vmb.txt 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326
  1. 0. First Words
  2. --------------
  3. Hi!
  4. This will be an article on what you can do with VMB's.
  5. I was not sure if I really could add anything new to this topic, but I think
  6. I can give you a complete list of "What they can do for you" and also I pro-
  7. mised this artcle to van Hauser so here it is.
  8. Don't blame me if you already know anything, again, it is WHY someone should
  9. concern about VMB's.
  10. There are quiete a lot of text files on VMB Systems and I will give
  11. you an overview of files which deal with the hacking of special systems at
  12. the end of this article.
  13. 1. Overview of what-do-to with VMB's
  14. ------------------------------------
  15. -use them as (simply) Voice-Mail
  16. -use them as 3rd party call possibility
  17. -use them to call for free
  18. -use them to make conferences
  19. -use them to find switching systems
  20. 2. Voice Mail
  21. -------------
  22. The originating thing why VMB's got invented. Suppose you have a company and
  23. 50 guys working there. Let's say you got 20 calls after hours on your
  24. answering machine and each one is for a different guy. So why not having a
  25. system where anybody can leave a message to the specific guy he wants?
  26. So each guy has his own mailbox where he gets his calls if he is away from
  27. his desk or not at home. If you connect to a voicemail, you will always get
  28. a prompt where normally you can leave a message to the company or if you know
  29. the extension of the guy you want to talk to to him directly.
  30. So within your own VMB, you can hear messages from outside callers or from
  31. someone within your company. That's the basis.
  32. If you want to hack a VMB, you always have to find where the 3 or 4 (the
  33. only system with 2 digit extensions I know is Partnell Mail from AT&T?)
  34. digit extension are, they are mostly grouped. You always have 2 possibilities,
  35. you can transfer to extensions and see if they do exist (meaning you hear
  36. some greetings) or enter a mailbox and see if it prompts with password.
  37. There are different systems but I suggest you always transfer to extensions
  38. because you can find interesting things (see later on). If you have a clue
  39. where the most extensions are, you can start hacking one box with trying
  40. passwords like 1234 or the boxnumber. I would never concern on more passwords
  41. because if no easy password fits, than the system is often better protected,
  42. and there are enough silly systems with stupid administrators you can hack.
  43. If you have hacked a box belonging to someone else, you should NEVER hear
  44. any mails, you just find free boxes belonging to noone by using the
  45. distribution list command or the message received command which exists on
  46. all systems. Normally you notice a free box (either when transfering to a
  47. box from outside or when using the commands from inside) when there is no
  48. greeting and just a message like 'extension 123' or 'record at the tone'.
  49. A very good way to locate boxes is to use the name-search which exists on
  50. almost any systems. Hear the company's greeting and they often tell some-
  51. thing like "press 9 to use the directory". Enter the beginnings of common
  52. names and you will get the person's extension number.
  53. So well, why should you hack a VMB and have a extension? Simply because
  54. it's quiete cool & useful to keep in contact with other hacker's.
  55. If you hack more extensions on one system, they invite your friends and
  56. have a big communication tool - tollfree! (Ah btw, NEVER ever hack voice-
  57. mail systems in your own country, because of the bust & trace possibility,
  58. but if you hack american systems on toll-free numbers [of course reachable
  59. from within your own country], you cannot be busted. At least not in Germany)
  60. The THC posse uses an Aspen system for more than 6 month with more than
  61. 20 extensions I hacked in September '95. Really, it is a big helpful tool to
  62. keep in touch with each other for free, and we do not only talk about hacking
  63. stuff, it is quiete funny to leave messages to the other's if you are drunken
  64. at a party or whatever!
  65. The most comfortable system in my eye's is Aspen from Octel ("Voice Infor-
  66. mation processing") which exits in different dimensions and cost up to
  67. $600.000. It has become -sad but true- hard to hack because most systems
  68. have no defaults anymore. The Aspen systems can be integrated into several
  69. switches and often has the bridge capacibility. (see later)
  70. 3. 3rd party calling
  71. --------------------
  72. I guess you know what this is. If not, you can pay calls over certain
  73. companies (e.g. MCI) which accept that a 3rd party pays all costs.
