



                               ==Phrack Inc.==



                  Volume Two, Issue Nineteen, Phile #1 of 8



                                    Index

                                    =====



  Welcome to Phrack Issue Nineteen!  You will notice it is not as long as the

last Phrack but this is the month of SummerCon and plans have been made for

that.  If you are interested just check PWN for details.  Also, we do need

writers, so if you have a phile or know someone who does, please get in

contact with me.  The next issue of Phrack will be full size again, but since

it is summer we all slowed down a bit.  Don't worry though, Phrack will still

come out every month.  Well, see you at SummerCon!

                                               Crimson Death

                                        Sysop of The Forgotten Realm



Contents:

#1  Phrack Inc. Index by Crimson Death                         (02k)

#2  DCL Utilities for VMS Hackers by The Mentor                (23k)

#3  Digital Multiplexing Systems (Part 2) by Control C         (18k)

#4  Social Security Number Formatting by Shooting Shark        (03k)

#5  Facility Assignment & Control Systems by Phantom Phreaker  (11k)

#6  Phrack Editorial on Microbashing by The Nightstalker       (06k)

#7  Phrack World News XVIV (Part 1) by Knight Lightning        (04k)

#8  Phrack World News XVIV (Part 2) by Epsilon                 (06k)

==============================================================================



                               ==Phrack Inc.==



                     Volume Two, Issue 19, Phile #2 of 8



                       DCL Utilities for the VMS Hacker

                       >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

                                      By

                                  The Mentor



                       Special thanks to Silver Spy for

                   turning me onto DCL in the first place!

------------------------------------------------------------------------------



     Anyone who spends time hacking on VAXes (by hacking, I don't just mean

trying to get in... I mean *doing* something once you're in!) notices that the

DCL command language is extremely powerful.  I have put together a selection

of utilities that not only should prove helpful to the hacker, but serve as a

good example of programming in DCL.

     Every attempt has been made to preserve unchanged the user-environment

from the initialization of the file to the exit.  Any session-permanent

changes are documented.



                            Brief Overview of DCL

                            >>>>>>>>>>>>>>>>>>>>>



     There are numerous files out there on DCL (the VMS help files are the

best place to find information), so I'm not going to teach you how to program

in it.  To use the following code, isolate the section of code you want in

your favorite text editor, upload it into a file, and name the file

<progname>.COM.  Anytime you see a file ending with .COM, you know it's a DCL

file.  DCL files are executed by issuing the command

                       $@FILENAME

or, in the case of a file you want to run as a separate process,

                       $SPAWN/NOWAIT @FILENAME



                              Table of Contents

                              >>>>>>>>>>>>>>>>>



     1. CD.DOC     :  This is the documentation for CD.COM (and the only

                      documentation file in the bunch.

     2. CD.COM     :  A change directory utility, much like the PC command

                      CD, except more powerful.  $SET DEFAULT is a pain in

                      the ass!

     3. HUNT.COM   :  Searches a specified node for a given user.  Useful

                      for alerting you to the presence of a sysop.

     4. ALARM.COM  :  An alarm clock.  If they check the logs at 8 a.m., you

                      probably want to be off before then.

     5. CGO.COM    :  Included because it's short.  Allows you to compile,

                      link, and run a C program with a one-line command.





     I have about 300 more pages of COM files.  If you need anything, drop me

a line.  I'll try and help out.  I can be found on Forgotten Realm, or you can

call a non-hacker (local to me) IBM game board if it's an urgent message (The

Bastille-- 512/353-0590  300/1200  24 hrs.  It's not the best hacker board in

the world, but my mail arrives daily...)



     Also, if programming of this type interests you, let me know!  I'm

considering putting up a board for the discussion of programming (compilers,

AI/Expert Systems, Op Systems, etc...).  If I get enough positive response,

I'll go with it.  Leave mail on the aforementioned systems.



                                                The Mentor









       CD.COM   Version 5.0   VMS Change Directory Command





       Sub-directories are a nice feature on many computers, but

       they're not always easy to take advantage of.  The VMS

       commands to access sub-directories are a little obscure,

       even to PC programmers who are used to using directories.



       The solution?  CD.COM, a change directory command that works

       almost the same as the PC-DOS CD and PROMPT commands:



          CD              - Display your home directory, current

                            directory, and node name.  (Similar to, but

                            better than the VMS SHOW DEFAULT command.)



          CD dir_name     - Move you to the [dir_name] directory.

          CD [dir_name]     (Same as the SET DEFAULT [dir_name] command.)



          CD .sub_name    - Move you to the [.sub_name] subdirectory.

          CD [.sub_name]    (Same as the SET DEFAULT [.sub_name] command.)



          CD \            - Move you to your home (root) directory, which

          CD HOME           is the directory you are in when you login.

          CD SYS$LOGIN      (Same as the SET DEFAULT SYS$LOGIN command.)



          CD ..           - Move you to the directory above your

          CD [-]            current directory. (Same as the VMS

                            SET DEFAULT [-] command.)



          CD ..sub_name   - Move you "sideways" from one subdirectory

          CD [-.sub_name]   to another subdirectory. (Same as the

                            SET DEFAULT [-.sub_name] command.)



          CD *            - Select a subdirectory to move to, from a

                            list of subdirectories.



          CD .            - Reset the current directory.



          CD ?            - Display instructions for using CD.



       The VMS SET DEFAULT command has a flaw: you can change

       directories to a directory that doesn't exist.  CD handles this

       more elegantly; you're left in the same directory you were in

       before, and this message appears:



            [dir_name] Directory does not exist!



       PC-DOS lets you display the current directory as part of the

       prompt.  (If you haven't seen this feature, try the PC-DOS

       command PROMPT $P$G.)  CD.COM will change the prompt for you

       each time you change directories if you include this line in

       your LOGIN.COM file:



          DEFINE SYS$PROMPT "ON"



       Without this line, your prompt is not changed from what you

       have it set as.  Instead, your home (root) directory name,

       current directory name, and node name are displayed whenever

       you issue the CD command.



       Since VMS allows prompts to contain no more than 32 characters,

       if you change to a subdirectory that would make your prompt too

       long, CD automatically leaves off some of the higher level

       sub-directories to keep your prompt short, and displays a "*"

       as one of the prompt characters.



       CD lets you use directory names defined with with the DEFINE

       command.  For example, if you're in one of Dr. Smiths' CS3358

       classes, you might want to define his CS3358 assignments

       directory like this:



          DEFINE SMITH "DISK$CS:[CS.SMITH.3358]"



       Then, CD SMITH would move you to this directory.  Try it!

       Also, some directories are already defined by the system.

       The SHOW LOGICAL command will give you clues to some of these

       system directories, if you want to go exploring.  CD also

       supports the use of symbols for directory names.



       Like with PC-DOS, VMS directories and sub-directories are tree

       structured.  The system root directory for your disk has the

       name [000000], and in it are the names of all the sub-directories

       for your disk.  The directories for an imaginary user, CS335825305,

       would be located like this:



  System Root Directory:

                                  [000000]

                               .   .   .   .

  CS3358 Directories:    .        .     .        .

                   .             .      *.             .

       ... [CS3358251]   [CS3358252]   [CS3358253]   [CS3358254] ...

                                      .   .      .

  CS3358253 Directories:        .         .           .

                          .              *.               .

       ... [CS3358253.04HOPE]   [CS3358253.05JONES]   [CS3358253.06KEY] ...

                                       .    .

  CS335825305 Directories:            .      .

                                    *.       *.

                 [CS3358253.05JONES.MAIL]  [CS3358253.05JONES.BULL]





       If you're not using sub-directories, but want to, you can

       create them with the CREATE command:



           CREATE/DIR  [.sub_name]



       VMS allows directories to be seven or eight levels deep, but

       one or two levels is enough for most users.



       VMS also allows the symbols < and > to be used instead of

       [ and ], to specify directory names. CD fully supports this.



                               Code for CD.COM

                               >>>>>>>>>>>>>>>



$! CD.COM v6.09

$! The Ultimate Change Directory Command.

$!

$  hdir     = f$trnlnm("SYS$LOGIN")                 ! Home Directory

$  ndir     = f$edit(p1,"UPCASE")                   ! New  Directory

$  odir     = f$environment("DEFAULT")              ! Old  Directory

$  prompton = (f$edit(f$trnlnm("SYS$PROMPT"),"UPCASE") .eqs. "ON")

$!

