec 0925 - Shitty sounding call center 0926 - Ad 0927 - Ad 0928 - Asterisk VMB 0929 - Ad 0930 - Business w/PBX 0931 - Ad 0932 - Reorder via SS7 0933 - Reorder 0934 - Business w/analog line (Integra TF) 0935 - Ad 0936 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 0937 - Ad 0938 - Silence 0939 - Ad 0940 - Busy signal 0941 - Shitty sounding call center 0942 - Ringout 0943 - Ad 0944 - Shitty sounding call center 0945 - Reorder via SS7 0946 - Ad 0947 - Ad 0948 - Ad 0949 - Ad 0950 - Business w/Broadsoft auto-attendant 0951 - Ad 0952 - Ad 0953 - 4E toll-free DISCO rec 0954 - Weird proprietary modem thingie 0955 - Business w/cable phone 0956 - Asterisk VMB 0957 - Ad 0958 - Business w/hosted PBX 0959 - Modem Connecting to ... Escape character is '^]' Connected Connection closed. 0960 - Ad 0961 - Skytel VMS 0962 - 4E CBCAD 0963 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 0964 - Shitty sounding business 0965 - Cannot be reached from calling area 0966 - Ad 0967 - Reorder via SS7 0968 - 4E CBCAD 0969 - Business w/Asterisk 0970 - Ad 0971 - Call center 0972 - Cannot be reached from calling area 0973 - Ad 0974 - Ringout to cellular VMB (Ringcentral TF) 0975 - Shitty sounding ringout to VMB 0976 - Ad 0977 - Unassigned rec, via Glenayre VMS? 0978 - Ring x1 to busy signal 0979 - 5ESS NIS rec 0980 - Reorder via SS7 0981 - Reorder via SS7 0982 - 4E CBCAD 0983 - AT&T Easyreach 800 0984 - Business w/hosted PBX 0985 - 4E CBCAD 0986 - Callsource NIS 0987 - Reorder via SS7 0988 - Custom Asterisk NIS rec 0989 - Ad 0990 - Call center 0991 - Ad 0992 - Ad 0993 - Fax 0994 - 4E CBCAD 0995 - Reorder 0996 - 4E CBCAD 0997 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Who's Calling TF) 0998 - Older Panasonic AM on 5E line (Qwest TF) 0999 - Ad 1000 - IVR, "Please enter your six-digit PIN now" 1001 - Ad 1002 - Business w/Cisco Callmanager, Unity VMS 1003 - 4E YCDNGT 1004 - Asterisk rec, "The user you are trying to reach is unavailable." 1005 - Ad 1006 - NIS via SS7 1007 - Shitty sounding call center 1008 - Ad 1009 - Paetec DMS-250 rec, "Your call is not allowed" 1010 - Business w/5ESS line 1011 - Ad 1012 - Ad 1013 - Global Crossing invalid rec 1014 - Business w/PBX 1015 - Ad 1016 - ACB via SS7 1017 - 4E CBCAD 1018 - NIS via SS7 1019 - Ad 1020 - Centurylink customer service IVR 1021 - Ad 1022 - Bellsouth? NIS rec, via transcoded trunk 1023 - Reorder 1024 - Shitty sounding auto-attendant 1025 - Cannot be reached from calling area 1026 - Ad 1027 - Busines 1028 - Ad 1029 - rec, "We're sorry, you're only allowed one entry per telephone number. Goodbye." 1030 - Ad 1031 - Weird NIS rec (Qwest TF) 1032 - Verizon/Bell Atlantic NIS rec (Qwest TF) 1033 - Ad 1034 - Cell phone 1035 - Ad 1036 - 4E CBCAD 1037 - Ad 1038 - Ad 1039 - Ad 1040 - Ad 1041 - Ad 1042 - Asterisk VMB 1043 - Business w/Shoretel PBX 1044 - Reorder via SS7 1045 - Business w/hosted PBX (Ringcentral TF) 1046 - Business w/Norstar key system, cable phone 1047 - Same as 1046 1048 - Same as 1046 1049 - Same as 1046 1050 - Ad 1051 - Ad 1052 - Fax 1053 - Ad 1054 - Cell phone 1055 - ACB via SS7 1056 - NIS via SS7 1057 - Ad 1058 - Ad 1059 - rec, "We're sorry, you're only allowed one entry per telephone number. Goodbye." 1060 - Business w/Panasonic PBX? 1061 - Ad 1062 - Ad 1063 - Cannot be reached from calling area 1064 - Ad 1065 - Ad 1066 - Ad 1067 - Ad 1068 - Ad 1069 - Ad 1070 - Ad 1071 - Shitty sounding call center 1072 - Ad 1073 - Ad 1074 - Ringout 1075 - Ad 1076 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF) 1077 - Ad 1078 - SS7 cause code. Some switches respond to this by generating ringback indefinitely (Mayfair TF)
  30. 2 points
    Yeah, if you're looking at old scan textfiles then a carrier is a modem carrier. You can identify them by their metal screeching though you should find recordings to differentiate between a fax carrier and a modem carrier signal. You could connect to them over voip, I think, using a terminal program like Term90 or HyperTerminal. Okay, okay, I don't know offhand of any modern dial-up terminal programs. Guess I should research that. Might be a ton of BBSes under my nose and me without a trusty US Robotics.
