| ==Phrack Inc.== |
| Volume One, Issue Three, Phile 2 of 10 |
|
|
| The purpose of this file is to tell you what you would be dealing with if |
| you stumble across this system, or if you know of a company that is using this |
| system. It doesn't go into incredible detail, and is lacking in areas. It is |
| not a guide to hacking into it, just letting you know what you would be dealing |
| with. This is to pique your interest in the system. |
|
|
| So What the Hell is ROLM? |
| ------------------------- |
| ROLM is a "Business Communications System" bought by IBM a few months ago, |
| in an effort to compete effectively with AT&T, and get a larger share of the |
| market, in a grand master plan to become "Big Daddy Blue" as opposed to "Ma |
| Bell". It is a very complex system, with features such as PhoneMail, A |
| Super-PBX, Local Area Networks, Public and Private Data Networks, Desktop |
| Communications, and Call Management. |
| The heart of the system is the Controller, called the CBX <Computerized |
| Business Exchange>. This controls the entire network accessible through ROLM. |
| Since 1983, the CBX was redesigned and upgraded to the CBX II. It is a PBX with |
| much much more <See 'Introduction to PBX's' available on your local bbs> to |
| offer, and that is ROLM's claim to fame. It is light years ahead of the regular |
| PBX system. |
|
|
|
|
| The CBX II |
| ---------- |
|
|
| The CBX II is the core of the ROLM network. It is computer driven and |
| expandable from one node, with 165 channels, to 15 nodes providing 11,5200 |
| 2-way channels. The smaller business could have a model with a 16 user maximum |
| limit, but it can go up to 10,000 users, though this would be quite rare <and |
| quite God Damn expensive!>. It can be accessed from outside lines <like you> as |
| well as HardWired units, with a switching system to prevent busy signals on a |
| port. Speed depends on the system in place, either the newer, faster ROLMbus |
| 295, or the older standard ROLMbus 74. <see Service manuals for exact details> |
| The larger the system, the faster as well. It is adjustable to accept different |
| bandwidths for the various components, such as Telex, Voice, Data, Mainframe, |
| LAN, Video <ta-da! Picturefones in reality!>, and anything hooked up to the |
| system. Similar tasks can be bunched onto one channel as well, at high or low |
| speeds. If multiplexing is used <above>, the maximum speed is 192,000 bps, and |
| if using a single interface, the top possible rate is a mindboggling 37,000,000 |
| bps, which if you ask me, if just fluff and not too practical, so they are |
| usually multiplexed. <Now, what a difference that is from 300 baud!>. Using |
| the CBX II network, you might find just about any kind of mainframe, from HP, |
| to DEC, to VAX, to the IBM 327 series. |
| Note : There is a smaller version of this called the VSCBX. |
|
|
|
|
| Phone Mail |
| ---------- |
|
|
| This is one of the little beauties of the system, something truly fun to |
| fuck with. I called ROLM Headquarters in California to ask specific questions |
| about ROLM, posing as a researcher, and I got the big runaround, transferred |
| from department to department. Maybe you can get further than I. Their is |
| 408-986-1000. The to PhoneMail from the outside is 800-345-7355. A nice |
| computer-generated voice comes on asking you to enter your Extension number |
| <which each employee has>, and then enter the "" sign. Then enter your |
| password. If you make around 3 or 4 bad attempts at an Extension of Password, |
| it will automatically ring another number, assistance I assume, to find out why |
| there has been an unsuccessful entry attempt. I haven't played around with this |
| that much, so leave mail to Monty Python with whatever you find. Once entering |
| an authorization with correct password, you will be presented with more |
| options, leave messages to other people, and whatnot. You can hear your |
| messages, forward them to another person, leave the same message to more than |
| one person, change your welcome message, etcetera. The service is for those |
| business-type pigs who never sit still for one minute, like they are |
| permanently on speed. |
|
|
| A Phone Mail Scenario |
| --------------------- |
|
|
| Let's say if Mr. Greed goes out to meet his secretary at a motel, but |
| definitely has to get that important message from Mr. Rasta, who's bringing in |
| $3 mil in Flake, and can't trust it to the person who would handle it <ie: the |
| person filling in for his sec with the tremendous tits who is getting balled by |
| the dirty old fat man>. Mr. Greed would have given Mr. Rasta his phone and he |
| would be forwarded to the Phone Mail network, where he would hear a message |
| left my Mr. Greed, to anyone who would call. Mr. Rasta would leave his message |
| and hang up. Then Mr. Greed could call up the 800-345-7355 , punch in his |
| extension authorization number, and password. Or, if he was back at the office, |
| he could get it there through DeskTop communications. Messages can be delivered |
| without error, in the person's own voice, without other people knowing about |
| it. Therefore, someone with enough knowledge could use an unused account and |
| use it as his own service, without the knowledge of others. |
|
|
| DeskTop communications |
| ---------------------- |
|
|
| ROLM has developed a Computer/Telephone integrated device for use with the |
| Desktop communications. It is linked with the CBX II through fone lines, thus |
| accessible by you and me from the outside. It is not hardwired, though it can |
