mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
466 lines
27 KiB
Text
466 lines
27 KiB
Text
![]() |
|
|||
|
==Phrack Magazine==
|
|||
|
|
|||
|
Volume Four, Issue Forty-Three, File 15 of 27
|
|||
|
|
|||
|
[** NOTE: The following file is presented for informational purposes
|
|||
|
only. Phrack Magazine takes no responsibility for anyone
|
|||
|
who attempts the actions described within. **]
|
|||
|
|
|||
|
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
Physical Access & Theft of PBX Systems
|
|||
|
|
|||
|
A DSR Tutorial by :
|
|||
|
|
|||
|
CO/der DEC/oder & Cablecast 0perator.
|
|||
|
|
|||
|
(K)opywronged 1993, by Dark Side Research
|
|||
|
|
|||
|
***************************************************************************
|
|||
|
|
|||
|
BACKGROUND
|
|||
|
~~~~~~~~~~
|
|||
|
|
|||
|
July 1989, Mobil Oil Corporation Headquarters -- Fairfax, VA.
|
|||
|
|
|||
|
Abundant technology, late hours, and shadows between city lights
|
|||
|
made up the typical environment CO/der DEC/oder repeatedly found
|
|||
|
adventure in. On one such night in the summer of '89, a reconnaissance
|
|||
|
outing landed him at the offices of Mobil Oil Corp. The door leading
|
|||
|
from the multi-level parking garage into the foyer was equipped
|
|||
|
with an access-request phone and a square black pad. The pad was flush
|
|||
|
with the wall, and sported a red LED in its center -- a rather imposing
|
|||
|
device used to read magnetic access cards. CODEC picked up the phone
|
|||
|
and listened to a couple rings followed by the voice of a security
|
|||
|
guard, "Good evening, security ..."
|
|||
|
"Evenin', this is Dick Owens with CACI graphics. I don't have a
|
|||
|
card, but just call upstairs and they'll verify."
|
|||
|
"Hold on, sir ..."
|
|||
|
Kastle Security's verification call registered as a sudden 90 VAC
|
|||
|
spike on Cablecast 0perator's meter. Clipped on the blue and white pair
|
|||
|
of CACI's incoming hunt group, Cable picked up on his TS-21:
|
|||
|
"Hello?"
|
|||
|
"This is Kastle Security. We've got a Dick Owens downstairs
|
|||
|
requesting access."
|
|||
|
"Yeah Sure. Let him in please."
|
|||
|
The security man took Codec off hold, "Okay sir, what entrance are
|
|||
|
you at?"
|
|||
|
"Garage level one."
|
|||
|
The door clicked, and in went the hacker-thief -- grinning.
|
|||
|
Another lock at the end of a hallway also hindered access, but a
|
|||
|
screwdriver, placed between door and frame, removed the obstruction with
|
|||
|
a quickly applied force.
|
|||
|
CACI was a graphics outfit sharing the same building with Mobil.
|
|||
|
After a perusal through its desks and darkened corridors turned up a
|
|||
|
cardkey for later use, Codec -- pausing casually along the way at the
|
|||
|
drunking fountain -- made his way to the opposite end of the hallway and
|
|||
|
into Mobil's mail receiving room. In contrast to elsewhere in the
|
|||
|
building, this room was chilly -- as if heavy air conditioning was
|
|||
|
nearby. There was also a faint roar of fans to enhance this notion.
|
|||
|
And behind a countertop in the direction of the noise, a split door could
|
|||
|
be seen through which mail and parcels were passed during business
|
|||
|
hours. Hardly an obstacle, he was on the other side in an instant.
|
|||
|
This "other side" was no less than a gateway to nirvana. At first he
|
|||
|
began taking in the sight of a mini-computer, console, and mass storage
|
|||
|
devices, but his eyes were virtually pulled to the giant on his left.
|
|||
|
It was the largest and most impressive PBX he had yet seen; a label
|
|||
|
above the five gargantuan, interconnected cabinets read, "AT&T SYSTEM
|
|||
|
85." The hacker's heart raced -- he wanted to explore, control, and own
|
|||
|
the switch all at once. Within seconds his gloved hands caressed the
|
|||
|
cabinets while his hungry eyes scanned circuit pack descriptors, mouth
|
|||
|
agape. Codec grabbed some manuals, jotted down numbers to a modem
|
|||
|
stack, and reluctantly departed. A week later, he stole the switch.