$  if (ndir .eqs. "")           then goto DISPLAY   ! No Dir

$  if (ndir .eqs. "*")          then goto DIRSEARCH ! Search for Dirs

$  if (ndir .eqs. "?")          then goto HELP      ! Instructions

$!

$  PARSE:

$  length   = f$length(ndir)                        ! Fix up ndir

$  if (f$location("@",ndir) .eq. 0) .or. -

      (f$location("$",ndir) .eq. 0) then ndir = f$extract(1, length - 1, ndir)

$  right    = f$location("]",ndir) + 1

$  if (right .gt. length) then right = f$location(">", ndir)

$  if (right .le. length) then ndir  = f$extract(0, right, ndir)

$!

$  if (f$trnlnm(ndir) .eqs. "") then goto CASESYM   ! Not Logical Name

$     ndir   = f$trnlnm(ndir)                       ! Logical Name

$     goto PARSE

$!

$  CASESYM:

$  if ("''&ndir'" .eqs. "")     then goto CASE0     ! Not Symbol

$     ndir = 'ndir'                                 ! Symbol

$     goto PARSE

$!

$  CASE0:

$  len_ndir = f$length(ndir)                        ! Regular Dir

$  if (f$location("[", ndir) .lt. len_ndir) .or. -

      (f$location("<", ndir) .lt. len_ndir) then goto SETDIR

$!

$  CASE1:                                           ! Home Dir

$  if ((ndir .nes. "HOME") .and. (ndir .nes. "\")) then goto CASE2

$     ndir = hdir

$     goto SETDIR

$!

$  CASE2:                                           ! . .. .dir

$  if (f$location(".", ndir) .nes. 0) then goto CASE3

$     if (ndir .eqs. "..") then ndir = "-"

$     if (f$extract(0, 2, ndir) .eqs. "..") -

         then ndir = "-" + f$extract(1, len_ndir - 1, ndir)

$     ndir = "[" + ndir + "]"

$     if (ndir .eqs. "[.]") then ndir = odir

$     goto SETDIR

$!

$  CASE3:                                           ! :

$  if (f$location(":", ndir) .ge. len_ndir) then goto CASE4

$     left    = f$location(":", ndir) + 1

$     symbol  = f$extract(left, 1, ndir)

$     if (symbol .eqs. ":")  then goto CASE3B       ! :: Node

$     if ((symbol .eqs. "[") .or. (symbol .eqs. "<")) then goto SETDIR

$        ndir = f$extract(0, left, ndir) + "[" -

              + f$extract(left, len_ndir - left+1, ndir) + "]"

$     goto SETDIR

$!

$  CASE3B:                                          ! NODE::nothing

$  if (f$length(ndir)-1 .gt. left) then goto CASE3C

$     ndir = ndir + "[000000]"

$     goto SETDIR

$!

$  CASE3C:                                          ! NODE::directory

$  if ((f$location("[", ndir) - f$location("<", ndir)) .ne. 0) -

      then goto SETDIR

$

$     ndir = f$parse(ndir,,,"NODE") + "[" + f$parse(ndir,,,"NAME") + "]"

$     goto SETDIR

$!

$  CASE4:                                           ! dir

$  ndir = "[" + ndir + "]"

$!

$  SETDIR:

$  set default 'ndir'

$  if (f$parse("") .eqs. "") then goto DIRERROR

$!

$  DISPLAY:

$  if ((ndir .nes. "") .and. prompton) then goto NODISPLAY

$     hnode = f$getsyi("NODENAME")

$     cnode = f$parse(f$trnlnm("SYS$DISK"),,,"NODE") - "::"

$     if (cnode .eqs. "") then cnode = hnode

$     cdir  = f$environment("DEFAULT")

$     write sys$output " "

$     write sys$output "          Home Node: ", hnode

$     write sys$output "     Home Directory: ", hdir

$     if (cdir .eqs. hdir) .and. (cnode .eqs. hnode) then goto DISPSKIP

$     write sys$output "       Current Node: ", cnode

$     write sys$output "  Current Directory: ", cdir

$  DISPSKIP:

$     write sys$output " "

$!

$  NODISPLAY:

$  ndir = f$environment("DEFAULT")

$  if .not. prompton then goto END

$!

$  if (f$length(ndir) .ge. 32) then goto TOOLONG

$!

$  SETPROMPT:

$  set prompt = 'ndir'" "

$!

$  END:

$  exit

$!

$  DIRERROR:

$  write sys$output " "

$  write sys$output "          ", ndir, " Directory does not exist!"

$  write sys$output " "

$  set default 'odir'

$  ndir = odir

$  goto NODISPLAY

$!

$! Prompt Problems------------------------------------------------------------

$!

$  TOOLONG:

$! Prompt is too long. Get rid of everything to the left of [ or <. If that

$! doesn't work, get rid of a subdirectory at a time.  As a last resort,

$! set the prompt back to $.

$!

$  left     = f$location("[", ndir)

$  len_ndir = f$length(ndir)

$  if (left .ge. len_ndir) then left = f$location("<",ndir)

$  if (left .gt. 0) .and. (left .lt. len_ndir) -

      then ndir = f$extract(left, len_ndir - left, ndir)

$!

$  STILLTOOLONG:

$    if (f$length(ndir) .lt. 32) then goto SETPROMPT

$    left     = f$location(".", ndir) + 1

$    len_ndir = f$length(ndir)

$    if left .ge. len_ndir then ndir = "$ "

$    if left .ne. len_ndir -

        then ndir = "[*" + f$extract(left, len_ndir - left, ndir)

$    goto STILLTOOLONG

$!

$! Wildcard Directory---------------------------------------------------------

$!

$  DIRSEARCH:

$  error_message = f$environment("MESSAGE")

$  on control_y then goto DIREND

$  on control_c then goto DIREND

$  set message/nosev/nofac/noid/notext

$  write sys$output " "

$  dispct = 1

$  dirct  = 0

$  pauseflag = 1

$!

$  DIRLOOP:

$    userfile = f$search("*.dir")

$    if (userfile .eqs. "") .and. (dirct .ne. 0) then goto DIRMENU

$    if (userfile .eqs. "") then goto DIRNONE

$    dispct = dispct + 1

$    dirct  = dirct  + 1

$    on severe then $ userprot = "No Priv"

$    userprot = f$file_attributes(userfile,"PRO")

$    if userprot .nes. "No Priv" then userprot = " "

$    userfile'dirct' = "[." + f$parse(userfile,,,"NAME") + "]"

$    userprot'dirct' = userprot

$    lengthflag = (f$length(userfile'dirct') .gt. 18)

$    if lengthflag then write sys$output -

        f$fao("  !3SL   !34AS  ", dirct, userfile'dirct'), userprot'dirct'

$    if (.not. lengthflag) then write sys$output -

        f$fao("  !3SL   !20AS  ", dirct, userfile'dirct'), userprot'dirct'

$    if (dispct .lt. 8) then goto DIRLOOP

$    dirct  = dirct  + 1

$    userfile'dirct' = ""

$    dirct  = dirct  + 1

$    userfile'dirct' = ""

$    if pauseflag then goto DIRMENU

$    dispct = 0

$    goto DIRLOOP

$!

$  DIRMENU:

$  write sys$output " "

$  if (userfile .eqs. "") then goto DIRMENU2

$     write sys$output "    M   More subdirectories"

$  if pauseflag then -

$     write sys$output "    N   More subdirectories/No pause"

$!

$  DIRMENU2:

$     write sys$output "    R   Re-Display subdirectories"

$     write sys$output "    Q   Quit (default)"

$

$  DIRINQUIRE:

$  write sys$output " "

$  inquire dirchoice "  Select One"

$  write sys$output " "

$!

$  if (dirchoice .gt. 0)    .and. -

      (dirchoice .le. dirct) then goto DIRCASEDIGIT

$  dirchoice = f$edit(dirchoice,"UPCASE")

$  if (dirchoice .eqs. "")  .or. -

      (dirchoice .eqs. "Q")  then goto DIRCASEBLANK

$  if (dirchoice .eqs. "M") .or. -

      (dirchoice .eqs. "N")  then goto DIRCASEMORE

$  if (dirchoice .eqs. "R")  then goto DIRCASERED

$!