  31. 2 points
    So I think tonight, we're going to change the number over to 503-416-1155. We've had complaints from some of the users of cheaper carriers about their calls repeatedly being blocked, or hitting crappy routes because of the high termination fees. This one is a DMS-100 MMCONF. Er, ringout bridge. All of the above, really.
  32. 2 points
    I just use my POTS line for the most part. Occasionally, calling cards too for international. They're ideal for that sort of thing since a lot of CO numbers don't go offhook. Finding them in the first place might well end up costing you more money then the actual scan.
  33. 2 points
    http://www.digitalbond.com/blog/2013/10/22/call-yourself-a-hacker-lose-your-4th-amendment-rights/ Apparently saying that you like hacking on things without specifying "things" means you're automatically assumed to be compromising systems and that you're going to destroy evidence so they might as well take all of your equipment preemptively. So I guess hacking together a high water sensor for the basement, since I'm calling it "hacking," means I'll destroy evidence in legal investigations and that I like to break into systems I don't own all the time. Bullshit.
  34. 2 points
    So the most interesting flash drive fell into my lap the other day (or out of someone's pocket maybe? not sure, it was on the floor) and like any good citizen I plugged it into a laptop that I didn't care about running off a BT4 liveCD with no hard drives mounted (I'm not dumb) with the intent of perhaps identifying the owner and returning it. I didn't find any identifying information on the drive, which was odd since it had transcripts of emails etc with names redacted, like it was intentionally anonymized or something... Anyway once I started reading this stuff I couldn't stop. Long story short it appears to be the property of some Verifone employee who has gone to great lengths to let people know how broken their software is and keeps getting shot down. Maybe I'm interpreting a lot of this the wrong way but it's almost like this person wanted this stuff to make it out. Whether that was the intent or not, it's happening Here's the thing though, I'm guessing about 80% of what's on this drive is Verifone's intellectual property and the other 20% they probably wouldn't be too happy about seeing on the internets. I don't want to violate any of BR's policies either and I'm not sure what the stance is on stuff like this. I'll post, in my own words, what appears to be the original research of this drive's owner and I'll gladly send anything on this drive to anyone who wants copies assuming you have a safe anonymous way to get them to you. I might just start an eepsite or something with all this stuff on it, let me know what you all think I should do and I'll respect your opinions and policies. Anyway, on with the stuff I think I'm safe to post here. The docs in here seem to be about 3 products: pc charge, ip charge, and payware pc. They're all credit card processing apps sold by verifone (ip charge seems to be more of a service, very paypal-esque). There's some good stuff that looks like internal documents, training and such, for ip charge and payware, but the majority of this stuff seems to be about pc charge. There are docs labeled "capture spec" and "auth spec" for a couple dozen companies which google tells me are credit card processing companies and various documents outlining how point of sale systems communicate with verifone's stuff. It's all quite fascinating and I'm sure it could've been RE'd anyway so it's probably safe to post here, but this is me asking nicely before pissing people off. The cool stuff though was in its own separate folder, this is where our tech outlines all the security problems found in several versions of the software (there's installers on the drive too for like 4 versions and a zip file that's got what I hope are test accounts - haven't checked if they work, too scared). Here's what was documented: * The software apparently has open SQL injection bugs, and apparently that's enough to get the app's certification yanked on the spot - at least according to the tech... Management seems to disagree in some of the emails... * The software encrypts most of the data it stores, and everything it encrypts is using the same algorithm and key and the data is never hashed, and the key never changes, ever, it's always the same for every installation of the software. There's a spreadsheet in here that appears to be a rainbow table of expiration dates. It's referenced in one of the emails as a proof of concept that threatens the possibility of such a table being made for card numbers too. * The software, apparently, stores its password data encrypted rather than hashed, and uses