  74. You tell the operator to place a 3rd party call and he calls the number you
  75. give him to verify he will accept the charges. Because operators are dumb
  76. (well why they are just operators) and because of the good line quality,
  77. you can trick them with a VMB which has a greeting like "hallo? ah .... hmm
  78. (pause) ... yes ... I accept the charges".
  79. Well you ask, how can an american operator dial a toll-free number in Germany
  80. and enter an extension or what? In fact, many VMB systems have a direct dial
  81. (Especially Meridian's) and if it is an american company, of course in the
  82. states. (and this number can be dialed from the operator)
  83. Direct dial means that your extension is not only reachable over the main
  84. number (where you can enter the person's extension), it is reachable over
  85. a normal telephone number. Let's say the company originates in AC 718, and
  86. the company wants their guys (of course) to be called by customers. So they
  87. have a whole prefix which belongs to the company, The last four digits are
  88. for the guys in the company. If this company owns a VMB, the extensions of
  89. the guys normally are the last four digits of the phonenumber. So if you
  90. hacked extension 3000, and the company is located in 718-123-xxxx, your
  91. direct dial would be 718-123-3000. So go and ask the operator (by paging
  92. or within business hours) for their main number in the states, and they
  93. will tell you the things you need (AC, prefix). If they give you an 1-800
  94. number ask them for their fax number or whatever, to get the missing digits.
  95. If anything fails go and ask them for their direct dial.
  96. So know you can change your greeting to the one above and tell the operator
  97. to bill the call to 718-123-3000.
  98. Again, many companies already got abused and have restricted their whole
  99. prefix for accepting 3rd party calls, but it is always worth a try and MCI
  100. has good overseas lines from Germany.
  101. 4. Make free calls
  102. ------------------
  103. Remember the things of a direct dial. Think of the use of a PBX and
  104. what a PBX does. Bingo, of course if the company has PBX and has a direct
  105. dial, you can reach their dialtone toll-free. So if you are scanning a VMB
  106. (by transfering to the extensions) you may run over a dialtone which VERY
  107. often has no code on it. I think the systems which have the possibility of
  108. being a part of the PBX are limmited. Audix (by AT&T) and Meridian (by
  109. Northern Telecom) are worth a try and I have run over severals dialtones
  110. on these systems. I guess Aspen has the possibility too, but I never found
  111. anything. If you have a girlfriend which speaks a good english, you can try
  112. to social-engineer the extension where the dialtone is located. (Use a name
  113. which is really in the company you got from the names directory, say you
  114. are struck in Europe and forgot all your paper's with the extension. Better,
  115. [because not too many companies have agents which travel to Europe] you let
  116. your call look like it originates from the US by using the 3rd party call
  117. way or so. Or if you have hacked a box, page the operator from within the box,
  118. because he cant see where your call is originating from!)
  119. Anyway if you are struck by scanning the system but you do think it really
  120. must have a dialtone (probably because the company is so big and has direct
  121. dial), go and do social-engineering, especially after hours, because these
  122. operator are unsophisticated and often have no idea of fraud. At business
  123. time, they could connect you to security (oops) or they even are the security
  124. operator (ooooops).
  125. There is also a way to call for free if the VMB system has the ability to for-
  126. ward calls. If you want that all calls after hours are forwarded to your home
  127. phone, you enter configure this within your box. Many bigger systems like
  128. Audix do have the capacibility, but it is disabled very often. Smaller
  129. systems like Cindy or The Message Desk have this feature not disabled and you
  130. can use it to divert your calls by entering the phone number you want within
  131. your hacked box and then transfer to your own hacked extension which will
  132. forward the call to your favourite BBS.
  133. As small bonus, I include a special section on The Message Desk systems,
  134. because I haven't found any text file about it and because Germans can abuse
  135. Message Desk Systems in UK very easy! A big Thanks & GOOD LUCK! to Krew-l-t
  136. who introduced me to this neat system.
  137. Well basically when you dial press # and then enter a box number...most
  138. are unpassworded...to find extensions dial in and press * then dial
  139. 3 digits or 4 (there is also boxes 1,2 and 3). If you hear no special
  140. greeting then enter this box number and if it has no password, you have your
  141. own box. You can also use boxes belonging to someone IF he hasnot activated
  142. call-forwarding; he would be quiete anxious if he is awaiting calls at his
  143. home and all guys will get connected to LORE BBS :). So always change the
  144. number back after you used it. Once in a box do 7 then 7 again...then 2, then 9+ the number you wannt to reach then #, then # again,
  145. then * twice, then the box number you wannt to divert to.