|
|||
|
To the Dark Side Research group, the System 85 would be worth
|
|||
|
approximately $100,000 -- but to Mobil, the system was worth at least
|
|||
|
six times that figure. In its entirety it was more valuable, but DSR
|
|||
|
was only concerned with the guts; the digital circuitry of the system.
|
|||
|
When Codec reentered the building the following week, he was wearing a
|
|||
|
VOX headset attached to a hand-held 2-meter band (HAM) radio. This was
|
|||
|
strapped to his chest except for the rubber-whip antenna which protruded
|
|||
|
out of a hole in his jacket. His awestruck, gleeful countenance from
|
|||
|
a week prior had been replaced by a more grave expression, and the
|
|||
|
moisture now on his body was no longer from unconscious salivation
|
|||
|
but due to the sweat of anticipation and rapid movement.
|
|||
|
"Phase one complete," he spoke into the boom mic in front of his
|
|||
|
face.
|
|||
|
"Roger Nine-Two. Quit breathing on the VOX or adjust sensitivity,
|
|||
|
over."
|
|||
|
"Roger Nine-Three. Entering heavy EMI area," Codec acknowledged to
|
|||
|
one of the lookouts.
|
|||
|
Steps were retraced through the mail room, where several empty
|
|||
|
boxes marked "U.S. Mail" and a dolly were conveniently stored. The
|
|||
|
System 85 was shut down, cabinet by cabinet, as most of the circuit
|
|||
|
boards were hastily removed and boxed. Seven boxes were filled,
|
|||
|
requiring two trips with the dolly to a side door.
|
|||
|
"All units: ready for docking."
|
|||
|
"Roger Nine-Two. Standby. Nine-Three, okay for docking?"
|
|||
|
"Step on it, over ..."
|
|||
|
A Ford Escort with its hatch open raced up to where Codec and the
|
|||
|
boxes stood. Within fifteen minutes the circuit packs were unloaded in
|
|||
|
a public storage unit. Within half an hour, CO/dec DEC/oder, Cablecast
|
|||
|
0perator, and the remainder of the night's crew were filling up with
|
|||
|
doughnuts of the nearby 7-11, observing local law enforcement doing the
|
|||
|
same.
|
|||
|
|
|||
|
APRIL 1993: Security memorandum broadcast from wrq.com -- Internet
|
|||
|
|
|||
|
"We've all heard of toll fraud as a way to steal telecommunications
|
|||
|
resources. Now the ante has been escalated. I've heard of a
|
|||
|
company on the East Coast that was having some minor troubles with their
|
|||
|
PBX. A technician showed up at the door and asked directions to the PBX
|
|||
|
closet. The company showed this person the way without checking any
|
|||
|
credentials, and about five minutes later the phones went completely
|
|||
|
dead. They went up to the PBX closet and found that several boards from
|
|||
|
the PBX had been removed and that the 'repairman' had departed."
|
|||
|
|
|||
|
|
|||
|
The theft of PBX circuit boards is a novel idea and seldom heard
|
|||
|
of, but -- as made apparent above -- it does occur. In the used PBX
|
|||
|
scene, often referred to as the "secondary" or "grey" market, there is
|
|||
|
always a demand for circuit packs from a wide variety of PBXs. The
|
|||
|
secondhand PBX industry grew from $285 million in 1990 to $469 million
|
|||
|
in 1992 -- despite the recession.
|
|||
|
The essence of any PBX is a rack or multiple racks of circuit
|
|||
|
cards/boards/packs, with an average grey market value of anywhere from
|
|||
|
$50 to $2000 each. The cards are lightweight, small in size, and can
|
|||
|
even withstand a moderate dose of abuse. Transport of misappropriated
|
|||
|
circuit boards is done without risk -- under and police scrutiny, a box
|
|||
|
of these looks like a mere pile of junk (or senior engineering project)
|
|||
|
in the trunk of your car. Furthermore, the serial numbers on the boards
|
|||
|
are seldom, if ever, kept track of individually, and these can be
|
|||
|
removed or "replaced" in any case. Unlike computer equipment or
|
|||
|
peripherals, PBX cards are extremely safe, simple, and non-proprietary
|
|||
|
components to handle -- even in quantity.
|
|||
|
Although you may wish to physically access PBXs for reasons other
|
|||
|
than theft, it will be assumed here that monetary gain is your motive.
