| |
| ==Phrack Magazine== |
|
|
| Volume Four, Issue Forty-Three, File 15 of 27 |
|
|
| [** NOTE: The following file is presented for informational purposes |
| only. Phrack Magazine takes no responsibility for anyone |
| who attempts the actions described within. **] |
|
|
|
|
| *************************************************************************** |
|
|
| Physical Access & Theft of PBX Systems |
|
|
| A DSR Tutorial by : |
|
|
| CO/der DEC/oder & Cablecast 0perator. |
|
|
| (K)opywronged 1993, by Dark Side Research |
|
|
| *************************************************************************** |
|
|
| BACKGROUND |
| ~~~~~~~~~~ |
|
|
| July 1989, Mobil Oil Corporation Headquarters -- Fairfax, VA. |
|
|
| Abundant technology, late hours, and shadows between city lights |
| made up the typical environment CO/der DEC/oder repeatedly found |
| adventure in. On one such night in the summer of '89, a reconnaissance |
| outing landed him at the offices of Mobil Oil Corp. The door leading |
| from the multi-level parking garage into the foyer was equipped |
| with an access-request phone and a square black pad. The pad was flush |
| with the wall, and sported a red LED in its center -- a rather imposing |
| device used to read magnetic access cards. CODEC picked up the phone |
| and listened to a couple rings followed by the voice of a security |
| guard, "Good evening, security ..." |
| "Evenin', this is Dick Owens with CACI graphics. I don't have a |
| card, but just call upstairs and they'll verify." |
| "Hold on, sir ..." |
| Kastle Security's verification call registered as a sudden 90 VAC |
| spike on Cablecast 0perator's meter. Clipped on the blue and white pair |
| of CACI's incoming hunt group, Cable picked up on his TS-21: |
| "Hello?" |
| "This is Kastle Security. We've got a Dick Owens downstairs |
| requesting access." |
| "Yeah Sure. Let him in please." |
| The security man took Codec off hold, "Okay sir, what entrance are |
| you at?" |
| "Garage level one." |
| The door clicked, and in went the hacker-thief -- grinning. |
| Another lock at the end of a hallway also hindered access, but a |
| screwdriver, placed between door and frame, removed the obstruction with |
| a quickly applied force. |
| CACI was a graphics outfit sharing the same building with Mobil. |
| After a perusal through its desks and darkened corridors turned up a |
| cardkey for later use, Codec -- pausing casually along the way at the |
| drunking fountain -- made his way to the opposite end of the hallway and |
| into Mobil's mail receiving room. In contrast to elsewhere in the |
| building, this room was chilly -- as if heavy air conditioning was |
| nearby. There was also a faint roar of fans to enhance this notion. |
| And behind a countertop in the direction of the noise, a split door could |
| be seen through which mail and parcels were passed during business |
| hours. Hardly an obstacle, he was on the other side in an instant. |
| This "other side" was no less than a gateway to nirvana. At first he |
| began taking in the sight of a mini-computer, console, and mass storage |
| devices, but his eyes were virtually pulled to the giant on his left. |
| It was the largest and most impressive PBX he had yet seen; a label |
| above the five gargantuan, interconnected cabinets read, "AT&T SYSTEM |
| 85." The hacker's heart raced -- he wanted to explore, control, and own |
| the switch all at once. Within seconds his gloved hands caressed the |
| cabinets while his hungry eyes scanned circuit pack descriptors, mouth |
| agape. Codec grabbed some manuals, jotted down numbers to a modem |
| stack, and reluctantly departed. A week later, he stole the switch. |
| To the Dark Side Research group, the System 85 would be worth |
| approximately $100,000 -- but to Mobil, the system was worth at least |
| six times that figure. In its entirety it was more valuable, but DSR |
| was only concerned with the guts; the digital circuitry of the system. |
| When Codec reentered the building the following week, he was wearing a |
| VOX headset attached to a hand-held 2-meter band (HAM) radio. This was |
| strapped to his chest except for the rubber-whip antenna which protruded |
| out of a hole in his jacket. His awestruck, gleeful countenance from |
| a week prior had been replaced by a more grave expression, and the |
| moisture now on his body was no longer from unconscious salivation |
| but due to the sweat of anticipation and rapid movement. |
| "Phase one complete," he spoke into the boom mic in front of his |
| face. |
| "Roger Nine-Two. Quit breathing on the VOX or adjust sensitivity, |
| over." |
| "Roger Nine-Three. Entering heavy EMI area," Codec acknowledged to |
| one of the lookouts. |
| Steps were retraced through the mail room, where several empty |
| boxes marked "U.S. Mail" and a dolly were conveniently stored. The |
| System 85 was shut down, cabinet by cabinet, as most of the circuit |
| boards were hastily removed and boxed. Seven boxes were filled, |
| requiring two trips with the dolly to a side door. |
| "All units: ready for docking." |
| "Roger Nine-Two. Standby. Nine-Three, okay for docking?" |
| "Step on it, over ..." |
| A Ford Escort with its hatch open raced up to where Codec and the |
| boxes stood. Within fifteen minutes the circuit packs were unloaded in |
| a public storage unit. Within half an hour, CO/dec DEC/oder, Cablecast |