the same algorithm as it does for everything else. One of the docs shows how you can copy and paste the password field into other database fields and use various menu options and reports to decrypt the password for the root user, who is apparently always named "System" * The software stores absolutely everything in an unlocked unencrypted unpassworded access database. The only protection on this thing is that the version of access they use is so damned old you can't actually do anything with the file in new versions without converting it and making it inaccessible to the app. Of course they circumvent this one and only layer of security by including an old copy of M$ VisData with the app so you can SQL your heart out. * Apparently compliance only requires CC data to be encrypted once it reaches a "public" network like the internet, so nothing between this app and a point of sale system is ever encrypted. Everything is sent either via everyday TCP to an arbitrary port or by a method called "file drop" which according to the docs is more common. "File drop" consists of putting all the CC and transaction info into an XML file, copying that file into a shared folder over the network, and then watching for a file that contains the response. Real secure guys, real secure. Technically speaking I think this is supposed to happen on a separate network segment than the free WiFi you give your customers but who wants to place bets on how many small business owners know a subnet from a fishnet? * The emails seem to indicate that a lot of large chains use this broken app and does list several scarily big names. Not sure if this forum is the appropriate place to drop such a bombshell so I'll await your response on yet another item. There's lots more here. Again please advise on what would be the best method to send this stuff around, assuming you're all even interested. I'm still digging through a lot of this stuff, and some of it is honestly a bit over my head. Until I can get this stuff spreading ask questions and I'll see if there's an answer in here for you. I've spent probably two weeks combing this stuff and playing with the software on VMs that are intentionally disconnected from the 'net, there's a ton of stuff here and I'm just beginning to comprehend it all...
  35. 2 points
    Afterm4th and serrath said it right. Apple may have it's own proprietary version of Unix (OS X) but the differences between OS X and any modern Linux/Unix OS are negligible at best. In other words, Macintosh computers are just as vulnerable, if not more vulnerable than Windows based PCs. The big difference in number of exploits, and number of viruses, etc, is due to something known as "security through obscurity". Since so many more people use Windows, attackers spend their time targeting PCs rather than targeting Macs. As far as security holes go, there are plenty. For example Lion is vulnerable to an LDAP exploit. LDAP Problems Here Ultimately, it's not that Macs are invincible to malware, it's that there's not much malware out there that was written with OS X in mind.
  36. 2 points
    How about sticking to cash? Or even better, Gold and silver.
  37. 2 points
    http://www.google.ca/search?sourceid=chrome&ie=UTF-8&q=smarten57%40hotmail.com From a post he made on another forum he called himself "leo" This looks like it might be his live journal: http://smarten57.livejournal.com/ (i base this assumption on the fact that hes trying to sell "gold" coins) Possible Ebay (both smarten57s appear to be from china) http://myworld.ebay.com/smarten57/ Possible info from live journal: Birthdate: 05-30 Location: haerbin, China Listed ICQ number: 274-894-888 ICQ lookup gives me this: http://www.icq.com/people/274894888/ Name: liu qingyuan, from haerbin, China (Liu sounds like Leo) With this info I can now use pipl http://pipl.com/search/?FirstName=liu&LastName=qingyuan&City=haerbin&State=&Country=CN&CategoryID=2&Interface=1 http://www.facebook.com/people/Liu-Qingyuan/748231341 Possibly him? Possible twitter account: http://twitter.com/#!/MaRtinLAuQingyu (no tweets) The ICQ number he provides in his post points to this ICQ profile : http://www.icq.com/people/606777527/ In his profile he calls himself 刘 丰志 and hes using a stock photo of some actor i've never heard of (determined this through tineye search) 刘 丰志 translates to Zhi Feng Liu This is Zhi Feng Liu: his resume: http://www.cs.toronto.edu/~zliu/resume_zhifeng.doc'>http://www.cs.toronto.edu/~zliu/resume_zhifeng.doc webpage from when he studied in toronto ontario: http://www.cs.toronto.edu/~zliu/ for a guy who's got a degree in comp sci he does a really shitty job at making a webpage. http://cn.linkedin.com/in/zhifengliu This may be him, it might not. Im going to guess that it is him.