|
|||
|
In either case, this introductory file makes it clear that access can be
|
|||
|
achieved with varying levels of ease. A PBX theft should be thought of
|
|||
|
in terms of two phases: reconnaissance and extraction. Recon involves
|
|||
|
finding and selecting prime targets. Extraction is the actual theft of
|
|||
|
the system. Both phases can be completed through "office building
|
|||
|
hacking," a wide variety of deception, breaking and entering, social
|
|||
|
engineering, and technical skills.
|
|||
|
|
|||
|
Phase I : Reconnaissance
|
|||
|
|
|||
|
PBXs are found where people's communications needs warrant the
|
|||
|
capabilities of such a system -- offices, schools, hotels, convention
|
|||
|
centers, etc. The PBXs we will concert ourselves with in this discourse
|
|||
|
however are those located in shared or multiple-leased office
|
|||
|
structures; the "typical" office buildings. The typical office building
|
|||
|
has enough floors to require an elevator, some parking space, a lobby,
|
|||
|
and a company directory (Because it is shared by more than one
|
|||
|
business). Companies that occupy an entire building by themselves are
|
|||
|
generally too secure to be worthwhile targets.
|
|||
|
Tenant companies in the typical building lease all different size
|
|||
|
office space -- some rent only 300 sq. ft., others take up entire
|
|||
|
floors. Those that use half a floor or more usually meet the criteria
|
|||
|
for PBX ownership. Obviously, the larger the firm's office at that
|
|||
|
site, the greater its PBX will be, so those business spread out over
|
|||
|
several floors will have the most valuable systems. This is not always
|
|||
|
an overwhelming factor in determining a target however. The smaller
|
|||
|
systems are often easier to get at -- and ultimately to remove --
|
|||
|
because they tend to be located in utility closets off publicly
|
|||
|
accessible hallways as opposed to within a room inside an office space.
|
|||
|
Those closets, sometimes labeled "telephone" and even unlocked, will be
|
|||
|
found one or two per floor! Other closets may exist for electrical
|
|||
|
equipment, HVAC, plumbing, janitorial supplies, or for a combination of
|
|||
|
these uses in addition to telephone service.
|
|||
|
A phone closet is easily distinguishable whether or not a switch or
|
|||
|
key system is present. A web of low-voltage (22 AWG), multi-colored
|
|||
|
wiring will be channelled and terminated on a series of white "66"
|
|||
|
blocks mounted on the wall. These blocks are a few inches wide, and
|
|||
|
roughly a foot long, with rows of metallic pins that the wiring is
|
|||
|
punched into with a special tool. As a general rule, if the system is
|
|||
|
fastened to the wall and doesn't have at least one muffin fan built-in
|
|||
|
and running, it's either a measly key system or a PBX too small to
|
|||
|
deserve your attention. Those worthy of your time will stand alone as a
|
|||
|
cabinet with a hinged door, contain shelves of circuit cards, and
|
|||
|
emanate the harmonious hum of cooling fans. As an example, Mitel PBXs
|
|||
|
commonly fit cozily in closets -- sometimes even one of the newer ROLMs
|
|||
|
or a voice mail system. On the other hand, an NT SL-100 should
|
|||
|
not be an expected closet find.
|
|||
|
Wandering through office buildings in search of phone closets
|
|||
|
during business hours is easy, so long as you dress and act the part.
|
|||
|
You'll also want to look confident that you know what you're doing and
|
|||
|
where you're going. Remember, these buildings are open to the public
|
|||
|
and an employee of one company can't tell whether or not you're a client
|
|||
|
of another. When going in and out of the phone closets, who's to know
|
|||
|
you're not a technician or maintenance man?
|
|||
|
Apart from searching the closets, you can approach the secretaries.
|
|||
|
Feign being lost and ask to use the telephone. Steal a glance at the
|
|||
|
console and you'll know (with a little practice) what type of PBX
|
|||
|
they've got. This is very valuable information, for it may save you
|
|||
|
from unsuccessfully breaking into the closet (should it be locked) or
|
|||
|
the company itself. Secretaries are cute, courteous, and dumb. You
|
|||
|
shouldn't have a problem convincing her to give you the key to the phone
|
|||
|
closet if you're posing as a technician. If you're feeling as confident
|
|||
|
as you should be, you may even get a date with the bitch. And should
|
|||
|
you ever raise suspicion, you always have the option of bailing out and
|
|||
|
making a break for the stairwell. No business exec is going to chase
|
|||
|
you down.