  146. There is a special possibility to dial out on Meridian voicemail system. There
  147. are certain extensions you can transfer to and hear nothing. You may have
  148. found the outdial code. Try to transfer to this extension and add a number.
  149. Let's say at extension 1234 you hear nothing. If you dial 1234+00-cc-number
  150. you may be connected to your desired target. Especially systems in the UK
  151. often have this outdial possibility, and since you have unlimmited tries for
  152. scanning extensions, you can find them quiete easily. Of course, any Meridian
  153. in any country has this possibility, but it must not be set up on the system.
  154. Something you may also try is to key in certain digits at the main prompt
  155. (the one with the company's greeting) and I sometimes got a dialtone just by
  156. pressing 9 at this prompt.
  157. 5. Conferences
  158. --------------
  159. Probably you have visited the DefCon Voice bridge in the USA. You can find
  160. something like this on Meridian, Aspen and Audix Systems. Basicly, it is the
  161. same thing as with the outdial code. You enter extensions and if you hear
  162. nothing, but it is not an outdial, it may be a conference setup. The Analyst
  163. for example found a conferences for 8 people on a Meridian in Germany.
  164. Let's say there was 2000 and then silence, but 2000+00-cc-number didnot work.
  165. So he tried something and when entering 200008 a voice said "Conference set
  166. up for 8 persons." They could connect to the conference when dialing 2000X1.
  167. If you ever want to be a part of our great conferences we hold from time to
  168. time just contact me or any of the THC crew.
  169. On Audix systems, you hear a special bridge-tone when you have found a
  170. conference extension. Check up if someone may transfer to this extension
  171. at the same time and you can speak to each other now, or try extensions near
  172. the bride extensions, or something like this.
  173. But be careful, you might stumble into existing conferences sometimes!
  174. (But it may be quiete funny to be a part of them!)
  175. 6. Switching Systems
  176. --------------------
  177. In my opinion, this is the interesting part now, becuase it can give you a
  178. lot of power if you have managed it to hack a switching system through a
  179. voice mail system.
  180. Almost all voice mail systems are a part of a switching system, but there
  181. are certain systems that are ONLY for voicemail. Let's say you have a big
  182. switching system of the Definity Series from AT&T. You can integrate a voice
  183. mail (in this case Audix) into your PBX System. You have the possibility to
  184. set up an extension to maintain your PBX, let's say your company owns
  185. 645-xxxx. You can setup the dial-in port on extension 645-9999, and if
  186. you dial 645-9999, you will be connected to a terminal where you can setup
  187. or maintain the WHOLE PBX system. (Well I guess nothing new for you guys.)
  188. If you have a voicemail system, you can setup the dial-in port also to be
  189. reachable through your voicemail, so let's say you transfer to extension 9999
  190. and bingo, you get the carrier. This is very interesting, because it
  191. is a great possibilty to reach a switching system from outside a country
  192. trough a toll-free number. Audix voicemail e.g. is often integrated into
  193. the Definity Series (System 75 and 85; the G1 - G3 series), so the chance
  194. of finding a Sys75 on an Audix extension is quiete high. BUT I suggest that
  195. you give this up. Why? Because AT&T changed ALL default login's and password's
  196. due to a massive abuse in the States. I talked to a woman from Lucent on
  197. the CEBIT this year (she is in the toll-fraud prevention center), and she
  198. said that they still ship the Definity Series with the defaults, BUT their
  199. technicians are told to change them. You may try the looker/browser account
  200. but in general, you have no chance of entering the system easiely. Of course,
  201. social-engeneering is a possibility. You should concentrate on the switches
  202. from Nortel. (Sl-1 series etc.) A Meridian Voice Mail system is sometimes
  203. integrated into this PBX system, and the hacking is quiete easy.