$  DIRCASERROR:

$  if (dirct .eq. 1)   then write sys$output -

      "  Select 1 to change to the ", userfile1, " subdirectory. "

$  revdirct = dirct

$  if (dispct .eq. 8) then revdirct = revdirct - 2

$  if (dirct .gt. 1)   then write sys$output -

      "  Valid subdirectory selections are 1 through ", revdirct, " (Octal)."

$  goto DIRINQUIRE

$!

$  DIRCASEDIGIT:

$  if (userfile'dirchoice' .eqs. "") then goto DIRCASERROR

$  ndir = userfile'dirchoice'

$  goto DIREND

$!

$  DIRCASEBLANK:

$  write sys$output "  Subdirectory not changed."

$  write sys$output " "

$  goto DIREND

$!

$  DIRCASEMORE:

$  dispct = 0

$  if (dirchoice .eqs. "N") then pauseflag = 0

$  if (userfile .nes. "")   then goto DIRLOOP

$  write sys$output "  No more subdirectories to display."

$  goto DIRINQUIRE

$!

$  DIRCASERED:

$  dispct = 1

$  DISPLOOP:

$     if (userfile'dispct' .eqs "") then goto DISPDONT

$     lengthflag = (f$length(userfile'dispct') .gt. 18)

$     if lengthflag then write sys$output -

         f$fao("  !3SL   !34AS  ", dispct, userfile'dispct'), userprot'dispct'

$     if (.not. lengthflag) then write sys$output -

         f$fao("  !3SL   !20AS  ", dispct, userfile'dispct'), userprot'dispct'

$     DISPDONT:

$     dispct = dispct + 1

$     if (dispct .le. dirct) then goto DISPLOOP

$  goto DIRMENU

$!

$  DIRNONE:

$  write sys$output "No subdirectories to choose, or no directory privileges."

$  write sys$output " "

$  goto DIREND

$!

$  DIREND:

$  set message 'error_message'

$  on control_y then exit

$  on control_c then exit

$  if (ndir .eqs. "*") then goto DISPLAY

$  goto PARSE

$!

$!-Help-----------------------------------------------------------------------

$!

$  HELP:

$  type sys$input



               CD.COM  Version 6  VMS Change Directory Command



                         Usage:  CD command/directory



CD         Display home directory,       CD ..       Change directory to the

           current directory, node.      CD [-]      dir above current dir.



CD \       Change directory to your      CD ..sub    Change directory to a

CD HOME    SYS$LOGIN directory.          CD [-.sub]  "sideways" subdirectory.



CD dir     Change directory to the       CD *        Display/select the

CD [dir]   [dir] directory.                          available subdirectories.



CD .sub    Change directory to the       CD .        Reset current directory.

CD [.sub]  [.sub] subdirectory.          CD ?        Display CD instructions.



     CD :== @SYS$LOGIN:CD.COM                 DEFINE SYS$PROMPT "ON"

     To make CD available from                To have the VMS $ prompt

     any directory you change to.             display the current directory.



                              By The Mentor

$  goto END





                              Code for HUNT.COM

                              >>>>>>>>>>>>>>>>>





$ ! HUNT.COM

$ ! By The Mentor

$ ! Updated by: The Mad Mexican

$ ! Usage: SPAWN/NOWAIT @HUNT

$ !

$ !Searches SHOW USER output for a specified user,  strobes at given

$ !intervals considering the severity of the hunt at which time output

$ !is generated and process terminates. If user loggs in then output

$ !is generated and process terminates. May check both nodes if a set

$ !host is called.  Also supports a file with the names to be hunted for.

$ !

$ !  *** NOTE ***   This is set up for a two-node system with NYSSA

$ !                 being the default node and TEGAN being the alternate

$ !                 node (Circuit Breaker and some others will recognize

$ !                 the nodes as my 'home' ones.)  You will need to

$ !                 slightly modify the code to reflect the nodename(s)

$ !                 of whatever system you are using...

$ !

$ !

$ !

$ say="write sys$output"

$ on control then goto door

$ monitored_node = "''NODE'"

$ say "Monitoring node ''monitored_node'.  <HIT RETURN>"

$ severity_of_hunt:

$ inquire selection "Severity of HUNT, 1 being the most urgent: 1-2-3"

$ if selection.ge.2 then goto selection_2

$ delay="wait 00:00:20"

$ loop_count=40

$ goto begin_process

$ selection_2:

$ if selection.eq.3 then goto selection_3

$ delay="wait 00:01:00"

$ loop_count=8

$ goto begin_process

$ if selection.gt.3 then goto severity_of_hunt

$ delay="wait 00:02:30"

$ loop_count=20

$ begin_process:

$ if monitored_node.eqs."TEGAN" then goto search_file_tegan

$ if f$search("nyssa.dat9") .nes. "" then goto file_exist

$ goto continue

$ search_file_tegan:

$ if f$search("tegan.dat9") .nes. "" then goto file_exist

$ continue:

$ say "hit <RETURN>"

$ inquire/nopunctuate choice9 "Who are we hunting for? "

$ if choice9 .eqs. "" then exit

$ count = 0

$ bell_sound[0,8]=%X07

$ top:

$ sho user/output='monitored_node'.dat9

$ purge 'monitored_node'.dat9

$ set message/nofac/noid/notext/nosev

$ search 'monitored_node'.dat9 'choice9'

$ a=$severity

$ if a .eqs. "1" then goto found_user

$ set message 'temp_msg9'

$ count = count + 1

$ if count .ge. 'loop_count' then goto give_up

$ delay

$ goto top

$ file_exist:

$ say "ERROR - Could not create temporary data file."

$ say "Please delete or rename ''NODE'.DAT9"

$ exit

$ found_user:

$ say bell_sound

$ say "''choice9' is now online on node ''monitored_node'."

$ say bell_sound

$ goto door

$ give_up:

$ say " "

$ say "''choice9' has not yet logged in on ''monitored_node'."

$ door:

$ say bell_sound

$ say "HUNT routine has terminated on node ''monitored_node'."

$ delete/noconfirm/nolog 'monitored_node'.dat9;*

$ set message 'temp_msg9'

$ exit



                              Code for ALARM.COM

                              >>>>>>>>>>>>>>>>>>



$ ! ALARM.COM

$ ! By The Mentor

$ ! Usage: SPAWN/NOWAIT @ALARM

$ ! Strobes f$time() every 5 seconds until specified time

$ ! is met at which time output is generated and process terminates.

$ CLR = " "

$ count = 0

$ PID           = F$PID(CONTEXT)

$ TERMINAL      = F$GETJPI(''PID',"TERMINAL")

$ DEVICE        = F$GETDVI(TERMINAL,"DEVTYPE")

$ IF DEVICE .EQS. 110 THEN CLR = "[H[2J"  ! VT220

$ IF DEVICE .EQS.  98 THEN CLR = "[H[2J"  ! VT102

$ IF DEVICE .EQS.  96 THEN CLR = "[H[2J"  ! VT100

$ IF DEVICE .EQS.  64 THEN CLR = "HJ"     ! VT52

$ CLS = "WRITE SYS$OUTPUT CLR"

$ DATE       = F$CVTIME(F$TIME())

$ NODE       = F$GETSYI("NODENAME")

$ bell[0,8]=%X07

$ ON CONTROL THEN GOTO DOOR

$ say = "write sys$output"

$ say f$cvtime(,,"TIME")

$ say " "

$ say "Hit (RETURN)"

$ say " "

$ inquire/nopunctuate alarm "What time shall I ring you - "

$ a_hour = f$element(0,":",alarm)

$ a_minute = f$element(1,":",alarm)

$ a_second = f$element(2,":",alarm)

$ time_check:

$ hour = f$element(0,":",f$cvtime(,,"TIME"))

$ minute = f$element(1,":",f$cvtime(,,"TIME"))

$ second = f$element(2,":",f$element(0,".",f$cvtime(,,"TIME")))

$ if hour .ge. a_hour .and. minute .ge. a_minute .and. second .ge.

  a_second then goto top

$ if hour .ge. a_hour .and. minute .ge. a_minute then goto top

$ wait 00:00:05

$ goto time_check

$ top:

$ count = count + 1

$ cls

$ say " "

$ say " "

$ say " "

$ say " "

$ say " "

$ say " "

$ say " "

$ say " "

$ say " "

$ say " "

$ say " "

$ say "                              A L A R M   O N"

$ say bell

$ say "                                 ",f$element(0,".",f$cvtime(,,"TIME"))

$ say " "

$ say " "

$ say " "

$ say " "

$ say " "

$ say " "

$ say " "

$ say " "

$ say " "

$ wait 00:00:01.50

$ if count .le. "6" then goto top

$ door:

$ say "ALARM OFF"

$ say f$element(0,".",f$cvtime(,,"TIME"))

$ say bell

$ exit





                               Code for CGO.COM

                               >>>>>>>>>>>>>>>>



$! CGO.COM

$! By The Mentor

$! One-Line compile/link/execute of C programs

$! Usage: CGO :== @CGO.COM

$!        CGO filename

$!