|
|||
|
Some additional methods can be employed in conjunction with
|
|||
|
visiting the buildings, or as a precursor to such :
|
|||
|
|
|||
|
-- Classified ads. A company with job openings is all the more
|
|||
|
vulnerable to your dark motives. Using the help-wanted section of your
|
|||
|
newspaper, look for receptionist and secretarial positions. Call and
|
|||
|
ask, "What type of phone system will I be required to handle?" You may
|
|||
|
also want to go in and apply for the job -- any job at a large firm will
|
|||
|
do. You'll learn the type of system installed, some details about
|
|||
|
security, etc; this is a very sophisticated way of "casin' the joint."
|
|||
|
|
|||
|
-- Scanning for RMATS. Using your preferred wardialer (such as
|
|||
|
ToneLoc), scan business districts for PBX remote maintenance modems then
|
|||
|
CNA your finds.
|
|||
|
|
|||
|
-- Targeting interconnects. Interconnects are PBX dealers that sell,
|
|||
|
install, and maintain the systems on contract. Capture a database of
|
|||
|
clients and you'll have a windfall of leads and pertinent info. AT&T
|
|||
|
allegedly sells its database by region. Also, intercept voice mail or
|
|||
|
company e-mail. Interconnects make decent targets themselves.
|
|||
|
|
|||
|
-- Users groups and newsletters. Some of the extremely large PBX owners
|
|||
|
join users groups. Though this is abstract, owners will discuss their
|
|||
|
systems openly at the meetings. Newsletters are mailed out to members,
|
|||
|
often discussing special applications of specific locations in detail.
|
|||
|
Great for making sales contacts.
|
|||
|
|
|||
|
Phase II : Extraction
|
|||
|
|
|||
|
Removing the PBX calls for an assessment of obstacles versus
|
|||
|
available means and methods. The optimum plan incorporates a late
|
|||
|
afternoon entry with a nighttime departure. This means entering the
|
|||
|
building during business hours and hiding, either in the PBX closet
|
|||
|
itself or any room or empty space where you can wait until after hours
|
|||
|
to re-emerge. This is the most safest and effective of methods. You
|
|||
|
need not worry about alarms or breaking in from outside, and you can
|
|||
|
take advantage of one of the greatest weaknesses in corporate office
|
|||
|
security -- janitors. The janitorial staff, if you act and dress
|
|||
|
properly, will allow you to walk right into an office while they're
|
|||
|
cleaning. If you're already in an office and they enter, just act like
|
|||
|
you own the place and it'll be assumed you work there. If you prefer
|
|||
|
not to be seen, keep hidden until the cleaning is done on your floor.
|
|||
|
(Be sure not to make the idiotic mistake of hiding in the janitor's
|
|||
|
closet). Although the custodians will lock the doors behind them, any
|
|||
|
alarms in the building will remain off until cleaning for the entire
|
|||
|
structure is complete.
|
|||
|
There is simply nothing so elegant as entering the building during
|
|||
|
the daytime hours, hiding, and re-emerging to wreak havoc when
|
|||
|
everyone's gone. (A patient wait is required -- take along a Phrack to
|
|||
|
read). Unfortunately, entry will not always be so easy. The phone
|
|||
|
closet may have a dead-bolt lock. There may be no feasible hiding
|
|||
|
place. People may constantly be working late. Because of all the
|
|||
|
potential variables, you should acquire a repertoire of means and
|
|||
|
methods. Use of these methods, though easy to learn, is not so quickly
|
|||
|
mastered. There is a certain "fluidity of technique" gained only
|
|||
|
through experience. Deciding which to use for a given situation will
|
|||
|
eventually come naturally.
|
|||
|
|
|||
|
-- Use of tools. You can easily get around almost any office building
|
|||
|
using only screwdrivers. With practice, prying doors will be quick and
|
|||
|
silent. Although some doors have pry-guards or dead-bolts, about every
|
|||
|
other phone closet you'll encounter can be opened with a screwdriver.
|
|||
|
Before forcing the gap between door and frame, try sliding back the
|
|||
|
locking mechanism. For best results, work it both ways with a pair of
|
|||
|
screwdrivers; a short one for leverage, a longer one for manipulation.