| approach hardwired speed. If you could get your hands on one of these |
| computer/fones then I think you would have found something very useful at home, |
| in your general life. But you could access the network without the special |
| features of the fone, like one touch dialing, which is designed for the stupid |
| lazy businessman. You can access company databases through the network, |
| mainframes, other people, just about anything as if you were right there and |
| told your secretary to do it for you. There is special software used by the |
| computers or computer/fone but it can be improvised and is just an aid. It uses |
| a special protocol <Don't know what, try to get your hands on one by trashing a |
| sales office>. What is great is that everything is tied together through |
| telefone lines, and not RS-232C! Thus, there is an access port....somewhere. |
| Scan the 's around the office using ROLM. How do you know if it is using |
| ROLM one way or the other. Compile a list of local businesses, call them up |
| saying "This is ROLM Customer Support. We have a report of a complaint in your |
| CBX II network, let me speak to your supervisor please." If they say "ROLM? CBX |
| II? We don't use that" then just apologize and go elsewhere. Or say that you |
| are from ROLM corp and would like to know if the company is interested in using |
| it to network its system. Like, if they have it already, they would say that |
| they had it. And if they didn't, you would just give them a fake <or if |
| you're nice the for the local sales office obtainable in the list below>. |
|
|
| But you know what's REALLY Great? They have made the network link in mind |
| for the person with a Computer IQ of about 0. Commands are in plain English. |
| Here is a demonstration screen as seen in their brochure: |
| CALL, DISPLAY or MODIFY |
|
|
| Display groups |
|
|
| ACCESSIBLE GROUPS: |
| [00] PAYROLL [01] MODEM [02] IBMHOST |
| [03] DOWJONES [04] DECSYSTM [05] MIS-SYSTM |
| [06] DALLAS [07] SALES |
|
|
| CALL, DISPLAY OR MODIFY? |
| Call Payroll |
|
|
| CALLING 7717 <which would be the ID code for the PAYROLL file> |
| CALL COMPLETE |
|
|
| **PAYROLL SYSTEM** <or whatever they want to call it> |
| ENTER ACCOUNT CODE: |
|
|
| See, nothing is confusing, everything pretty self-explanatory. There may be |
| more than one person wanting to do the same thing you are, so if there is, you |
| would be put on a queue for the task. It seems that those with an IBM would be |
| best suited for ROLM hacking, because ROLM is owned by IBM, and the PC's used |
| by the network are IBM. A person with a simpler fone/Terminal couldn't access |
| something like their DEC mainframe, or something like that. By calling in, you |
| could not run an application, unless you had a special interface, but you could |
| access the database, which any dumb terminal could do. |
| However, there are security levels. Thus one with a privileged account |
| could access more things than one without it. Like Joe Schmoe in Sales couldn't |
| get to Payroll . It seems that for non-IBM's to access some of the parts of the |
| network, you would need an interface to become the same thing as a RolmPhone. |
| Excessive 's of bad logon attempts, which would be construed as a linking |
| error would notify the network manager, And if they saw that there was no |
| hardware error, eventually, they would think of if they were somewhat |
| experienced, you guessed it, hackers. |
|
|
| The PBX |
| ------- |
|
|
| ROLM has something called Integrated Call Management <from here on known as |
| ICM>. Now, when designing ICM, they must have taken into account the abuse |
| possible in plain ol' PBX's. So they put in something called Call Screening. |
| This will enable the company to restrict calls to certain 's and prefixes. |
| Calls to non-business 's or certain areas can be screened out <"No personal |
| calls on my time, Johnson!">, with the exception of 1 specific that you want. |
| There is a choice of having a codeless, screened PBX, or a PBX where |
| accounts are assigned to each employee, and the 's they call get recorded to |
| that account. There can be privileged accounts where a large volume of calls |
| would go relatively un-noticed. But I don't think that large-scale abuse of |
| this system would be easy or practical. Calls are routed AUTOMATICALLY through |
| the service where the rates are cheaper to the location dialed, which is pretty |
| fucking cool. And, the PBX is accessible from the outside, using Direct Inward |
| System Access, making it AB-useable. |
| But what about if there is Equal Access in that area? It doesn't matter, |
| the CBX will automatically access the service without you having to worry about |
| it <hell, this is totally unnecessary for a hack/phreak, cause we ain't paying |
| for the damn call anyhow!> |
| BUT!: There is a use of Call Detail Recording, where information on all |
| ingoing and outgoing calls are recorded. |
|
|
| Conclusion |
| ---------- |
|
|
| Not a lot of research went into this file, but it did take a little while |
| to type up, and all of the information is correct, to my knowledge. Anyone is |
| free to expand on this file into a Part II. It was written to enlighten people |
| about this system, and I hope this has helped a little bit. |
| Sysops: You are free to put this file up as long as NONE of the credits |
| are changed! <this means the Phrack, Inc. AND Personal credits>. Please give us |
| a chance. |
|
|
| Coming soon, to a telephone near you: The Return of The Flying Circus. Look |
| for it. |
| --Later On |
| Monty Python <01/11/86> |
|
|
|
|
|
|
|
|
|
|