$if p1 .nes. "" then c_filename :== 'p1

$ write sys$output "Compiling:"

$ cc 'c_filename/list='c_filename.lst

$ write sys$output "Linking:"

$ link 'c_filename ,options_file/opt

$ write sys$output "Running:"

$ assign/user sys$command sys$input

$ run 'c_filename

$ exit

------------------------------------------------------------------------------



     Well, that's it.  I hope to be back in the next issue with some other

programs.  And remember, any programmers out there, get in touch with me!

                                  The Mentor

                              Thanksgiving 1987

==============================================================================

Received: (from LISTSERV@PSUVM for TK0EEE1@UCLAMAIL via NJE)

         (LISTSE00-7214;     368 LINES); Thu, 21 Dec 89 17:01:35 CST

Date:    Thu, 21 Dec 89 17:01 CST

To:      TK0EEE1

From:    LISTSERV@PSUVM



                               ==Phrack Inc.==



                     Volume Two, Issue 19, Phile #3 of 8



 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|

|_|                                                                       |_|

|_|              Understanding the Digital Multiplexing System            |_|

|_|                                (Part2)                                |_|

|_|                                                                       |_|

|_|                                   by                                  |_|

|_|                                                                       |_|

|_|                                Control C                              |_|

|_|                                                                       |_|

|_|                                   &                                   |_|

|_|                                                                       |_|

|_|                        The Tribunal Of Knowledge                      |_|

|_|_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _|_|

|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|_|





  Well some of you may recall my file on Digital Multiplexing in Phrack 10.

Well this is part 2 that was promised about a year and a half ago.  I was

finished with this file in May of 87 and I just decided to release it now.

Here it is!



  DMS switches were first introduced in 1979, since then it has been modified

to interface numerous types of switches.  DMS has the ability to interface

with SP-1, #5 XBar, 1ESS, 2ESS, 3ESS, 4ESS, NX1D, NX1E, TSD, SXS, ETS4, NO. 1

EAC, NO. 2 EAX, NO. 3 EAX, TSPS, CAMA/3CL boards, Stromberg Carlson Turret of

ONI and Visual Indicators, Modified North Electric TSD for ONI, Stomberg

Carlson (CAMA operator Position - ONI/ANI), AE #31 Switchboard, Co-located

NT/AE switchboard I/C, O/G, UDC data poller of OM, DACS (Directory Assistance

Charging System), NT #144 LTD, WECO #14 LTD, WECO #16 LTD, CALRS (Centralized

Automated Loop Reporting System), Badger 612A, AE #1 and #21 LTD, AE #30, SC

#14 LTD, Lordel MITS70 line Test System, Porta System Line Test Unit, Pulsar

II IMTS, Teradyne loop test unit, and the WECO MLT 1 (Mechanized Loop Testing

System).



Common Channel Interoffice Signaling



  Common Channel Interoffice Signaling (CCIS) is a way of signaling and a way

of implementing network level services. CCIS provides reliable, crystal clear

data signaling links between the network and the switching offices.  The CCIS

signaling method uses transmission equipment that is separate from voice

trunks.



Common Channel Interoffice Signaling No. 6



  The basis for the CCIS system is the International Consultative Committee on

Telephone and Telegraph (CCITT) No. 6 international standard, which is brought

to it's fullest capacity for use in the Stored Program Control (SPC) network

of AT&T.



  The CCIS6 network contains a bunch of signaling regions, each having a pair

of interconnected Signal Transfer Points (STP).  The switching systems put

into CCIS6 then connecting to STPs are called Serving Offices (SO).



  Band Signaling (CCIS-BS) is used on trunk signaling for intertoll-type

trunks using the CCIS network.



  Direct Signaling (CCIS-DS) is used for signaling between SPC switching

machines and a Network Control Point (NCP).  At the present time CCIS6 can

handle Enhanced INWATS Originating Screening Office (OSO), Calling Card

Validation (CCV), Mechanized Calling Card Service (MCCS), and Billed Number

Screening (BNS).  CCIS6 is available with DMS-100/200, DMS-200, and

DMS-100/200 or DMS-200 with TOPS.



CCIS6 Diagram:

                                            NSB        ST

                      ------------         - - - - - - - - - - -

          DTC        |            |      |            -------    |

         - - -  DS30 |    IPML    | DS30 |  - - -    | ||    |   |

--------|     |------|- - - - - - |------|-|     |---| ||    |   |

Digital  - - -       |            |      |  - - -    | ||    |   |

Trunks               |            |      |           | ||    |   |

                     |            |      |            -------    |

                     |            |        - - - - - - -|- - - -

          DTC        |            |          TM         |

  DIG    - - -  DS30 |    NUC     |  DS30   - - -      -----

--------|     |------|- - - - - - |--------|     |----|     |

^        - - -       |Network     |         - - -      -----

CCIS         \        ------------                     Modem

Signaling     \            |

           - - -         -----

AN Links--|     |       | CCC |

           - - -         -----

          Channel

           Bank





Acronyms:



        DIG - Digital

        AN - Analog

        DTC - Digital Trunk Controller

        MSB - Message Switch Buffer

        ST - Signaling Terminal

        TM - Trunk Module

        NUC - Nailed-Up Connection

        IPML - Inter-Peripheral Message Link





Common Channel Interoffice Signaling No. 7



   Common Channel Signaling (CCS) No. 7 or CCIS7 is a CCS system bases on

CCITT No. 7.  CCIS7/CCS7 on the DMS switch consists of two parts the Message

Transfer Part (MTP) and the Interim Telephone user Part.  They are compatible

with DMS-100, DMS-200, DMS-100/200, and DMS-100/DMS-100/200 with TOPS.



   CCIS7 can't tell the difference between banded and direct signaling.  CCIS7

uses Destination/Origination Point Codes (DPC/OPC) to rout back to the switch.



   CCIS7 can handle Automatic Calling Card Service (ACCS), Enhanced INWATS,

Local Area Signaling Services, and Direct Service Dialing Capabilities.



Equal Access



  The DMS-200 Access Tandem (AT) gives a traffic concentration and

distribution function for interLATA traffic originating and a distribution

function for interLATA traffic origination or terminating inside a Local

Access and Transport Area (LATA). This gives the interLATA Carrier (IC) access

to more that one end office inside the LATA.  It can handle InterLata Carrier

access codes (10xxx), 10xxx and 950-yxxx dialing, Automatic Number

Identification (ANI) on all calls, answer supervision, equal access Automatic

Message Accounting (AMA) for both originating and terminating calls, and

operator service signaling.



   The DMS-100 EA gives direct and tandem switched access service inside the

LATA for originating and terminating to interLATA Carriers.  It is available

in the following three ways:



Equal Access End Office (EAEO)



  DMS-100 Equal Access End Office (EAEO) gives a direct interconnection to

interLATA Carriers (IC) and international Carriers (INCs) Point of Presence

(POP) inside the LATA.



Access Tandem with Equal Access End Office



  The DMS-200 Access Tandem (AT) when used with equal access end office (EAEO)

lets trunk tandem interconnect to ICs/INCs POP inside the LATA.



   The connection of the Equal Access End Office (EAEO) to an IC/INC through

the DMS-200 Access Tandem (AT) uses what is called two-stage overlap output

pulsing which makes the time it takes to set up a call quicker.  The AT uses

the digits OZZ + XXX out pulsed  in the first stage to identify the IC/INC

dialed and to pick and outgoing trunk.  Then a connection is established from

the IC/INC to the EAEO through the AT.  The second stage digits, consist of

ANI and the called numbers are passed through the DMS- 200 AT at the IC/INC.