| 0perator, and the remainder of the night's crew were filling up with |
| doughnuts of the nearby 7-11, observing local law enforcement doing the |
| same. |
|
|
| APRIL 1993: Security memorandum broadcast from wrq.com -- Internet |
|
|
| "We've all heard of toll fraud as a way to steal telecommunications |
| resources. Now the ante has been escalated. I've heard of a |
| company on the East Coast that was having some minor troubles with their |
| PBX. A technician showed up at the door and asked directions to the PBX |
| closet. The company showed this person the way without checking any |
| credentials, and about five minutes later the phones went completely |
| dead. They went up to the PBX closet and found that several boards from |
| the PBX had been removed and that the 'repairman' had departed." |
|
|
|
|
| The theft of PBX circuit boards is a novel idea and seldom heard |
| of, but -- as made apparent above -- it does occur. In the used PBX |
| scene, often referred to as the "secondary" or "grey" market, there is |
| always a demand for circuit packs from a wide variety of PBXs. The |
| secondhand PBX industry grew from $285 million in 1990 to $469 million |
| in 1992 -- despite the recession. |
| The essence of any PBX is a rack or multiple racks of circuit |
| cards/boards/packs, with an average grey market value of anywhere from |
| $50 to $2000 each. The cards are lightweight, small in size, and can |
| even withstand a moderate dose of abuse. Transport of misappropriated |
| circuit boards is done without risk -- under and police scrutiny, a box |
| of these looks like a mere pile of junk (or senior engineering project) |
| in the trunk of your car. Furthermore, the serial numbers on the boards |
| are seldom, if ever, kept track of individually, and these can be |
| removed or "replaced" in any case. Unlike computer equipment or |
| peripherals, PBX cards are extremely safe, simple, and non-proprietary |
| components to handle -- even in quantity. |
| Although you may wish to physically access PBXs for reasons other |
| than theft, it will be assumed here that monetary gain is your motive. |
| In either case, this introductory file makes it clear that access can be |
| achieved with varying levels of ease. A PBX theft should be thought of |
| in terms of two phases: reconnaissance and extraction. Recon involves |
| finding and selecting prime targets. Extraction is the actual theft of |
| the system. Both phases can be completed through "office building |
| hacking," a wide variety of deception, breaking and entering, social |
| engineering, and technical skills. |
|
|
| Phase I : Reconnaissance |
|
|
| PBXs are found where people's communications needs warrant the |
| capabilities of such a system -- offices, schools, hotels, convention |
| centers, etc. The PBXs we will concert ourselves with in this discourse |
| however are those located in shared or multiple-leased office |
| structures; the "typical" office buildings. The typical office building |
| has enough floors to require an elevator, some parking space, a lobby, |
| and a company directory (Because it is shared by more than one |
| business). Companies that occupy an entire building by themselves are |
| generally too secure to be worthwhile targets. |
| Tenant companies in the typical building lease all different size |
| office space -- some rent only 300 sq. ft., others take up entire |
| floors. Those that use half a floor or more usually meet the criteria |
| for PBX ownership. Obviously, the larger the firm's office at that |
| site, the greater its PBX will be, so those business spread out over |
| several floors will have the most valuable systems. This is not always |
| an overwhelming factor in determining a target however. The smaller |
| systems are often easier to get at -- and ultimately to remove -- |
| because they tend to be located in utility closets off publicly |
| accessible hallways as opposed to within a room inside an office space. |
| Those closets, sometimes labeled "telephone" and even unlocked, will be |
| found one or two per floor! Other closets may exist for electrical |
| equipment, HVAC, plumbing, janitorial supplies, or for a combination of |
| these uses in addition to telephone service. |
| A phone closet is easily distinguishable whether or not a switch or |
| key system is present. A web of low-voltage (22 AWG), multi-colored |
| wiring will be channelled and terminated on a series of white "66" |
| blocks mounted on the wall. These blocks are a few inches wide, and |
| roughly a foot long, with rows of metallic pins that the wiring is |
| punched into with a special tool. As a general rule, if the system is |
| fastened to the wall and doesn't have at least one muffin fan built-in |
| and running, it's either a measly key system or a PBX too small to |
| deserve your attention. Those worthy of your time will stand alone as a |
| cabinet with a hinged door, contain shelves of circuit cards, and |
| emanate the harmonious hum of cooling fans. As an example, Mitel PBXs |
| commonly fit cozily in closets -- sometimes even one of the newer ROLMs |
| or a voice mail system. On the other hand, an NT SL-100 should |
| not be an expected closet find. |
| Wandering through office buildings in search of phone closets |
| during business hours is easy, so long as you dress and act the part. |