|
|||
|
For dead-bolts, a pipe wrench (a wrench with parallel grips) can
|
|||
|
turn the entire lock 90 degrees. Interior doors are cheaply
|
|||
|
constructed; if you can wrench the lock, it'll turn and the bolt will be
|
|||
|
pulled back into the door. Quality dead-bolts have an inclined exterior
|
|||
|
to prevent it from being gripped. For these, diamond-cutting string can
|
|||
|
be applied. This is available at select plumbing supply houses for $150
|
|||
|
upwards.
|
|||
|
|
|||
|
-- Ceilings and adjacent offices. Not only are the doors cheap inside
|
|||
|
office buildings, so are the walls. If you're having trouble with a
|
|||
|
door or lock, push up a ceiling tile with your screwdriver and see if
|
|||
|
the wall stops or is continuous. If it stops, you may choose to climb
|
|||
|
over. If you're already inside an office and find a particular room
|
|||
|
locked, climbing is always an option because walls are never continuous
|
|||
|
between rooms. Walls are seldom continuous between business either; if
|
|||
|
you can't get into a particular office space, try through adjacent
|
|||
|
space.
|
|||
|
|
|||
|
-- Brute force. If making noise is not a serious concern, a crowbar
|
|||
|
will pry any door open. For most situations requiring this level of
|
|||
|
force, a sleek, miniature bar is all you need. You can also saw or
|
|||
|
hammer your way through any interior wall. Once you've made a hole in
|
|||
|
the sheetrock, you can practically break out the remainder of an opening
|
|||
|
yourself using only your hands.
|
|||
|
From the outside, windows can be broken or removed. Office
|
|||
|
building glass is installed from the outside, so by removing the seal
|
|||
|
and applying a suction device, you can pull the entire window out.
|
|||
|
Breaking the glass is not too difficult, but frighteningly loud. Using
|
|||
|
a screwdriver, push the blade between the edge and its frame and pry.
|
|||
|
Eventually you'll have holes and cracks running across the window.
|
|||
|
Building glass is typically double-paned; once through the exterior
|
|||
|
layer, you'll have to break the next. Because the second layer isn't as
|
|||
|
thick, you have the option of prying or smashing. This sounds extremely
|
|||
|
primitive -- it is, but it may be the only method available to you.
|
|||
|
Highly-alarmed office structures do not have the windows wired. When
|
|||
|
there's a 5,000-port NEC NEAX 2400 in view and alarms everywhere else,
|
|||
|
you'll break the fucking glass.
|
|||
|
|
|||
|
-- Alarm manipulation. Entire files could be written on this subject.
|
|||
|
Some relevant facts will be touched on here; no MacGyver shit.
|
|||
|
Our "typical" office building, if alarmed, has one of three types
|
|||
|
of alarm plans. The alarm system is either externally-oriented,
|
|||
|
internally-oriented, or both. More often than not, externally-oriented
|
|||
|
alarm systems are encountered. These focus on keeping outside intruders
|
|||
|
from entering the building -- interior offices are secured only by
|
|||
|
locks. Alarm devices such as magnetic switches and motion detectors are
|
|||
|
in place solely in lobby areas and on doors leading from outside. If
|
|||
|
you know in advance that you can readily enter any of the offices, the
|
|||
|
alarm is harmless. After entering, go directly into the office and look
|
|||
|
out the window. Eventually, security or police will arrive, look
|
|||
|
around, then reset the alarm and leave -- so long as you haven't left
|
|||
|
any trace of your entry (damaged doors, ceiling tile fragments, etc).
|
|||
|
Although common areas and corridors will be briefly scanned, no company
|
|||
|
offices will be entered.
|
|||
|
Internally-oriented alarm plans include alarms on individual
|
|||
|
offices and are more difficult to reckon with. However, the sensors are
|
|||
|
only on the doors; any method that avoids opening the door can still be
|
|||
|
used.
|
|||
|
Access controls like cardkeys are impressive in appearance but do
|
|||
|
not automatically represent an alarm. If you open the door without
|
|||
|
inserting a cardkey, the system must be equipped to know whether a
|
|||
|
person entered the building or exited. Thus, only those systems with
|
|||
|
motion detectors or a "push button to exit" sign and button can cause an
|
|||
|
alarm at the cardkey-controlled door. Otherwise the door and cardkey
|
|||
|
device is no more than a door with an electronic lock. There are always
|
|||
|
exceptions to the rules, of course; never trust any alarm or access
|
|||
|
control system. Sometimes a system will be programed to assume any
|
|||
|
opened door is someone entering, not exiting. Check for sensors --
|
|||
|
mounted flush on the door frame -- look carefully, they'll sometimes be
|
|||
|
painted over. Check both sides and top of the frame. If a sensor is
|
|||
|
found (or when in doubt) hold the door open for about ten seconds, then
|
|||
|
wait and watch for up to an hour to see if there's a silent alarm.
