Click here to find books related to 'modem 2600'.



-----------------------------------------------------------------------------

                               CBV Hackin
                               
                            By PiNK ToRPeDo
                    
                    Original File Date: June 7, 1994



-----------------------------------------------------------------------------


You might be saying to yourself... now PiNK - How do I get through those
CHeeZY CBV's that everyone uses.  There are at least six (6) wayz:


        1:  Deception
        
        2:  Brute Force (easiest & quickest)
                
        3:  Tones
        
        4:  Loops

        5:  VMB's
        
        6:  Dialouts
                
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

DECEPTION:


The first is tricky because it envolves Social Engineering methods.  There
are numerous wayz to do this, but I will only go through a small portion of
techniques. If you can't figure out the rest - 

                YOU SHOULDN'T BE READING THIS!!!!!
                

The first, is blatent use of a friends line to verify CBV.  This poses
problems because if you intend on hacking a board, they might call him up
and ask him why he has been hacking their board.  If he has any brain he
might realize it is you.  You can also use your work number (if you work on
a computer).  This method can also pose problems because you could fuk up
your work by getting A.G.T. up their asshole or maybe some mad sysop.  If
you have a laptop... use a fortress fon and your homefree!  You can also try
to deceive the sysop and try to get him to voice verify (fortress fon) ect.

All of these methods take time, patience and some good ol Social Engineering,
so lets move on to more plausible methods........



BRUTE FORCE:

This one is fun... and most every good hacker knows it but I will go through
it again for those that haven't leanred it.

What is a CBV?

A CBV, is called a "Call Back Verify" and is used by sysops on boards, so
that users can't get multiple accounts.  Now if they have two individual
lines in their homes, then YES it is possible to get two individual accounts.
It calls you back at a specified number to verify your location.

Now, to get through them using BRUTE FORCE... it requires only little
knowledge and a fon plugged into your modem.


Call the board and leave FAKE information.  IE: Name, number, Age ect...

Write your new info in a memo on your termial program or write it somewhere
as some bbs's ask for your birthdate and the last four digits of your fon
number.

Then when you are done, register by going into the CBV.

When the komputer has asked for all info to be correct and just when it is
going to hang, pick up your fon line, so that your computer disconnects and
your fon doesn't.

So now, your komputer is disconnected and you are sitting there with a Data
transmission of CBV on your line.

Hit "ATA"

Thats it!

Some CBV's are that shitty and won't look for Dial Tone, so it will think
that it has called you back, when you have never left.  This method works
about 80% of the time!


Tones:


This is similar in content but adds a new twist.  You can achieve this two
wayz...

        1:  Use your fon to generate garbage tones.
        
        2:  Use a RED BOX (Tone Generator)
        

Let me explain

Follow the same guidelines as mentioned above.

When the CBV is about to hang... pick up the fon line.  Some CBV's try to
hang, so when you here a "click" hold the button "1" down until you here it
dial.  If it doesn't work try the number "2" ect ect...  then hit "ATA"

This sometimes (on some CBV's) will generate the needed Dial Tone and the
CBV will call you back.

If this doesn't work....

Try a RED BOX.  This can generate a multitude of frequencies, including Dial
Tone (2600 MHz).

When you are generating a DT, you will hear a "click" "click" "click",
usually three then it will dial the number you left.

Very fukin easy.


Loops:

Now, if you havn't a clue what Loops are get a good file from your local
H/P BBS and learn.

For those who know... you should be getting ideas.

Call the bbs, get the CBV going and put in the Loops, low end line number.
Then quickly call the high end and wait... when it calls just hit "ATA"


VMB's:

Again, if you don't know how to use them... go get a file and learn.

After hacking a codeline, you will gain certain access to the VMB.  If you
have a diverter number (used by that certain VMB) enter that number for the
CBV to call.  Call up the Diverter and use Call Forwarding on the VMB (*72)
You might be saying "Well, PiNK - how can I use CF on some other line?
Doesn't the VMB have to suscribe to it?  Well yes, but in some business
areas certain codes are free!  If you happen to have a VMB with this option
-----> USE IT.  If not, then look for one.

When you enter the VMB line for the CBV and use CF, then it should call you
back.  Just type "ATA"

If you are also wondering "Well PiNK... how do I get from Data to voice and
voice to data?

Command:  ATX1DT

This is so that when the CBV calls you can quickly get into and out of the
Data mode.  (Voice to Data)


Dialouts:

This is pretty self explanatory.