   A AMA terminating record in AT&T format is produced by the DMS-200 for all

the EAEOs.  A per call terminating AMA record is made for calls that get to

the stage where the trunk from the IC/INC has been seized and a "wink" has

been returned by the DMS-200 AT.



Access Tandem with a Non-Equal Access End Office



   DMS-200 AT using a non-equal access end office gives trunk tandem

connection to an IC/INC POP within the LATA.  To set up a call, connection of

Feature Group B (FGB) or Feature Group C (FGC) End Office to an IC/INC through

the DMS-200 AT, uses the standard Bell Central Automatic Message Accounting

(CAMA) signaling.  The Access Tandem uses the XXX digits of the access code

950-YXXX out pulsed from the FGB end office to identify the IC/INC and to

connect to a outgoing trunk.



Mechanized Calling Card Service (MCCS)



   The fraudulent use of calling cards, third number and collect calls and the

increasing movement to automate current operator services has directly led to

the implantation of the Mechanized Calling Card Service (MCCS) to DMS-200/TOPS

and to the remote and host Operator Centralization (OC).



   MCCS uses CCIS to relay queries and responses to and from the DMS-200/TOPS.

Operator handled calling card calls and the direct entry by subscribers of

Calling Cards by DTMF (Touch-Tones) telephones are given special provisions by

the MCCS.  Both, the operator handling and the direct entry of calling card

calls, are decreasing the size operators.



   Billed Number Screening (BNS) gives an enhancement to the operator-handled

collect and third-number billing by using CCIS to screen a number at the

billing validation data base for billing restrictions (i.e. the third number

is a fortress).  This feature naturally will reduce fraudulent use of the

collect call feature.



   Common Channel Interoffice Signalling-Direct Signalling (CCIS-DS), which is

the feature that the MCCS is designed around, is used to transmit messages to

and from many possible Billing Validation Centers (BVCs).  Messages

transmitted to the BVC about MCCS include the billing number and the Personal

Identification Number (PIN).  In BNS the messages have the special billing

number (collect or third number).  The return messages from the BVC include

validity (of the number), billing restrictions (if any), and the Revenue

Accounting Office (RAO) code.



Auxiliary Operator Services System



   The DMS-200 Auxiliary Operator Services System (AOSS) is used primarily for

Directory Assistance and the intercept needs that are not included in the TOPS

package.  The AOSS is similar to TOPS and co-exist with TOPS on the DMS-200

Toll system.



   Major benefits of the AOSS include Directory Assistance is provided with a

modern environment, AOSS position administrative activities are performed by

the DMS-200 toll maintenance system, trunking savings are achieved by

combining trunking for 1+ and 0+, and Directory Assistance traffic, DA

services are managed by using TOPS methods, Creation of a built-in training

system, which does not require additional training equipment and reduces

training costs.



Integrated Business Network



   The Integrated Business Network (IBN) is a revenue-producing concept

designed for small and big businesses to offer modernized PBX and Centrex

features.  The Operating Company can use the IBN to maintain and enhance its

competitive position on a operational DMS-100 and DMS 100/200 switches.

While using the DMS-100 switch, the Operating Company can support varying

business features along with existing local/toll traffic.



   IBN services can be introduced to a Centrex-Central Office (CO) or a

Centrex-Customer Unit (CCU) by additional software modules and minor hardware

enhancements.



   Current IBN features include:  A growing system that can handle 30,000

lines, networking capabilities, city wide service for DMS- 100 switch and

remotes for any one customer station Message Detail Recording (SMDR), which

gives IBN customers call records. The records can be used for system analysis

and control and station charge-back.  SMDR can use LAMA records, if the IBN

host has LAMA equipment, Centralized attendant maintenance and administration

functions and Direct Inward Dialing (DID).



Electronic Switched Network (ESN)



   The Electronic Switched Network is designed to meet the telecommunication

needs of large multi-location corporations. The ESN is made up of a SL-1 or

SL-100 Digital Business Communications System with networking features or a

DMS-100 IBN host.  The SL-1 can handle from 30-5000 lines.  The SL-100 and the

DMS-100 IBN hosts can hold from a few thousands to 30,000 lines.



   A DMS-100 IBN or SL-100 can remotely serve many locations from the host

site.  This is done by a connection through digital transmission facilities

which are set up at remote modules at the subscriber's premises.



Specialized Common Carrier Service (SCCS)



   The DMS-250 Specialized Common Carrier Service (SCCS) provides the

capability of Analog to Digital (A/D) and Digital to Analog (A/D) conversions

which are necessary with analog circuits. The DMS-250 can also switch voice

and data circuits.



   The DMS-250 takes either analog or digitally encoded info and by using time

slot interchange, switches it from any input port to a temporary addressed and

connected exit port.  The info may or may not be converted back to analog.



Normal Private Telecommunications Network Diagram:





           -----               ------

 [Phone]--| SnS |             | SL-1 |-[Phone]

          | PBX |             | PBX  |

           -----               ------

           |  |DOD/DID   DOD/DID|  |

           |   -------   -------   |

           |Tie       | |       Tie|

           |Trunk  ---------  Trunk|

            ------| Class-5 |------

              ----| Centrex |----

             |     ---------     |

             |                   |

             |                   |

             |                   |

           -----  Tie Trunk  ---------

          | SnS | ----------| Class-5 |

          | PBX |           | Centrex |

           -----             ---------

             |                   |

             |                   |

             |                   |

             |                   |

          -------             ------

 [Phone]-| Small |           | SL-1 |-[Phone]

         |  PBX  |           |      |

          -------             ------



Cellular Mobile Radio Service



   A cellular system consists of two main parts a cellular switch and cell

site equipment.



Cellular Switching Systems



   A cellular switch performs three main functions audio switching, cell site

control, and system administration.



   The DMS switches provide three basic implementations for cellular switching

Stand-alone, Combined, and Remote.



   Stand-alone switching is done by a Mobile Telephone Exchange (MTX) which is

interfaced with one or more class 5 end offices.  The connection is made by

DID/DOD trunks.  Depending on the needs of the area, the MTX can be divided as

follows:  MTX which serves urban areas, MTXC which handles suburban areas, and

MTXM which is used for rural areas.



   Combined switching is incorporated into a DMS-100 by some hardware

additions and cellular software.  Combined switching is designed to give a

easy, cost-effective way to install cellular services to an existing host.



   Remote Switching is done by combining Remote Switching Center (RSC) with a

Cell Site Controller (CSC).  This combination is hosted by either a

stand-alone or a combined switch.  Remote Switching is designed for serving

suburban centers, remote areas, or a small community and it gives extra

flexibility for a growing system.



   All of these cellular switches have the ability to balance the workload

among various cell sites.  For example, if one site's workload reaches the

programmable level of congestion, calls would be routed to nearby sites that

can handle the extra calls.



Cell Site Equipment



   Cell site equipment consists of a CSC and radio equipment. The CSC is

controlled by the cellular switch and it controls radio equipment and

maintenance tasks.  The CSC will work on any MTX cellular switch because of

the Remote Cluster Controller (RCC).



   The radio equipment consists of self-contained Radio Channel Units (RCU),

antennas, transmitter multi-couplers and receiver combiners.



   By different program software a RCU can perform voice, control locating,

and test functions.  The self contained nature allows the RCU be remotely

located to the CSC. A RCU has built-in circuitry for extended testing of the

radio part of the system.





           --------                               ----------

[phone]--| Remote |                             | SL-1 PBX |--[phone]

         | Module |                             | ESN Main |

          --------                               ----------

              |                                       |

              |  DS-1 Facility                        |  DS-1 Facility

              |            --------------             |

               -------->  | Local Class 5|  <---------

          [phone]---------|    DMS-100   |

                      ----|    IBN/ESN   |-------------

        2W Loop MFIDP |    --------------             | ESN Trunk Group

           or DS-1    |           |                   |     or DS-1

                      |         -----         ---------------

                      |        | CSC |       | Local Class 5 |

                   --------     -----        |    DMS-100    |

                  | SL-100 | <--- DS-1 ----> |    IBN/ESN    |

                   --------     Facility  Ph  ---------------

                      |                              |

                      |                              |

                      | DS-1 Facility                | DS-1 Facility

                      |                              |

                   --------                      ----------

         [phone]--| Remote |                    | SL-1 PBX |--[phone]

                  | Module |                    | ESN Main |

                   --------                      ----------





<End of File>

<5-23-87>



If you have any questions contact me or any other member of the T0K!



