----------------------------------------------------------------------------- CBV Hackin By PiNK ToRPeDo Original File Date: June 7, 1994 ----------------------------------------------------------------------------- You might be saying to yourself... now PiNK - How do I get through those CHeeZY CBV's that everyone uses. There are at least six (6) wayz: 1: Deception 2: Brute Force (easiest & quickest) 3: Tones 4: Loops 5: VMB's 6: Dialouts =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= DECEPTION: The first is tricky because it envolves Social Engineering methods. There are numerous wayz to do this, but I will only go through a small portion of techniques. If you can't figure out the rest - YOU SHOULDN'T BE READING THIS!!!!! The first, is blatent use of a friends line to verify CBV. This poses problems because if you intend on hacking a board, they might call him up and ask him why he has been hacking their board. If he has any brain he might realize it is you. You can also use your work number (if you work on a computer). This method can also pose problems because you could fuk up your work by getting A.G.T. up their asshole or maybe some mad sysop. If you have a laptop... use a fortress fon and your homefree! You can also try to deceive the sysop and try to get him to voice verify (fortress fon) ect. All of these methods take time, patience and some good ol Social Engineering, so lets move on to more plausible methods........ BRUTE FORCE: This one is fun... and most every good hacker knows it but I will go through it again for those that haven't leanred it. What is a CBV? A CBV, is called a "Call Back Verify" and is used by sysops on boards, so that users can't get multiple accounts. Now if they have two individual lines in their homes, then YES it is possible to get two individual accounts. It calls you back at a specified number to verify your location. Now, to get through them using BRUTE FORCE... it requires only little knowledge and a fon plugged into your modem. Call the board and leave FAKE information. IE: Name, number, Age ect... Write your new info in a memo on your termial program or write it somewhere as some bbs's ask for your birthdate and the last four digits of your fon number. Then when you are done, register by going into the CBV. When the komputer has asked for all info to be correct and just when it is going to hang, pick up your fon line, so that your computer disconnects and your fon doesn't. So now, your komputer is disconnected and you are sitting there with a Data transmission of CBV on your line. Hit "ATA" Thats it! Some CBV's are that shitty and won't look for Dial Tone, so it will think that it has called you back, when you have never left. This method works about 80% of the time! Tones: This is similar in content but adds a new twist. You can achieve this two wayz... 1: Use your fon to generate garbage tones. 2: Use a RED BOX (Tone Generator) Let me explain Follow the same guidelines as mentioned above. When the CBV is about to hang... pick up the fon line. Some CBV's try to hang, so when you here a "click" hold the button "1" down until you here it dial. If it doesn't work try the number "2" ect ect... then hit "ATA" This sometimes (on some CBV's) will generate the needed Dial Tone and the CBV will call you back. If this doesn't work.... Try a RED BOX. This can generate a multitude of frequencies, including Dial Tone (2600 MHz). When you are generating a DT, you will hear a "click" "click" "click", usually three then it will dial the number you left. Very fukin easy. Loops: Now, if you havn't a clue what Loops are get a good file from your local H/P BBS and learn. For those who know... you should be getting ideas. Call the bbs, get the CBV going and put in the Loops, low end line number. Then quickly call the high end and wait... when it calls just hit "ATA" VMB's: Again, if you don't know how to use them... go get a file and learn. After hacking a codeline, you will gain certain access to the VMB. If you have a diverter number (used by that certain VMB) enter that number for the CBV to call. Call up the Diverter and use Call Forwarding on the VMB (*72) You might be saying "Well, PiNK - how can I use CF on some other line? Doesn't the VMB have to suscribe to it? Well yes, but in some business areas certain codes are free! If you happen to have a VMB with this option -----> USE IT. If not, then look for one. When you enter the VMB line for the CBV and use CF, then it should call you back. Just type "ATA" If you are also wondering "Well PiNK... how do I get from Data to voice and voice to data? Command: ATX1DT This is so that when the CBV calls you can quickly get into and out of the Data mode. (Voice to Data) Dialouts: This is pretty self explanatory. Call the bbs, enter the dialouts number, then call the dialout and wait. It will call. At this point... you should be able to get into any komputer using one of these methods! NO MORE CBV VERIFICATION FOR YOU! =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Thanks to everyone who helped me... No one! Except for the original makers of the file "CBV hackin". Vince Neil of course. To all those who came before... your knowledge wasn't wasted. To all those who come after.... live, learn and hack. Cheers! PiNK
This page was created Wed Aug 11 23:14:02 EDT 1999
Using Linux
version 2.0.32
on an i586
Main Page @ Matarese.com
The Myth of the 2600Hz Detector @ Matarese.com
Acquiring Account Information @ Matarese.com
Act2! by Symantec @ Matarese.com
All hacks / Annoyance @ Matarese.com
Alt 2600 Group FAQ @ Matarese.com
Hacking Angelfire @ Matarese.com
Anonymous E-Mail @ Matarese.com
Anonymous FTP: Frequently Asked Questions (FAQ) @ Matarese.com
Maintaining Access - Implementing Backdoors @ Matarese.com
How to Receive Banned Newsgroups FAQ @ Matarese.com
Hacking BBS's @ Matarese.com
phreaking tutorial @ Matarese.com
The Bluebox @ Matarese.com
List of Common Bugs @ Matarese.com
Things that go Bump on the Internet @ Matarese.com
Hacking Calling Cards @ Matarese.com
Expanding the capacity of Caller ID Boxes @ Matarese.com
What is Caller-ID? @ Matarese.com
The Matarese Circle @ Matarese.com
Cops and Robbers | UNIX Security @ Matarese.com
Credit Carding Part I @ Matarese.com
Exploits FAQ @ Matarese.com
Making Free Calls @ Matarese.com
FTP Bouncing @ Matarese.com
Hackers Encyclopedia @ Matarese.com
Hacking from Windows9x FTP @ Matarese.com
Hacking Tripod @ Matarese.com
Hacking Web Pages @ Matarese.com
How to crack a UNIX password file. @ Matarese.com
Hacking Servers : A Begginners Guide @ Matarese.com
Hacking Tutorial @ Matarese.com
Hacking UNIX @ Matarese.com
How to Hack the WWWboard Message Board 2.0 @ Matarese.com
Hackers Handbook @ Matarese.com
Guide to Harmless-Hacking @ Matarese.com
All about security holes @ Matarese.com
Hacking Hotmail @ Matarese.com
]How to Hack from from Harlequin and Archangel @ Matarese.com
Improve security by breaking into your site @ Matarese.com
Ch1can0 BEOWULF @ Matarese.com
Internet Security @ Matarese.com
IRC Hacking FAQ by Lord Somer @ Matarese.com
Lan Technology Scorecard @ Matarese.com
Harmless Hacking - Linux @ Matarese.com
INDEX @ Matarese.com
Mail Spoofing Explained @ Matarese.com
Microsoft IIS Vulnerability @ Matarese.com
Microsoft(Yuk) Index Server exposes IDs and Passwords @ Matarese.com
Intresting Microsoft Access 7.0 Trick @ Matarese.com
MS Money 2.0 Back Door @ Matarese.com
Mind Your Own Business (MYOB) @ Matarese.com
This Hack is for the OptiChat Original Chat Room @ Matarese.com
Internet Outdials @ Matarese.com
Introduction to the Internet Protocols @ Matarese.com
Analysis of QueSO Performance @ Matarese.com
Finger - ATTACKING FROM THE OUTSIDE @ Matarese.com
L0pht Security Advisory - Sendmail 8.7.5 @ Matarese.com
Sniffer FAQ V 1.7 @ Matarese.com
SSPING/JOLT patches @ Matarese.com
WORKING OUT-TELNETS @ Matarese.com
How do I post to a moderated newsgroup? @ Matarese.com
What You Should Know About Computer Viruses @ Matarese.com
How can I protect myself from viruses and such? @ Matarese.com
What is a trojan/worm/virus/logic bomb? @ Matarese.com
VMS Info (Password Cracking) @ Matarese.com
HACKING THE WAL-MART ARMORGUARD COMPUTER PROTECTION SYSTEM @ Matarese.com
Using web proxies to disguise your IP address @ Matarese.com
Dig up hidden CD Keys @ Matarese.com
X-Windows Security @ Matarese.com
Copyright (C) 1999 - Matarese.com