  38. 2 points
    I've wanted to build my own computer, from the ground up, ever since I found out about the Altair 8800 and the IMSAI 8080 of the 70's. Having found an 8085 CPU in an old AT&T PBX module, given to me by a teacher in middle school, I'd decided that would be the processor I'd use, when I eventually got around to building one. It's binary-compatible with the 8080, but requires only a single supply, a crystal, and an address latch to operate (the 8080 requires three supplies, a system controller IC, and a clock generator IC). I decided to get started with PIC microcontrollers, rather than going straight into CISC assembly, during high school, and found that the PIC was able to do what I needed for my projects with fewer parts and less power draw. It was also easy to get code to it, using a homemade parallel port programmer (I didn't have, or have access to, an EPROM eraser and burner at the time). Recently, though, I've found a few situations in which I'd like to have a microcontroller system with a true address and data bus, rather than implementing them through the larger PICs' output ports. I decided it was finally time to put together a basic 8085 system, since I'd now accumulated many 8085 CPUs, plenty of static RAM, and had acquired my own EPROM burner. This is the result: I built my prototype for the project on a Vero project board, which contains traces oriented for DIP ICs, as well as power and ground planes. I started off with just the 8085, a 74LS373 8-bit latch for the multiplexed address bus, a 2716 2k x 8 EPROM, a 2 MHz crystal and some decoupling capacitors. I later added the small, red TIL311 hex display, and a 74LS04 hex inverter to supply its internal latch with a signal of correct polarity. The EPROM was wired directly to the data and address buses, with its Chip Enable tied to the Read output of the CPU, since there were no other memory devices present. The TIL311 was wired directly to the low 4 bits of the data bus, with its noninverting Latch Enable fed from the CPU's inverted Write line, through one of the inverters in the 74LS04. I wrote a short assembly program to output 0x0A on output port #0 (any port would work, as the TIL311 responded to any write from the CPU). The program was assembled using GNUSim8085 (an open-source 8085 assembler and simulator), tested, then the hex dump was manually entered into my Intel iUP-201 PROM programmer, which has a keyboard for the manual entry of hex data into a PROM. After fixing two swapped address lines, the program worked fine, and displayed "A" on the TIL311. The next step was to add some RAM, for use as the 8085's stack, and for general storage of variables. I chose two uPD-2114 RAMs, which are 1k x 4 static RAMs -- you parallel two for 1k x 8. Since there was going to be real RAM and ROM present, it was necessary to come up with select logic to choose the EPROM or the RAM when memory accesses were performed, or the TIL311 when IO accesses happened. The 8085 provides IO/M, RD, and WR status lines, with M, RD, and WR being inverted (IO/M is one line, with 1 = IO access, and 0 = Memory access). The select logic was composed of inverters and NAND gates, from the 74LS04 and 74LS08 ICs. During this modification, I decided to add a PDSP-1881 8-character LED display for ASCII output. This was added to be activated on output ports 0-7 (one port for each character). Finally, I wrote an assembly to push "HELO" onto the system stack, then pop each character off and display it on an incremented output port. After correcting a timing error (the PSDP-1881 wasn't syncing with the 8085's clock), "HELO" appeared on the display after reset: Here's a shot of the point-to-point wiring on the back of the board. It's 30-gauge Kynar wrapping wire: I'll probably keep this board as-is for future embedded projects, but I plan on building a more complete system using an Augat wire-wrap board, since the point-to-point hand wiring is somewhat tedious. I've got an electric wire wrap gun for this purpose, and several different lengths of precut wrapping wire for this purpose. I'll probably add either an HD44780-based LCD or a serial UART next, with the intent of writing a small monitor program for the system. Eventually, I'd like to be able to load CP/M from ROM or perhaps floppy disk on the system. If anyone is interested, I can post scans of my schematics, notes, and assembly code for this project. I've also got a pile of extra components, if anyone would like to build an 8085 system similar to this one. If one were to use the same memory map, code should be interchangeable between systems. If you'd like to build something like this, but lack a PROM burner, I could post my schematic for a manual programmer I built several years ago: you manually set the address and data bits, then trigger a 555 timer to provide the programming voltage pulse to the EPROM without damaging it.