              Control C

               !T0K! (1987)

==============================================================================



                               ==Phrack Inc.==



                     Volume Two, Issue 19, Phile #4 of 8



Social Security Number Formatting

=================================



Shooting Shark  21 June 88



        Certain types of computer-related fraud, such as creating dummy

entries in payroll databases, require the creation of a false Social Security

Number (SS#).  Many employers attempt to detect "ghost" SS#s by running a

verification program on them.  In this article I will show how to defeat

verification by creating a legitimate-looking SS#.



        First, some general rules to follow:



        o       The middle two digits of a SS# can be odd or even

                if issued after 1965.  All numbers issued before 1965

                that have middle digits of 10 or above should be even.



        o       So far, no SS#s have been issued with a first digit

                of 8 or 9.  Very few numbers above 595 have been issued,

                so use caution.  700-729 were issued by the Railroad

                Retirement Agency a long time ago, and thus would belong

                to older people.  No numbers in the 596-626 have been

                assigned yet (as far as I know), but 596-599 has been

                reserved for Puerto Rico, 600-601 for Arizona, and

                602-626 has been reserved for California.



        The next step is required only if it is necessary that the place of

issuance (and thus, probably, state of birth or residence) match the SS#.  In

this case, refer to the following table:



First Three Digits      Area

==================      ====



000                     Foreign-Exchange, visitor, etc. (many college

                        students will have these)



001-003         New Hampshire           004-007         Maine

008-009         Vermont                 010-034         Massachusetts

035-039         Rhode Island            040-049         Connecticut

050-134         New York                135-158         New Jersey

159-211         Pennsylvania            212-220         Maryland

221-222         Delaware                223-231         Virginia



232-236 (EXCEPT

SS#s starting with

"232 30"...)            West Virginia

232 30                  North Carolina



237-246         North Carolina          247-251         South Carolina

252-260         Georgia                 261-267         Florida

589-595         Florida                 268-302         Ohio

303-317         Indiana                 318-361         Illinois

362-386         Michigan                387-399         Wisconsin

400-407         Kentucky                408-415         Tennessee

416-424         Alabama                 425-428         Mississippi

587-588         Mississippi             429-432         Arkansas

433-439         Louisiana               440-448         Oklahoma

449-467         Texas                   468-477         Minnesota

478-485         Iowa                    486-500         Missouri

501-502         North Dakota            503-504         South Dakota

505-508         Nebraska                509-515         Kansas

516-517         Montana                 518-519         Idaho

520             Wyoming                 521-524         Colorado

525             New Mexico              585             New Mexico

526-527         Arizona                 528-529         Utah

530             Nevada                  531-539         Washington

540-544         Oregon                  545-573         California

574             Alaska                  575-576         Hawaii

577-579         Washington, D.C.        580             Virgin Islands

580-584         Puerto Rico



586             Guam, American Samoa, and Philippine Islands



700-729         Railroad Retirement



An example:  If you were Stan Cisneros living in Burlingame, California, and

you were born in 1970, your SS# might be 546-28-4197.

==============================================================================



                               ==Phrack Inc.==



                     Volume Two, Issue 19, Phile #5 of 8



                    Facility Assignment and Control System



                         Written by Phantom Phreaker





INTRODUCTION

------------



    The Facility Assignment and Control  System (FACS) is an integrated

network component system that most phreaks and hackers know of from an old

file named 'FACS FACTS' written by Sharp Razor.  While this file provides an

accurate description of the FACS system, it is lacking in detail and length.

This file will provide accurate information about the FACS system and is

intended for the true telecom enthusiast (i.e. this article is not for people

who use codes and call it 'phreaking' or for people who think that phreaking

is just 'making free phone calls').  Hopefully the phreaks and hackers of the

world who want to know how things work in the telephone network will benefit

from this information. Any malicious use of this information is strictly

prohibited.  The contents of this file are for informational and educational

purposes only.





GENERAL DESCRIPTION

-------------------



    FACS can be described as a full-featured outside plant and central office

facilities assignment system.  For the people who are unfamiliar with these

terms, the outside plant is the portion of the telephone network that runs

from a telco office (such as a class five end office (EO)) to the subscriber,

including manholes and distribution/access points such as Serving Area

Interfaces (SAI) which are large, double-door outdoor equipment cabinets which

allow the repair craft to repair, test, and access a multitude of service

lines in that area.



    FACS is made up of five component systems, or sub-systems, and some of

these are also used as stand-alone systems (i.e. in an area that does not use

FACS, COSMOS can be thought of as a stand-alone system).



    The component systems are:



PREMIS - PREmise Information System

SOAC - Service Order Analysis & Control

LFACS - Loop Facility Assignment and Control System

COSMOS - COmputer System for Main Frame OperationS

WM     - Work Manager





    FACS is used by many departments and work centers in the BOC network.  A

general example of telco interaction will be included later in the article.





PREMIS

------



    PREMIS supports the customer negotiation (i.e. while a customer talks with

a BOC service rep, PREMIS is the computer system the rep has access to) and

service order (SO) preparation process (a SO is basically a request for

service).  PREMIS is a computer-based information storage and retrieval system

designed to support the Residence/Residential Service Center (RSC), and in

some cases, the Business Service Center (BSC).  The RSC is the center that

residence customers deal with, and the BSC is the center that business

customers deal with.



    PREMIS provides fast easy access to customer address verification for

numbered and unnumbered addresses (information is stored by telephone number

not address), telephone service status at an address (whether the phone is in

service, disconnected, pending connect, pending disconnect, disconnected due

to non-payment, etc.), telephone number assignment for customers (PREMIS can

generate a list of available telephone numbers in a given exchange and the

available TNs come from COSMOS) and facility assignment data for outward

orders.



    The following PREMIS features are available to the service reps and have

special significance to the LAC:





    Customer Negotiation:



        Provides customer service address check against a mechanized Street

        Address Guide (SAG).



        Provides customer status check to a mechanized facility address file

        which identifies potential Interfering Station (IS) conditions.



        Provides new telephone number assignments through an available TN

       (Telephone Number) file.





    Service Order Preparation:



        Provides SAG data.



        Provides correct address spelling.





    PREMIS, as far as I know, does not have any direct dialups so don't get

your hopes up high.  There may be other ways to access information in PREMIS

however.





SOAC

----



    The SOAC system is what interfaces FACS with the BOC SOP (Service Order

Processor).  The SOP is what the service reps enter SO information into and

the SOP sends the data entered to the SOAC system.  The SOAC system interprets

and validates this input data.



    SOAC generates Assignment Requests (ARs) which are sent to LFACS and

COSMOS (see respective sections of this file) to request outside plant (OSP)

and CO facility assignments, respectively.



    SOAC receives AR Responses (ARRs) from LFACS and WM/COSMOS and merges this

data and formats the output into a Universal Service Order (USO) assignment

section.  This USO is returned to the SOP after SOAC has processed it.



    SOAC returns status information and error notification to the SOP.  Status

information is what tells the service rep who entered the data into the SOP

whether or not FACS can process that Service Order.  Error notifiers are sent

back to the SOP when part of the SO is in error.



    SOAC keeps record of status and control information on all SO requests, as

well as the input image and specific data that came from processing.  This

information, along with the input image and processing results are referred to

as the pending assignment data.



    SOs do not automatically flow through SOAC in all cases.  SOAC can analyze

an order to determine if manual assistance is required, and if it is, a

Request for Manual Assistance (RMA) notice is sent to the LAC.  LAC personnel

will use SOAC, and possibly other systems in FACS, such as COSMOS/WM and

LFACS, to complete the assignment on that SO.



    SOAC also may receive COSMOS system output from certain commands.  One

such command may be the IJR command, which sets up a circuit for jeopardy

status. Jeopardy status means that the assignment looks as if it will be (or

already is) behind schedule for completion.  An example of this is as follows

(showing COSMOS messages).



WC% IJR

H ORD nxxxxxxxx/TN nxx-xxxx/JR nx

RMK NEED TIE PR FOR nxx

-.