|
|||
|
For the "push button to exit" entrances, you can sometimes use a
|
|||
|
coat hanger or electricians fish tape to push the button from outside
|
|||
|
using cracks around the door. Where motion detectors automatically open
|
|||
|
the entrance, similar devices can be employed to create enough commotion
|
|||
|
to activate the detector (depending on detector type).
|
|||
|
Disabling part of the alarm system may be a possibility during the
|
|||
|
day. Chances are, if you can access the control CPU you've also got a
|
|||
|
place to hide, and the control box is often alarmed against tampering
|
|||
|
anyway. Many of the latest systems are continuously monitored from a
|
|||
|
central station. If not, you can disconnect the alarm box from its
|
|||
|
phone line. Your best approach however is to alter a door
|
|||
|
sensor/magnetic switch circuit. You can use a piece of conductive hot
|
|||
|
water duct tape to trick the sensor into thinking the door is always
|
|||
|
closed. This tape looks like tin foil with an adhesive on one side.
|
|||
|
Obtain a similar sensor and test at home before relying on this --
|
|||
|
magnetic switches come in many shapes and forms. The better systems
|
|||
|
don't even check for normally-open or normally-closed states, but for
|
|||
|
changes in the loop's resistance. This means simply cutting or
|
|||
|
shorting the lead wires won't suffice. But if the conductive tape won't
|
|||
|
do, you can always just cut the leads and return in a couple days. If
|
|||
|
the cut hasn't been repaired, then you have an entry point. Building
|
|||
|
managers become lax with an alarm system after it's been installed for a
|
|||
|
while and there haven't been any break-ins. Other loops are disabled
|
|||
|
after late-working employees repeatedly off the alarm. One other option
|
|||
|
is to cut and splice both parts of the sensor back into the loop so that
|
|||
|
it remains unaffected by movement of the door. The throughways to
|
|||
|
target for any of these alterations are minor side doors such as parking
|
|||
|
garage or stairwell exits. You should be pleasantly surprised with the
|
|||
|
results.
|
|||
|
|
|||
|
-- Locks and picks. (This could be another textfile in itself).
|
|||
|
Lockpicking is an extremely useful skill for PBX appropriation but
|
|||
|
requires quite a bit of practice. If you aren't willing to invest the
|
|||
|
time and patience necessary to become effective with this skill,
|
|||
|
screwdrivers are the next best thing. Furthermore, with all the
|
|||
|
different types and brands of locks in existence, you'll never be able
|
|||
|
to solely rely on your lockpicking skills. Acquire this ability if your
|
|||
|
involvement in underworld activities is more than just a brief stint...
|
|||
|
|
|||
|
You can more readily take advantage of the skills possessed by
|
|||
|
locksmiths. Because the offices within a typical building all use the
|
|||
|
same brand lock with a common keying system, any of the locks can yield
|
|||
|
the pattern for a master key to the whole system. Obtain a spare lock
|
|||
|
from the basement, maintenance room, or anywhere extra doors and
|
|||
|
hardware are stored, and take it to a locksmith. Request a key for that
|
|||
|
lock and a master. Many of the offices should now be open to you.
|
|||
|
Some keys are labeled with numbers -- if the sequence on the key
|
|||
|
equals the number of pins in the lock, you can write down the number and
|
|||
|
lock brand, and get a duplicate of the key cut.
|
|||
|
There is also a little locksmithing you can do on your own. With a
|
|||
|
#3 triangular "rat tail" file and a key blank to the brand lock you are
|
|||
|
targeting, you can make your own key. Blanks are either aluminum or
|
|||
|
brass and scratch easily -- this is no accident. By inserting a key
|
|||
|
blank in the lock and moving it from side to side, you'll create
|
|||
|
slate-colored scratch lines on the blank from the lock's pins. The
|
|||
|
lines will indicate where to begin filing a valley -- there'll be one
|
|||
|
for each pin. Move the file back and forth a few times and re-insert
|
|||
|
the key to make new lines. Use the point of the file only when
|
|||
|
beginning the valley; successive passes should not create a point at the
|
|||
|
bottom of the cut but leave a flat gap. When no new scratch appears on
|
|||
|
the bottom of a particular valley, don't file the valley any deeper --
|
|||
|
it's complete. Eventually, all the valleys will be cut and you'll have
|
|||
|
a key to open the lock.