  39. 2 points
    ... *if*, and it's a big if, this is a case of an intel analyst suddenly going moronic. It's more likely he was led to believe he was a protected journalistic source, even if Lamo has Asburger's and has managed to compartmentalize and rationalize he "technically" wasn't acting as the journalist. Take how Lamo was quoted by BBC today, and try to think about the implications dispassionately. I personally and without the "full story" think this is a pretty telling quote right here, and I read it thus ... I'd be interested to see if anyone can show a reasonable alternate reading. "I was never going to write the story. I made that clear. I did say I was working closely with a journalist so maybe he was led on, but tough cookies. Poulsen and I decided privately that it's a breach of ethics if I wrote the story since the source was getting outed once they gave details". Until today, I'd tended to not bother with this story thinking it was simply a loudmouth who couldn't help but brag. Reading the BBC piece today, that quote by Lamo is *waaaaaaaay* to telling for me to think that's a certainty in good conscience any longer. I think the analyst was duped into thinking he was dealing as a protected press source. Lamo keeps his conscience clean by "technically" being the source himself, not the journalist. His quote alludes he truly believes he's the source in this story. It's bizarre.
  40. 2 points
    As everyone has already heard, Google Chrome OS or Chromium OS source code was released a couple weeks ago. There have already been a few attempts at compiling it and getting it to work on devices. If anyone wants to try out Chromium OS safely and see what's up, you can use VirtualBox. 1.)Download and Install VirtualBox. 2.)Download the compiled Chromium OS in virtual hard drive format. [you can get this off torrents or PM me...I'm not going to get into another pissing war over TPB. The link is legal and the package is legal but out of respect for the board I'm not going to post the link.] 3.)Creat a new VM and during the hard drive set-up select the pre-existing hard drive option and select the downloaded Chromium OS. 4.)Create a bogus Gmail account...your real one, if you have it, will work too. 5.)Log into Chromium OS and hack away! It is very slow running even on my Quad Core...but this isn't even a beta...this is a hack beta:) I took some snapshots of what you would see: Notes: pretty typical. As you can see or actually maybe not, it will autofill @gmail after you enter in a user name. From a security perspective, since Google is making you live in the 'cloud' physical security is now virtually moot as my wireshark run picked up my username in the clear. Although my password was hashed this is not sufficient if people are going be exposed to an attack everytime they open up and use their Chromium OS device. Notes: Here is a screen shot of a failed certificate. This was caused, I think, by my computer having two gmail accounts inadvertantly opened at one time. Although it doesn't lock you out of the OS and hence your device (crazy legal reasons naturally) it does lock you out of Google's 'cloud.' You can still surf the web and access the device through the OS but this is naturally a reduced experience from Google's perspective. Notes: Here is the 'desktop.' Looks very familiar. Notes: Built in apps...all are web based, even the calculator. Notes: The good stuff.
  41. 2 points
    then your not starting a group but recruiting for one?
  42. 2 points
    Just wanted to add that 78hrs isn't bad for a brute-force attack. What is the key-space you have it set at? He might not be able to answer you as that post was written two years before you joined, and his last login was one year before you joined.
  43. 2 points
    Ok, spoofcard has a promotion going on right now where if you use their twitter app they'll give you a free five minute pin for testing. You can get one per twitter account, and twitter accounts are easy to register. Here is a half hour worth of five minute pins for everyone to use: 276853542 795337998 172677536 939509887 884066104 309283658 You can get a five minute pin like these here: http://www.spoofcard.../twitter?iframe Access number is (831) 300-0200 And remember anyone can log in with these six pins on spoofcard.com, so don't call anything you don't want the world to see.
  44. 2 points
    Yeah, they showed us how insecure hacker websites are, but didn't we already know this? Producing content to fill the forums is more important then securing the forums. You beat me to it. These guys are run of the mill hackers with excellent showmanship. How can I make that claim? They exploited common vulnerabilities, using common tools and techniques. It was evident that their brains were required occasionally, and I'm sure it was refreshing after all that routine hacking they bragged about. The choice of targets? High profile hacking- or security-oriented sites that focused more on content than their site security. Bragging about these sites is like saying you can shoot fish in a bucket... with a machine gun! Of course, these sites do get lots of press, so whatever happens to them gets noticed. In the end, Zero for Owned resembles a Richard Nixon publicity stunt more than a Kevin Mitnick exploit story. Does anyone else think Zero was named after its contribution to IT security? To Zero for Owned: You've Just Been Powned!