**ORDER nxxxxxxxx              HAS BEEN GIVEN JEOPARDY STATUS

  CKTID: TN nxx-xxxx

**JEOPARDY REASON: nx          mm-dd-yy hh:mm

OUTPUT SENT TO SOAC

**IJR COMPLETED   mm-dd-yyy    hh:mm



    The H-line input is the SO number, where n can be alphabetic and x can be

numeric.  TN is the affected telephone number, JR is the Jeopardy Reason,

which is a one alpha/one numeric code, RMK is a ReMarK, in this case, a tie

pair is needed.  The section that starts and ends with two asterisks is the

COSMOS output, and the rest of the information should be self-explanatory.





LFACS

-----



    The LFACS system keeps an inventory of outside loop plant facilities, such

as cables (CA), cable pairs (CP), serving terminals, interconnecting points,

cross-connecting terminals, and things of that nature which should be known to

the serious phreak.  By the way, if you want to get some very good information

about the outside loop plant, look for Phucked Agent 04's article in the LOD/H

Technical Journal issue number 1.  These are excellent files and I recommend

that every phreak read them if they haven't already.  Anyway, LFACS also

assigns the outside loop plant facilities to ARs received from SOAC as a

result of customer SO activity.  The assignment process is automatic on 95% of

the service requests.



    LFACS provides a computerized version of DPAC and ECCR (Dedicated Plant

Assignment Cards and Exchange Cable Conductor Records respectively) which were

previously physical records that were stored at the LAC.  The information

stored in DPAC is information such as data about a Living Unit Serving

Terminal, and Living Unit Dedicated Loop Facilities, and ECCR contains

information such as Pair Selection, Add/Break count, Line and Station

Transfer, as well as Work Order (WO) information.  Some of this information

may be used by the LAC Field Assistance Bureau to assist the outside plant

craft in obtaining necessary information.



    When conditions necessary for LFACSS to automatically respond to a SOAC AR

are not met, a RMA noticed is generated in the LAC.  Appropriate people in the

LAC will interact with LFACS, and maybe SOAC and WM/COSMOS to complete the

process of assignment.





COSMOS

------



    COSMOS has been written about many times, so I will not go into deep

detail about this system as many people are already familiar with it.



    COSMOS keeps a database inventory of CO facilities (such as TN, CP, OE,

CS, BL - telephone number, cable pair, office equipment, class of service,

bridge lifter respectively) and assigns these facilities to ARs received from

SOAC as a result of customer SO activity.



    COSMOS assists the Network Administration Center (NAC) and Frame Control

Center (FCC) in managing, controlling, and utilizing the MDF and COE, as well

as CO facilities and circuits.  COSMOS does assignment of TNs, line equipment,

jumper use/reuse, TP management, frame work management, and other things of

that nature.



    When the conditions are not met for COSMOS to respond to a SOAC AR, a RMA

is generated in the LAC (as with the other systems mentioned in this article).

The LAC can then use WM/COSMOS, SOAC, and LFACS to complete assignment.





WM

--



    The WM is what links one set of SOAC/LFACS systems with one or more COSMOS

systems.  All input to COSMOS from the LAC is directed through the WM.  The WM

provides message switching, load control, and other functions to the LAC.



-EOF-



RC:LINE;CHNG!/ORD 1/TN LOD-LOD-LODH/ESM YES/ESX YES/ESL YES/RC:TRK!/TNN $LOD$.



    I hope the information presented in this article has been of interest to

all who read it.  I have not included as much information as I could have,

some sensitive information has not been included because it could cause

problems.  My personal thanks goes out to the fine people who designed the

FACS system, as well as to all the telephone companies in existence, for

without you, phone phreaks would not exist.  Thank you for allowing us access

to your networks, although this access is taken rather than given.  Try hiring

a phreak sometime, it might be beneficial.



    A note to telecom/computer enthusiasts who read this article:  DO NOT

SCREW ANYTHING UP!  IF YOU ARE NOT RESPONSIBLE ENOUGH TO USE THIS DATA IN A

WISE AND NON-ABUSIVE WAY THEN DISCARD THIS ARTICLE NOW AND PRETEND LIKE YOU

NEVER READ IT.





This has been a presentation of THE LEGION OF DOOM! (C) 1988+

==============================================================================



                               ==Phrack Inc.==



                     Volume Two, Issue 19, Phile #6 of 8



Phrack Editorial on Microbashing

================================



I was toying with the idea of writing a history of the Microcomputer

Revolution, viewed through the eyes of one who lived through it, perhaps with

some recollections of a Telecommunications Hobbyist thrown in for spice.



Upon reflection however, I thought that I might use this forum to address a

problem that has bothered me for some time.  I refer to the phenomena of

microbashing.



This is, in my opinion, a serious problem in the MicroUnderground.



For the record, I'm 36 years old, I have been screwing around with computers,

Mainframe, Mini and Micro since 1976/77.  I built an Altair 8800 way back

when, and wrote what may have been the first software pirating program.

(Something that mass produced papertape copies of Bill Gates' Altair BASIC).

I also built a TV Typewriter based on Don Lancaster's designs, and a 100 baud

modem to go along with it.  For the record, I use a Commodore 64 computer.  I

have a 1200 baud modem, two disk drives, a spiffy printer and a color monitor.

For the record, I sold an Apple //e to buy the C64.  I have never regretted

that decision.



Now, there are those who will read that last sentence and say to themselves,

"Fuckin' Commie user!  He SOLD an Apple to buy a Commie? What an asshole!"

Now, I could say to the Apple //e user who thinks that, "You poor boob!  You

spent all that money for a //e!  Plus all that extra cash for plug in cards so

it can do what my C64 has built in? Geeze!  Some folks need keepers!"



That, Gentle Readers, is microbashing.  So, in the space of a few minutes,

this hypothetical exchange has engendered ill feelings, if not outright

hostility.  What a waste of time and effort!  We both have powerful computers

that I could not even begin to imagine could exist 12 (12!) years ago.  My

Altair had 16k of RAM in it, and I thought that was hot stuff!  Most folks

only had 4 to 8k in their homebrew micros. I even had a disk drive!  A huge

monster that weighed 20 pounds, used 8 inch single sided disks that had all of

120k of storage.  This whole system, complete with TeleType (my

terminal/printer) cost about $5000 in 1977 dollars.  In 1988 dollars, maybe

$15000.  (My little C64 system, total cost less than $1000 just blows that

Altair/Teletype out of the water).



What are the roots of microbashing?  I'm not sure, but here are some thoughts.



Status, I'm sure, plays a major role in microbashing.  A C64/128 will always

cost less than an equivalent Apple //e system.  "My computer cost more than

your computer!  Therefore, my computer is better!  Nyah!" By that logic, my

old $5000/$15000 Altair is a better computer than most Apple machines.

Patently ridiculous, isn't it?  (I've noticed that there is now a Let's Bash

the //e subculture developing among the Mac Plus, SE and II crowd, along with

//gs users.  I do take a perverse pleasure, I'm sorry to say, with all this.

The shoe is now on the other foot, eh?)



Conformity, particularly among the teenage/young adult users, might also be a

factor.  "Everyone important uses Apples.  Only gameplayers use Kmart toy

computers.  If you don't use an Apple, you ain't shit!"  The peer pressure of

Conformity is a powerful thing.



A mate of mine in the Computer Services department at Harvard has a Mac II on

his desk at work and a Mac Plus at home.  Another friend has a Zenith AT clone

at his office at the Mitre Corporation in Maryland and an Apple ][+ at home. A

good friend of mine who's an editor at a major disk-based publication had a

//gs given to him by Apple.  All these guys are high powered computer users.

The guy at Harvard is their UNIX wizard.  The fellow in MD is a GS-13 employed

by the Air Force as a general purpose  MS-DOS/ADA wizard, and just spent

$1000000 to fund distributed processing research at Los Alamos.  The last

person is the Apple edition editor at this publication.  Not a single one of

them wastes a second denigrating my C64.  Now, if these guys consider me a

peer, an equal, (and they do!) and they don't care what computer I use, why do

some //e users waste their time and energy putting down the C64?



A third factor may be the sneaking suspicion that, "Geeze!  If a C64 can do

all that, why did I spend all that money on an Apple?"  Guilt and self doubt

can be a powerful factor in microbashing.  "If I put Commies down enough,

maybe other people will buy Apples and then I won't be the only one who has

one."  Psychologists call that "Transference."  Transferring the negative

feelings/doubt about oneself to something else and then denigrating that

something else.  The Old Testament calls it a "Scapegoat."