Call the bbs, enter the dialouts number, then call the dialout and wait. It
will call.


At this point... you should be able to get into any komputer using one of
these methods!

NO MORE CBV VERIFICATION FOR YOU!

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Thanks to everyone who helped me... No one!   Except for the original makers
of the file "CBV hackin".  Vince Neil of course.

To all those who came before... your knowledge wasn't wasted.
To all those who come after.... live, learn and hack.

Cheers!
PiNK



This page was created Wed Aug 11 23:14:02 EDT 1999
Using Linux version 2.0.32 on an i586

Main Page @ Matarese.com The Myth of the 2600Hz Detector @ Matarese.com       Acquiring Account Information @ Matarese.com      

Act2! by Symantec @ Matarese.com       All hacks / Annoyance @ Matarese.com      

Alt 2600 Group FAQ @ Matarese.com       Hacking Angelfire @ Matarese.com      

Anonymous E-Mail @ Matarese.com       Anonymous FTP: Frequently Asked Questions (FAQ) @ Matarese.com      

Maintaining Access - Implementing Backdoors @ Matarese.com       How to Receive Banned Newsgroups FAQ @ Matarese.com      

Hacking BBS's @ Matarese.com       phreaking tutorial @ Matarese.com      

The Bluebox @ Matarese.com       List of Common Bugs @ Matarese.com      

Things that go Bump on the Internet @ Matarese.com       Hacking Calling Cards @ Matarese.com      

Expanding the capacity of Caller ID Boxes @ Matarese.com       What is Caller-ID? @ Matarese.com      

      The Matarese Circle @ Matarese.com      

Cops and Robbers | UNIX Security @ Matarese.com       Credit Carding Part I @ Matarese.com      

Exploits FAQ @ Matarese.com       Making Free Calls @ Matarese.com      

FTP Bouncing @ Matarese.com       Hackers Encyclopedia @ Matarese.com      

Hacking from Windows9x FTP @ Matarese.com       Hacking Tripod @ Matarese.com      

Hacking Web Pages @ Matarese.com       How to crack a UNIX password file. @ Matarese.com      

Hacking Servers : A Begginners Guide @ Matarese.com       Hacking Tutorial @ Matarese.com      

Hacking UNIX @ Matarese.com       How to Hack the WWWboard Message Board 2.0 @ Matarese.com      

Hackers Handbook @ Matarese.com       Guide to Harmless-Hacking @ Matarese.com      

All about security holes @ Matarese.com       Hacking Hotmail @ Matarese.com      

]How to Hack from from Harlequin and Archangel @ Matarese.com       Improve security by breaking into your site @ Matarese.com      

Ch1can0 BEOWULF @ Matarese.com       Internet Security @ Matarese.com      

IRC Hacking FAQ by Lord Somer @ Matarese.com       Lan Technology Scorecard @ Matarese.com      

Harmless Hacking - Linux @ Matarese.com       INDEX @ Matarese.com      

Mail Spoofing Explained @ Matarese.com       Microsoft IIS Vulnerability @ Matarese.com      

Microsoft(Yuk) Index Server exposes IDs and Passwords @ Matarese.com       Intresting Microsoft Access 7.0 Trick @ Matarese.com      

MS Money 2.0 Back Door @ Matarese.com       Mind Your Own Business (MYOB) @ Matarese.com      

This Hack is for the OptiChat Original Chat Room @ Matarese.com       Internet Outdials @ Matarese.com      

Introduction to the Internet Protocols @ Matarese.com       Analysis of QueSO Performance @ Matarese.com      

Finger - ATTACKING FROM THE OUTSIDE @ Matarese.com       L0pht Security Advisory - Sendmail 8.7.5 @ Matarese.com      

Sniffer FAQ V 1.7 @ Matarese.com       SSPING/JOLT patches @ Matarese.com      

WORKING OUT-TELNETS @ Matarese.com       How do I post to a moderated newsgroup? @ Matarese.com      

What You Should Know About Computer Viruses @ Matarese.com       How can I protect myself from viruses and such? @ Matarese.com      

What is a trojan/worm/virus/logic bomb? @ Matarese.com       VMS Info (Password Cracking) @ Matarese.com      

HACKING THE WAL-MART ARMORGUARD COMPUTER PROTECTION SYSTEM @ Matarese.com       Using web proxies to disguise your IP address @ Matarese.com      

Dig up hidden CD Keys @ Matarese.com       X-Windows Security @ Matarese.com      

Copyright (C) 1999 - Matarese.com