Fone Ranger

Members
  • Content count

    44
  • Joined

  • Last visited

Community Reputation

0 Neutral

About Fone Ranger

  • Rank
    DDP Fan club member

Contact Methods

  • Website URL
    http://
  • ICQ
    0

Profile Information

  • Location
    UK
  1. In other news... Pope "not baptist" Bears "avoid public conveniences"
  2. http://artofhacking.com/tap/tap/TAP26.PDF
  3. Well, you can't have been looking very hard BT Wiring Cabinets Combat in the Field: Field Phreaking (Plenty more on cabinets) ... Et cetera. There's plenty I could say but those two cover it (and a lot more besides) The only significant thing I would disagree with is that bit about using a hacked-up £2.99 phone in the second file – I accept nothing less than the real things, which are easy enough to obtain (the HB 290's my favourite for casual use.) On the subject of proper kit, you can obtain the 'keys pillar' to open cabinets (along with other useful stuff) from Mills here. That said, I've generally found the locks on old GPO cabinets are easy enough to open with a pair of pliers (probably because BT engineers can't be bothered tightening them all the way – it makes them a c**t to open again if they've been rusting away for months.)
  4. By hanging out there you also expose yourself to the risk of contracting lameness No dis to the mag or its writers, but the fanclub was chock full of retards. When I would call the bridge (going on five years ago) it would invariably be overrun by chromosome-deficient kiddies trying to tone it out. That said, it was good for motivating the cool folks to trade conf numbers
  5. Just my opinion, but the original (and subsequently best) activities of phone phreaks I've observed revolved around activity which usurps the phone companies' control of the phone system to some degree. Captain Crunch and Al Bell were doing in the 60s and 70s (blue boxes), Poulsen and Mitnick were doing it in the 80s, Phiber Optik in the 90s (switches and other Telco systems) and a small hardcore are able to do it in the here and now (IP breaking-and-entering + Helmsman tekneeq) IME the most satisfying part is gaining access and control. I've always felt it's a bit pointless to spend ages acqiring obscure techninal knowledge if you can't apply it in practice. In this day and age I don't think you can make a useful distinction between the two, since everything is moving to IP (though not necessarily internet of course) As has been pointed out though, even the meaning of "phreaking" itself is somewhat subjective and there is no 'canonical' list of categories or what does/doesn't count. I'd just go with the guidelines above (getting access, getting control, that sort of thing) My top tips: Read things like Watchman (and the other hackers/phreaks mentioned) and be inspired. If you feel you'd rather just work for an Telco or ISP or play about with VoIP than break the law, there's a wealth of up-to-date information in such pubications as the AT&T Technical Journal and TCN. In either case it's best to avoid most of the so-called phreaking sites as they are often no more than file dumps for lame 80s text files. Forums like this one are of questionable worth in (purist) phreaking terms, as with hacking, there's only so much that active phreaks are prepared to publically divulge. Generally, though - it's nice to have places where you can share your interests with others (I wish there had been prior to my BBS and internet days).
  6. Harr! 0day available here: http://www.ofcom.org.uk/telecoms/ioi/numbers HTH HAND
  7. It'd be close to impossible getting the above into a tap-sized project using readily available USB interfacing... Why not just use an A-D converter and shift the data over FM?
  8. Long ago, in a drunken stupour, I made some bits of dropwire into little multicoloured rings for my gf. She wasn't very impressed. As for the forms, it would depend what's on them, though I suspect not a great deal of use unless you're in the habit of stealing random personal inf0z.
  9. For what it's worth, a Nokia with NetMonitor enabled will display the LAC, CID and so forth.
  10. They would have obtained the PIN, spoofing makes no difference - either there's a PIN or there isn't.
  11. Not true, according to the BBC they were "detained under Section 1 of the Regulation of Investigatory Powers Act 2000" which isn't quite true either, they were arrested on suspicion of committing an offence contrary to it http://www.opsi.gov.uk/acts/acts2000/00023--b.htm "... the indications so far were that voicemail messages left by members of the royal household had been listened to by third parties." Anyway, some fuckwits got arrested for spying on jug-ears, so what? (Mind you, that bit about the MP sounds good)
  12. MMmmm, I know I'm going to get ragged for saying this, but I've been at the JD, so: All this "hacking and phreaking are legitimate because *blah *blah* *blah*" (cue mindless "hacker, not cracker" type miscellany) doesn't wash with me, just about every skilled phreak/hacker (Crunch, Bell, Cheshire, Poulsen, Steal, Mitnick, Phiber etc etc etc) has been tagged as a "criminal" at some point. (OK I missed a few out there but my memory's not great atm, mmmmmmkay?) The fact of the matter is, if you want control, you have to get in, and sooner or later, most of the time, that will involve breaking the law. Breaking into phone systems/boxes is illegal in most jurisdictions with a big enough IT infrastructure to merit such laws. End of story. If you want to play around with Caller ID/Asterisk or write some clever perl/shellscript or even find exploits, fine, but IMO this alone doesn't make you a phreak/hacker. My advice to the OP would be, if you are going to break the law in your pursuit of knowledge (which I' m not advocating by the way) then you're better off just getting on with it rather looking for tips, in public, no less. (sort of makes me wonder how serious you are about actually doing it) As for working with someone else, that could prove fatal unless you are sure he/she is both sussed and trustworthy, i.e. will reply "my lawyer has advised me not to answer any questions" as opposed to "it was [N_0_1], here's the proof, now fix me up a deal" if caught. Believe me, you find out who your friends really are, and what fairweather friends are capable of to avoid landing in shit. While we're at it, whoever suggested googling for docs: Yeah, because they're really going to plaster their internal directories, dialups, NUAs, IPs, proprietary maintenance docs and passwords all over the net, aren't they? Fair point, the AT&T Technical Journal has plenty of info of interest to phone phreaks (some very in-depth stuff on 1AESS to 5ESS to IP etc) but the vast majority of it will be of fairly limited use in actually gaining access. Anyhow, all of the above notwithstanding, I gravely doubt you'll find anything truly groovy in a van (they don't usually leave high end kit there for obvious reasons) if all you're after is some docs, try the trash, I believe in many jurisdictions trespass is a civil law issue rather than a criminal offence so you'll likely just get kicked off the property as long as you don't do anything stupid (get caught breaking into the building, kick the security guard in the nuts, etc.) That said, I can't comment on getting caught that way personally (since I haven't) Well, feel free to flame me for my opinions, I think I'll try to find a pertinent quote from TAP on this one. Once again (neon sign, great big letters) I DON'T ADVOCATE BREAKING THE LAW! If you are in any doubt as to the subject of interest, better to ask a lawyer (qualified to advocate, not just some pen-pushing notary lawyer) rather than your "peers" PS Failing that, make sure to take a soap-on-a-rope with you if you end up on remand Edit: w00p, forgot to add: Specifically, breaking into vans and stealing stuff is not only bad legally, but could also land the employee in shit (not nice) A better ploy is to go the social route via family, unions, etc (it never hurts) a lad I was in college with with obtained info and goodies that way, although I don't know if the stuff would have been binned anyway or was officially reported "lost/stolen in action", IME they will also be amazed anyone actually cares about their job. In summary, everyone's happy that way
  13. Fascinating
  14. THC

    http://thc.segfault.net
  15. Indeed: However, it appears the NT2X90AA is now discontinued. I believe DMS switches can TKO (speechpath set up or not) for monitoring, though I don't have the syntax to hand.