  45. 2 points
    Nice tute, Biosphear. I have a few notes to add: First of all, in order to crack wifi, your wireless adapter must be capable of these two functions: monitor mode and packet injection. You can think of monitor mode as sort of like "hyper-promiscuous mode for wireless cards." In monitor mode you can listen to all traffic on the air from any AP or other 802.11 device within range. "Packet injection" means crafting custom packets and sending them out on the air through your wireless adapter. If your wireless adapter's chipset does not support monitor mode and packet injection, or if there's no driver or patch available that supports these features, then sorry; you're not going to be cracking wifi networks with that adapter. There's a limited number of chipsets with available drivers to support monitor mode and injection, but luckily most of them are extremely popular so finding one is not too difficult. All the Atheros, most Realtek and Railink, and some Broadcom chipsets are supported. In some cases a special driver is required, and sometimes it might even be necessary to apply a kernel patch to enable these features. If your adapter just won't work or will require a lot of trouble to get working, you can always buy an external USB wifi adapter. They're pretty cheap these days. If you do need a replacement adapter, I strongly recommend the Alfa AWUS036H. Retailing at $30-45, it's a freaking bargain considering its performance over similarly-priced adapters by Linksys and Netgear. It may be ugly, but this adapter is the wardriver's best friend. It's built on a well-supported Realtek chipset, and its 500mW transceiver provides perhaps the best range of any USB Wifi adapter. The best part is, you can plug in a high-gain replacement antenna which will take full advantage of the Alfa's performance. With a 7dBi antenna and optimum conditions, this thing can pick up networks a quarter-mile away. Regarding step 4 in Biosphear's tutorial: The device ID that Linux gives to your wireless adapter may vary from device to device and from distro to distro. Sometimes you'll see "wlan0," sometimes "ath0" or "eth1." The Alfa AWUS036H (which I pimped in the paragraph above) shows up on my netbook as "wlan0" until I use airmon-ng to put it into monitor mode, whereupon a new device ID is created with the name "mon0". When you run ifconfig, it's really not too difficult to figure out which device is your ethernet and which is your wireless. Just be aware that the device IDs may not be consistent with tutorials you find on the Internets. Before you start any cracking, type "sudo cd /root" and sudo mkdir a new directory called .ac-ng in your /root directory. If you do all your cracking from this directory you can keep all your stuff organized. All aircrack-ng tools must be run as root, so either sudo them or else type "sudo -s" at the start of every cracking operation to get a root prompt. (If you choose the second option, be sure to close the terminal after you're done working as root!) Regarding step 7 in Biosphear's tutorial: When using airodump-ng to choose a target network to crack, look for a network with a high power (PWR) and preferably one with at least a few nodes connected. Of course, you'll want one with "WEP" specified in the encoding (ENC) column. Another good thing to look for is any network with an SSID containing "2WIRE". (More about this later ) Once you've selected your target network, mkdir a new subdirectory inside /root/.ac-ng, name it after the target network's SSID, and cd into there before pointing airodump-ng at the target AP. This method will keep all your data organized by network and avoid having a crap-ton of .cap files piling up all over the place. Make a note of the network's BSSID and also the channel it's operating on. It's a good idea to open up a text editor and copy/paste all this info into a text document, along with the MAC addresses of any hosts connected to the target network. Name this text document after the network SSID and save it in the /root/.ac-ng/<target network SSID> directory. Go back to the terminal and hit Ctrl-C to quit airodump-ng. When you restart it, make sure to specify both the BSSID ("-b") and the channel ("-c") of the target AP, and don't forget to add "-w" followed by the filename you want to write the file to (you might want to use the target network's SSID for this as well). Between steps 9 and 10, it's important to recognize whether the target AP is filtering clients by MAC address. If the target is set up for MAC filtering, then you'll need to use a slightly different approach to crack the network. When you run your fakeauth, if you're able to connect OK, then you know MAC filtering is not enabled and you can proceed as described in Biosphear's tutorial. If, however, you start receiving deauth packets then that's a good sign that MAC filtering is enabled on the AP. If you're getting filtered out by MAC address, then you'll need to see some connected hosts in order to attack the network. If another host is connected to the network, you