I suppose what I'm finally trying to say is let's all grow up and stop this

foolish bickering and sniping.  No one profits, and we all lose.  We lose

time, information, disk space on BBSs, companionship and fun!  I don't like to

see some Apple user bashing Commodore.  Neither do I enjoy seeing a C64 user

bashing a TI user, as I dislike watching that TI user make fun of someone with

an Adam.  Don't you think we have more important things to do than make

mountains out of molehills when it comes to our respective computers?



I do.  If we can't act any better than a kindergarten kid whining over a toy,

then maybe we don't deserve these powerful tools we have sitting on our

desktops.



Written by THE NIGHTSTALKER, June, 1988.

==============================================================================



                               ==Phrack Inc.==



                     Volume Two, Issue 19, Phile #7 of 8



             PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN

             PWN                                             PWN

             PWN      >>>>>=-* Phrack World News *-=<<<<<    PWN

             PWN                 Issue XVIV/1                PWN

             PWN                                             PWN

             PWN          Created by Knight Lightning        PWN

             PWN   Written and compiled by Knight Lightning  PWN

             PWN                                             PWN

             PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN



>From The Creators Of Phrack Incorporated...



                             The Phoenix Project

                             >>>>>>>>>>>>>>>>>>>

-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Just what is "The Phoenix Project?"



Definition:  Phoenix (fe/niks), n.  A unique mythical bird of great beauty

                     fabled to live 500 or 600 years, to burn itself to death,

                     and to rise from its ashes in the freshness of youth, and

                     live through another life cycle.



             Project (proj/ekt), n.  Something that is contemplated, devised,

                     or planned.  A large or major undertaking.  A long term

                     assignment.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Why is "The Phoenix Project?"



On June 1, 1987 Metal Shop Private went down seemingly forever with no

possible return in sight, but the ideals and the community that formed the

famous center of learning lived on.  On June 19-21, 1987 the phreak/hack world

experienced SummerCon'87, an event that brought much of the community together

whether physically appearing at the convention or in spirit.  On July 22, 1987

the phreak/hack community was devastated by a nationwide attack from all forms

of security and law enforcement agencies...thus setting in motion the end of

the community as we knew it.  Despite the events of July 22, 1987, PartyCon'87

was held on schedule on July 26-28, 1987 as the apparent final gathering of

the continent's last remaining free hackers, unknown to them the world they

sought to protect was already obliterated.  As of August 1, 1987 all of the

original members and staff of the Metal Shop Triad and Phrack Inc. had decided

to bail out in the hopes that they could return one day when all would be as

before...



                             THAT DAY HAS COME...



A new millennium is beginning and it all starts on July 22, 1988.  How fitting

that the One year anniversary of the destruction of the phreak/hack community

should coincidentally serve as the day of its rebirth.



Announcing SummerCon '88 in (where else would you expect) St. Louis, Missouri!



Knowledge is the key to the future and it is FREE.  The telecommunications and

security industries can no longer withhold the right to learn, the right to

explore, or the right to have knowledge.  The new age is here and with the use

of every *LEGAL* means available, the youth of today will be able to teach the

youth of tomorrow.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

SummerCon'88 is a celebration of a new beginning.  Preparations are currently

underway to make this year's convention twice as fun as last year's and the

greater the turnout the greater the convention shall be.  No one is directly

excluded from the festivities and the practice of passing illegal information

is not a part of this convention (contrary to the opinions of the San

Francisco Examiner, and they weren't even at the last one).  Anyone interested

in appearing at this year's convention should leave mail to Crimson Death

immediately so we can better plan the convention for the correct amount of

participants.



The hotel rooms purchased for SummerCon'88 are for the specified use of

invited guests and no one else.  Any security consultants or members of law

enforcement agencies that wish to attend should contact the organizing

committee as soon as possible to obtain an invitation to the actual convention

itself.



Sorry for the short notice this year...



:Knight Lightning                                      "The Future Is Forever"



-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

=============================================================================



                               ==Phrack Inc.==



                     Volume Two, Issue 19, Phile #8 of 8



             PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN

             PWN                                             PWN

             PWN      >>>>>=-* Phrack World News *-=<<<<<    PWN

             PWN                 Issue XVIV/2                PWN

             PWN                                             PWN

             PWN          Created by Knight Lightning        PWN

             PWN        Written and compiled by Epsilon      PWN

             PWN                                             PWN

             PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN



Doc Holiday In Legal Trouble

=== ======= == ===== =======



One night, Doc Holiday 713 decided to visit his CO.  This CO was surrounded by

a fence with barbed wire on top.  He climbed over the fence with ease and

looked around the perimeter of the building for any cameras.  When he was sure

that there were no cameras, he decided to try entering through the back door.

To his surprise, the back door was unlocked [Hey, at least he didn't get

charged with breaking and entering, right?  -Epsilon], and he entered the

building.  He looked around a bit, past some boxes full of test sets and

cable. This got boring, so he headed down to a room with some terminals and a

large control panel.  The instructions for using the terminal were taped to

the side of the desk, so he tried them out.  He had fun monitoring phone lines

and testing other subscribers' touch tone polarity, and he decided to get out

of the building.



On his way out of the building, he came across a box that was labeled with

something to the effect of 'Switching Unit'.  He didn't bother to look inside

the box, because he was in a hurry to get out of the building, so he opted to

take the box home, then look inside.  When he opened the door to leave, he saw

a flashlight waving around in the dark.  He got scared and set the box down

[Incidentally, this door that he got in through was at the top of a stairway

at the back of the building, outside.  -Epsilon].  The box was unstable, and

rolled down the stairs, probably causing damage to whatever was inside.  He

tried to run down the stairs and climb over the fence.  He found that the

police were outside the fence, and he proceeded to run.  A policeman shouted

at him to stop, and threatened to shoot him, so he dropped.  He was

apprehended and taken to the police station.



He had learned that the police knew about his whereabouts, because he had

tripped a silent alarm, probably upon entering the building.



At the station, they questioned him.  He was getting fed up, and said he was

going to leave the station.  He started to leave, when a policeman grabbed him

and kneeing him, broke his rib.  They then, after some persuasion, took Doc to

the hospital.



He is at home now, and awaiting a hearing.  This little tiff is not expected

to affect his hacking activities.



                     Information Provided By Doc Holiday

______________________________________________________________________________



The Disk Jockey...Busted!

=== ==== ================



The Disk Jockey, whom we all knew, was arrested for 22 counts of aiding a

fraud and other miscellaneous charges last Friday.  He is now in jail and is

being held for $150,000.00 bail [Yes, that's right.  One-hundred-fifty-

thousand dollars.  -Epsilon].



This incident was believed to have been caused by a 'phreak' by the name of

White Lightning (616), who informed Sprint Security that The Disk Jockey was

using their service illegally.



He is now awaiting a court date, and is unavailable for questions.



                     Information Provided By Compaq (219)

______________________________________________________________________________



SummerCon '88

========= ===



We at Phrack Inc. are proud to present SummerCon '88.  The convention will

take place at the Westport Ramada Inn in St. Louis, Missouri the week-end of

July 22nd.  The Con is expected to be held from Friday afternoon to Sunday

afternoon.  Please contact us, via the Phrack accounts, or the Phrack In. VMS

at (800)331-8477, * #, Ext. 6660, if you plan to attend.  Illegal information

at this CON is not encouraged.  Thank you.



                   Information Provided By Knight Lightning

______________________________________________________________________________



PWN Quicknotes

=== ==========



------------------------------------------------------------------------------

The first step in what is called The Phoenix Project, which is a re-birth of

the hack/phreak community is underway.  This first step is a public education

bulletin board system dedicated to teaching the public about

telecommunications and computer systems.  The board is called The Phoenix

Project, and the number is (512)754-8182.  No illegal information is to be

posted on this system.  Our SysOp is The Mentor.  Thank you, and call if

you're interested.



                      Information Provided By The Mentor

------------------------------------------------------------------------------

Rumor has it that a new group is forming in the hack/phreak community.  This

group is looking for about eight skilled members who have diverse interests.

If you think you are qualified, and are interested, please contact Doc Holiday

on any BBS he is on.  Thank you.

------------------------------------------------------------------------------

Control C of 313 was NOT busted, contrary to popular belief.  This is all a

big confusion, and we will let you know how this started in a future issue.

Until then, please, don't spread the rumor around anymore.

------------------------------------------------------------------------------

==============================================================================



.