  204. A SL-1 switch answers like this:
  205. OVL111 IDLE and has different signs on the screen like TTY and such.
  206. (Check the reference article; read the end of this file)
  207. To logon, you type LOGI and it responds with PASS?.
  208. The older SL-1 switch ONLY allows a 4 digit numeric code and you have
  209. UNLIMMITED tries, so fuck, write a script and you are in FAST!
  210. The newer one (sigh) allows 16? signs so give it up.
  211. Once in, you can setup DISA's and more ... remember, if you have access
  212. to a switching system, you can do ALL with their telephone system.
  213. (Even shut-down if you are malicious).
  214. You sould be abled to access a ROLM CBX system through Phonemail, but
  215. I never found this myself.
  216. 7. End / Contact the author
  217. ---------------------------
  218. I hope you found this article enjoyable to read and know, why to concern
  219. with VMB's now. Something I wanted to add: DON'T think you cannot hack
  220. those systems and their PBX systems, because most technicians are not
  221. half that intelligent as you are. The often chose simple passwords and
  222. left a backdoor open. I know it myself, because I'm a low-level technician
  223. of a German PBX system and the technician who installed the whole system
  224. was really stupid without any knowledge that got behind his manual.
  225. To maintain the system for me was really hard because of the bad setup.
  226. I'll write a file about German PBX systems later this year.
  227. (Octopus from Telekom, HiCOM from Siemens and 4000 series from Alcatel)
  228. BTW, use the WWW to gain good informations about anything! Use
  229. Lycos and you will get a lot of interesting pages with stuff for you,
  230. concerning VMB's and PBX systems.
  231. To contact me from within Germany, dial 0130-817698 and leave mail to
  232. extension 2389. From outside Germany, please call +1-510-624-7120 and
  233. leave me a voicemail. Or call LORE BBS in Germany to leave me a mail,
  234. or you can also ask any THC member how to reach me. And yes, I am
  235. on IRC sometimes, try to catch me in #bluebox.
  236. -WiLKiNS!
  237. 8. Appendix
  238. -----------
  239. NOTE: These are ONLY the *best* textfiles I found about these VMB systems.
  240. I didn't put a description of hacking tools for boxes in too, because
  241. hacking boxes with tools is senseless once you have one valid box on
  242. the system.
  243. General
  244. -------
  245. tao90-04.zip
  246. This file describes a lot of VMB systems and their features. Short-cut,
  247. but the best you can get! Written by (?) accidential tourist.
  248. Aspen
  249. -----
  250. aspen1.zip
  251. aspen2.zip
  252. Both files were written by CaveMan and are also distributed under caveasp.zip
  253. They give you a good overview about the commands and on how-to-hack.
  254. NOTE: The 3-digit-error is STILL found very often!
  255. Audix
  256. -----
  257. cotno01.zip
  258. audexvp.zip
  259. The article from DeadKat in the Cotno Mag #1 is about the hacking of Audix;
  260. the second one is from Crazybyte. It contains some mistakes but reading it
  261. is still worthwhile.
  262. Cindy
  263. -----
  264. cinditut.zip
  265. The Cindy system is not very common, but quiete nice.
  266. Article from Slycath.
  267. Meridian Voice Mail
  268. -------------------
  269. cotno04.zip
  270. mmail.zip
  271. Again, DeadKat brings us an excellent article in Cotno Mag #4. (He, please
  272. contact me if you read this!) The other one is from ColdFire and concerns
  273. about the setup of the voicemail system through the computer extension.
  274. ROLM CBX / Phonemail
  275. --------------------
  276. rolm-01.zip
  277. 9x_rlmpn.zip
  278. The first article from OleBuzzard deals with the PBX system; the second
  279. one from Substance is on how to setup Phonemail through the dial-in port.
  280. SL-1
  281. ----
  282. phrack44.zip
  283. The article from IceMan in Phrack #44 is a good article for beginners.
  284. It introduces the features of the SL-1 series and gives a command overview,
  285. but it doesnot explain enough on the programming. Where is the promised
  286. part 2? Nortel "secures" its systems with a variety of abbreviations, so
  287. you must have a manual or simply have to guess. Special Info: If you
  288. try something, and you want to cancel the commands, press **** and you
  289. will be back at the main screen.
  290. System 75
  291. ---------
  292. cotno01.zip
  293. You see, Cotno is really a great mag. The article from Panther Modern is
  294. one of the best one's about System 75, and there are a lot of them.
  295. Greets,
  296. WiLKiNS
  297.