can run a deauth attack against that host (specify its MAC address) and then fakeauth using its MAC address in place of your own. It's important to remember that deauth attacks against a connected host will bump that host offline. Because deauth attacks tend to be 'noisy,' you should keep them to a minimum. If people on the target network keep getting repeatedly knocked offline, they'll probably realize there's something wrong with the router and you might gain the attention of a network admin. A stealthier approach in the case of MAC addy filtering is to bide your time: make a log of all the client MAC addresses connected to the target AP, then try again at a time of day when there's little or no traffic. Find a MAC address on your list which is not connected, then carry out your dissociation/ARP replay attacks under the guise of that trusted client. Finally, a (hopefully) useful bit of information: Due to a ridiculously stupid "ease-of-use" feature, many 2WIRE routers have a vulnerability that allows anyone who cracks the WEP key to easily gain full administrative access to the router (2WIRE wifi routers are standard equipment on AT&T, Bellsouth and Qwest home DSL networks, BTW). After cracking the WEP key of a 2WIRE router, you can easily gain admin access by the following method: 1. Connect to the network using the cracked WEP key you acquired from aircrack-ng. 2. Open a browser window and type the IP address of the 2WIRE router in the address bar. This should not be too hard to guess. For routers on AT&T service it will most likely be, but other companies might use different numbers. As usual, Google is your friend here. 3. When you get to the router setup login page, click the link for "I forgot my password." 4. The next page will have a text field with instructions to enter a number printed on a label on the bottom of the router. Instead, just enter the cracked WEP key you just used to log on to the network (the same one you acquired from aircrack-ng). 5. You're in. Now you can change any admin settings you please. If the router is filtering by MAC address, this would be a prime opportunity to add your own MAC address (spoofed, of course!) to the whitelist. I don't know if this works on all 2WIRE routers, but it seems to work on quite a lot of them. As always, this info is provided purely for educational purposes and should in no way be construed as encouragement or endorsement to fuck with other people's belongings without permission. OK?
  46. 2 points
  47. 2 points
    Why though? Being a nuisance and preventing communication can be just as useful of a tool for "cyber-warfare" as more 'tactical strikes' with a much lower technical barrier. Also, exploits can be patched (in a perfect world, they would be patched) and then lose their value to the attacker, but a DDoS can be a right bitch to deal with. I guess that is what makes you a dangerous free thinker.... It just seems like a government like N.K., if they wanted to could possibly do better... crippling some major infastructure or what-not. I've not researched it much, so my opinion is coming from what Mitnick stated about the attacks - something to the effect it was more teenage in nature than government. Looking at the attack, something was obviously compromised though, in order to get a botnet that large.
  48. 2 points
    .........what? Basically, the launch os of Android (Not Cupcake) had a missed typed redirect in the code, where anything typed on the G1 would be echoed to a bash session's stdin. So typing reboot would reboot, typing ls would list the current directory, typing sshd would start a sshd session, all with root privileges. It was an (very stupid) exploit that allowed full access to the linux underpinnings of Android on the G1, even allowing people to install a full version of Debian.
  49. 2 points
    Yup. I heard he announced at some security conf in Singapore, and will be explaining it in very technical terms at Blackhat. It will be about fuzzing mobile operating systems for vulnerabilities like that.
  50. 2 points
    Well, I finally have a need to get around a password protected hard drive on a Dell Latitude D600. I know there are a few methods that can be used to do this, but I wanted to post here and see if anyone can suggest anything else. The hard drive in question has a password on it. I believe the term is "platter locked". What I know of follows: http://www.rockbox.org/lock.html The utility atapwd, linked at the above url, looks like it might work, but I haven't gotten it to work yet. http://a-ff.com/products/rrs/drives/ This is a company that provides an unlocking service for around $60.00. I don't want to spend money though. http://www.vogon-forensic-hardware.com/for...cracker-pod.htm These guys sell hardware and software that can clear the password and then image a drive for forensic purposes. I don't think they sell to civilians though. There is also a thread on this elsewhere: http://www.hardwareanalysis.com/content/topic/34045/?o=0 Any thoughts as to where I should go to get this done?