PBX's (Private Branch Exchanges) and WATS By Steve Dahl Because of the danger of using a blue box, many phreakers have turned to MCI, sprint, and other SCC's in order to get free calls. However, these services are getting more and more dangerous, and even the relatively safe ones like metrofone and all-net are beginning to trace and bust people who fraudulantly use their services. However, (luckily), there is another, safer way. This is the local and WATS PBX. There will at least 1 line going out of the PBX to the telco set up for outgoing calls only, and there will also be at least one incoming line to the switchboard. This is what we are interested in. Some of the incoming lines are always answered by the switchboard operator, but some will be answered by the PBX equipmemt. It will usually answer with a dialtone, the tone will sound different for different systems. Some even answer with a synthesized voice! (These are very hard to find, though.) The ones which answer with a dialtone are easy to find if you have a modem or hardware device which can "hear" what's going on on the phone line. To find these fun thingies, you will have to write a scanner program which will dial each number in a pre- fix, either sequentially or in a random order, it really doesn't matter, and "listen" on the line for a constant sound longer than the normal length of a ring. This could be done manually but it would take a hell of a long time. Whenever the program finds a number that makes a constant tone longer than a ring, it should record the number in an array or something. Now, this number can be one of a few things. A noisy answering machine, a sprint, MCI, etc access node, a person who yells in the fone, the tone side of a loop (nice), possibly a carrier if your modem can "hear" tones that high, or, hopefully, a PBX line. All your scanning should be done between 6 PM and 7 AM because between 7 AM and 6 PM, many of these numbers will be answered by the switchboard operator. When you are checking out your results the next day and come accross a dialtone, enter some touch-tone (TM) digits. Depending on which type of PBX equipment and the length of the codes, after 3-8 digits it should either give a busy signal, a "reeler tone" (high-low tone), or hang up on you, or possibly tell you you entered a bad code. Now it is time to write a hacker for this PBX. If the codes are 3 or 4 digits, there will most likely only be one code, but if they are 5 or more digits there may be more than one. If there are 3 or 4, your hacker should dial the access number, wait for a dialtone, then dial the digits and wait for a second, then dial a "1" (the reason for this will be explained shortly), and then "listen" for a dialtone. This would be a hacker for a system that gives a reeler tone, listening for the dial- tone and hearing it would really mean the presence of the reeler tone and mean that a bad code had been entered. The reason 1 is entered is to "quiet" the dialtone" If it was a good code, 1XX or 1XXX will be valid extentions on practically all PBX's. If your system gives a re-order or hangs up after a bad code, forget the one and just listen for a dialtone, this will be a good code. If there are 3 or 4 digits, they should be tried sequen- tiallly (becuase there will probably only be one good one), if there are more, take your pick between random and sequental. Now, when you (finally!!) get a good code, you will call the number and enter the code and be confronted with a second dialtone. THIS IS THE EXACT SAME DIALTONE THAT ANYONE WHO PICKS UP A PHONE IN THAT PBX SYSTEM GETS. The reason this is important is because if they want to make an out- going call, they will usually pick up the fone and dial 8, 9, or sometimes 7, and get another dialtone and then make their call, local or long distance. And you can do the same thing right now! These numbers also make a good tool to avoid being traced on telenet, etc, it will just be traced back to the company which owns the PBX. Now for some phun with the PBX you have just broken into to. You can dial all extentions directly on it (which is what local PBX'S are primarially used for legitimately, unless the com- pany has OUTWATS lines.) The most phun extention of all is the PA system. On some of these, you can get on the PA (intercom) and actutually talk over it from your house! It can be on almost any extention though, so you may have to hunt for it. On some, 797 or 1234 used to work, but those have mostly been eliminated, not due to phreakers but because people inside the company were figuring them out and using them! Some PBX's don't even have security codes, you can just call up and dial 9 and call wherever you want. On a few that I know of you enter the number and then the code. If you want to know what these systems "sound" like, there are files on this and other systems with long lists of WATS PBX numbers. The local ones are much safer to hack though because you are not making a whole bunch of 800 calls which tends to get bell very pissed. Also, I have actually found modems and other wierd things on some exchanges of PBX's, it might be worthwhile to scan the numbers inside the PBX once to see what you find. An important safety note: if you heavily abuse a TBX and make many outgoing calls on it, after a few weeks (or whenever their fone bIll shows up!) it is a good idea to lay off of it for a couple of months or so because they could get a trace on it easilly, just like 800's. They will usually just change the code, though. One more interesing note, I once found a PBX which had a direct link- up to sprint! So by dialing 8 I got a line to sprint, no access codes, just area code and number. It's phun to phuck up sprint and have them not know who the hell you are or where the hell you are!! If you have any comments, suggestions, corrections, or questions, leave e-mail to Steve Dahl on any major phreak board, I will be happy to reply. Steve Dahl 5/1/84 This phile is copyrighted 1984 by Steve Dahl and is not to be re-posted without the author's consent! And I'm not kidding!! [Courtesy of Sherwood Forest ][ - (914) xxx-xxxx]
This page was created Wed Aug 11 23:33:43 EDT 1999
Using Linux
version 2.0.32
on an i586
Main Page @ Matarese.com
The Myth of the 2600Hz Detector @ Matarese.com
Acquiring Account Information @ Matarese.com
Act2! by Symantec @ Matarese.com
All hacks / Annoyance @ Matarese.com
Alt 2600 Group FAQ @ Matarese.com
Hacking Angelfire @ Matarese.com
Anonymous E-Mail @ Matarese.com
Anonymous FTP: Frequently Asked Questions (FAQ) @ Matarese.com
Maintaining Access - Implementing Backdoors @ Matarese.com
How to Receive Banned Newsgroups FAQ @ Matarese.com
Hacking BBS's @ Matarese.com
phreaking tutorial @ Matarese.com
The Bluebox @ Matarese.com
List of Common Bugs @ Matarese.com
Things that go Bump on the Internet @ Matarese.com
Hacking Calling Cards @ Matarese.com
Expanding the capacity of Caller ID Boxes @ Matarese.com
What is Caller-ID? @ Matarese.com
Hacking Call Back Verify @ Matarese.com
CULT OF THE DEAD COW @ Matarese.com
Cellular Roaming: The New Deals @ Matarese.com
CELLULAR TELEPHONE PHREAKING PHILE SERIES @ Matarese.com
Cracking Unix passwords @ Matarese.com
Hacking Webpages @ Matarese.com
The Matarese Circle @ Matarese.com
Cisco Password Cracking Script @ Matarese.com
Customer Name and Address @ Matarese.com
Cops and Robbers | UNIX Security @ Matarese.com
Cracking NT Passwords @ Matarese.com
Odins cracking/coding and PPE resources @ Matarese.com
Credit Carding Part I @ Matarese.com
How do I defeat Copy Protection? @ Matarese.com
What are the DTMF frequencies? @ Matarese.com
Exploits FAQ @ Matarese.com
Making Free Calls @ Matarese.com
FTP Bouncing @ Matarese.com
Hackers Encyclopedia @ Matarese.com
The Conscience of a Hacker / Hacker Manifesto @ Matarese.com
Hacking from Windows9x FTP @ Matarese.com
Hacking Tripod @ Matarese.com
Hacking Web Pages @ Matarese.com
How to crack a UNIX password file. @ Matarese.com
Hacking Servers : A Begginners Guide @ Matarese.com
TIPS FOR TRACKING HACKERS @ Matarese.com
Hacking Tutorial @ Matarese.com
Hacking UNIX @ Matarese.com
How to Hack the WWWboard Message Board 2.0 @ Matarese.com
Hackers Handbook @ Matarese.com
Guide to Harmless-Hacking @ Matarese.com
All about security holes @ Matarese.com
Hacking Hotmail @ Matarese.com
How to crack by +ORC complete tutorial in one file (BIG!) @ Matarese.com
]How to Hack from from Harlequin and Archangel @ Matarese.com
Improve security by breaking into your site @ Matarese.com
Ch1can0 BEOWULF @ Matarese.com
Internet Security @ Matarese.com
Bugs and Backdoors in IRC clients, scripts and bots @ Matarese.com
IRC Hacking @ Matarese.com
FAQ for Trading For FileZ in IRC @ Matarese.com
Creating a Xdcc offer bot for irc @ Matarese.com
Integrated Systems Digital Network @ Matarese.com
Everything you should know about computer viruses @ Matarese.com
Lan Technology Scorecard @ Matarese.com
Local Area Signalling Services (LASS) and Custom Calling Feature Control Codes @ Matarese.com
Harmless Hacking - Linux @ Matarese.com
INDEX @ Matarese.com
Loops wanted! @ Matarese.com
Mail Spoofing Explained @ Matarese.com
Microsoft IIS Vulnerability @ Matarese.com
Microsoft(Yuk) Index Server exposes IDs and Passwords @ Matarese.com
Intresting Microsoft Access 7.0 Trick @ Matarese.com
MS Money 2.0 Back Door @ Matarese.com
Mind Your Own Business (MYOB) @ Matarese.com
Nameserver listing! @ Matarese.com
Newbies handbook / HOW TO BEGIN IN THE WORLD OF H/P @ Matarese.com
Bugs in Windows NT (Too many to list here completely...) @ Matarese.com
This Hack is for the OptiChat Original Chat Room @ Matarese.com
Internet Outdials @ Matarese.com
Pager Frequencies @ Matarese.com
Password Recovery Techniques @ Matarese.com
How to Steal Local Calls from Most Payphones @ Matarese.com
Introduction to the Internet Protocols @ Matarese.com
Analysis of QueSO Performance @ Matarese.com
Finger - ATTACKING FROM THE OUTSIDE @ Matarese.com
L0pht Security Advisory - Sendmail 8.7.5 @ Matarese.com
Sniffer FAQ V 1.7 @ Matarese.com
SSPING/JOLT patches @ Matarese.com
WORKING OUT-TELNETS @ Matarese.com
How do I post to a moderated newsgroup? @ Matarese.com
What You Should Know About Computer Viruses @ Matarese.com
How can I protect myself from viruses and such? @ Matarese.com
What is a trojan/worm/virus/logic bomb? @ Matarese.com
VMS Info (Password Cracking) @ Matarese.com
HACKING THE WAL-MART ARMORGUARD COMPUTER PROTECTION SYSTEM @ Matarese.com
Using web proxies to disguise your IP address @ Matarese.com
Dig up hidden CD Keys @ Matarese.com
X-Windows Security @ Matarese.com
Copyright (C) 1999 - Matarese.com