|
|||
|
Last but certainly not least, you can drill most locks where a
|
|||
|
little noise can be afforded. Using a 1/4 inch Milwaukee cordless drill
|
|||
|
with about a 1/8 inch carbide-tipped bit, you can drill a hole the
|
|||
|
length of the lock's cylinder. Drill approximately 1/8 inch directly
|
|||
|
above the keyhole. This destroys the lock's pins in its path, and
|
|||
|
allows others above to fall down into the hole. Now the cylinder will
|
|||
|
turn with any small screwdriver placed in the keyhole and open the lock.
|
|||
|
Little practice is demanded of this technique, and it's a hell of a lot
|
|||
|
of fun.
|
|||
|
|
|||
|
-- Elevator manipulation. Elevators can be stubborn at times in
|
|||
|
rejecting your floor requests. Companies that occupy entire floors must
|
|||
|
prevent an after-hours elevator from opening up on their unattended
|
|||
|
office. If there's a small lock corresponding or next to that floor's
|
|||
|
selection button, unscrew the panel and short out the two electrical
|
|||
|
leads on the other end of the lock. Continue to short the contacts
|
|||
|
until you press the button and it stays lit -- you'll then arrive at
|
|||
|
your desired floor.
|
|||
|
The elevator motor and control room is located either on the roof
|
|||
|
or penthouse level and can be frequently found accessible. Besides
|
|||
|
being a place to hide, sometimes you can find a bank of switches that
|
|||
|
override the elevator's control panel (if for some reason you can't open
|
|||
|
it or it's cardkey-controlled) and get to your floor that way. Two
|
|||
|
people with radios are needed to do this -- one in the equipment room,
|
|||
|
one in the elevator. Watch for high voltage and getting your coat
|
|||
|
caught in a drive belt ...
|
|||
|
|
|||
|
Operation Integrity
|
|||
|
|
|||
|
By taking advantage of daytime access, hiding places, and some of
|
|||
|
the more sophisticated methods, there's no need to become an alarm
|
|||
|
connoisseur or full-blown locksmith to liberate PBX equipment. When
|
|||
|
you can't avoid nighttime activity or an activated alarm system, then be
|
|||
|
sure to take extra precautions. Have lookouts, two-way radios, even a
|
|||
|
police scanner. Don't use CB radios, but rather HAM transceivers or
|
|||
|
anything that operates on proprietary frequencies. This will require a
|
|||
|
small investment, but there's no price on your safety.
|
|||
|
Office buildings in downtown areas tend to be more secure than
|
|||
|
those in the suburbs or outlying areas. Location and surroundings are
|
|||
|
important considerations when your operation takes place at night. It
|
|||
|
should also be noted that a building without a security guard (typically
|
|||
|
the norm) may still subscribe to sporadic security checks where
|
|||
|
rent-a-cops drive around the building at some regular interval.
|
|||
|
With regard to transportation and storage, rent vehicles and
|
|||
|
facilities in alias names where appropriate. Use taxis to pick you up
|
|||
|
when you're departing with only a briefcase or single box of cards. No
|
|||
|
matter what the time may be, anyone seeing you enter a taxi in front of
|
|||
|
the office will assume you're legit.
|
|||
|
It is our sincere wish that you apply this information to the
|
|||
|
fullest extent in order to free yourself from becoming a mere tool of
|
|||
|
capitalism, and use this freedom to pursue those things in life that
|
|||
|
truly interest you. We have tried to summarize and convey enough
|
|||
|
basic information here to provide you with a complete underground
|
|||
|
operation possibility. All material in this file is based on actual
|
|||
|
experience of the authors and their associates.
|
|||
|
|
|||
|
For information on the sale of PBX or other telecommunications
|
|||
|
equipment, or for any other inquiry, contact the Dark Side Research
|
|||
|
group at the following Internet address :
|
|||
|
|
|||
|
codec@cypher.com
|
|||
|
|
|||
|
***************************************************************************
|