| You'll also want to look confident that you know what you're doing and |
| where you're going. Remember, these buildings are open to the public |
| and an employee of one company can't tell whether or not you're a client |
| of another. When going in and out of the phone closets, who's to know |
| you're not a technician or maintenance man? |
| Apart from searching the closets, you can approach the secretaries. |
| Feign being lost and ask to use the telephone. Steal a glance at the |
| console and you'll know (with a little practice) what type of PBX |
| they've got. This is very valuable information, for it may save you |
| from unsuccessfully breaking into the closet (should it be locked) or |
| the company itself. Secretaries are cute, courteous, and dumb. You |
| shouldn't have a problem convincing her to give you the key to the phone |
| closet if you're posing as a technician. If you're feeling as confident |
| as you should be, you may even get a date with the bitch. And should |
| you ever raise suspicion, you always have the option of bailing out and |
| making a break for the stairwell. No business exec is going to chase |
| you down. |
| Some additional methods can be employed in conjunction with |
| visiting the buildings, or as a precursor to such : |
|
|
| -- Classified ads. A company with job openings is all the more |
| vulnerable to your dark motives. Using the help-wanted section of your |
| newspaper, look for receptionist and secretarial positions. Call and |
| ask, "What type of phone system will I be required to handle?" You may |
| also want to go in and apply for the job -- any job at a large firm will |
| do. You'll learn the type of system installed, some details about |
| security, etc; this is a very sophisticated way of "casin' the joint." |
|
|
| -- Scanning for RMATS. Using your preferred wardialer (such as |
| ToneLoc), scan business districts for PBX remote maintenance modems then |
| CNA your finds. |
|
|
| -- Targeting interconnects. Interconnects are PBX dealers that sell, |
| install, and maintain the systems on contract. Capture a database of |
| clients and you'll have a windfall of leads and pertinent info. AT&T |
| allegedly sells its database by region. Also, intercept voice mail or |
| company e-mail. Interconnects make decent targets themselves. |
|
|
| -- Users groups and newsletters. Some of the extremely large PBX owners |
| join users groups. Though this is abstract, owners will discuss their |
| systems openly at the meetings. Newsletters are mailed out to members, |
| often discussing special applications of specific locations in detail. |
| Great for making sales contacts. |
|
|
| Phase II : Extraction |
|
|
| Removing the PBX calls for an assessment of obstacles versus |
| available means and methods. The optimum plan incorporates a late |
| afternoon entry with a nighttime departure. This means entering the |
| building during business hours and hiding, either in the PBX closet |
| itself or any room or empty space where you can wait until after hours |
| to re-emerge. This is the most safest and effective of methods. You |
| need not worry about alarms or breaking in from outside, and you can |
| take advantage of one of the greatest weaknesses in corporate office |
| security -- janitors. The janitorial staff, if you act and dress |
| properly, will allow you to walk right into an office while they're |
| cleaning. If you're already in an office and they enter, just act like |
| you own the place and it'll be assumed you work there. If you prefer |
| not to be seen, keep hidden until the cleaning is done on your floor. |
| (Be sure not to make the idiotic mistake of hiding in the janitor's |
| closet). Although the custodians will lock the doors behind them, any |
| alarms in the building will remain off until cleaning for the entire |
| structure is complete. |
| There is simply nothing so elegant as entering the building during |
| the daytime hours, hiding, and re-emerging to wreak havoc when |
| everyone's gone. (A patient wait is required -- take along a Phrack to |
| read). Unfortunately, entry will not always be so easy. The phone |
| closet may have a dead-bolt lock. There may be no feasible hiding |
| place. People may constantly be working late. Because of all the |
| potential variables, you should acquire a repertoire of means and |
| methods. Use of these methods, though easy to learn, is not so quickly |
| mastered. There is a certain "fluidity of technique" gained only |
| through experience. Deciding which to use for a given situation will |
| eventually come naturally. |
|
|
| -- Use of tools. You can easily get around almost any office building |
| using only screwdrivers. With practice, prying doors will be quick and |
| silent. Although some doors have pry-guards or dead-bolts, about every |
| other phone closet you'll encounter can be opened with a screwdriver. |
| Before forcing the gap between door and frame, try sliding back the |
| locking mechanism. For best results, work it both ways with a pair of |
| screwdrivers; a short one for leverage, a longer one for manipulation. |
| For dead-bolts, a pipe wrench (a wrench with parallel grips) can |
| turn the entire lock 90 degrees. Interior doors are cheaply |
| constructed; if you can wrench the lock, it'll turn and the bolt will be |
| pulled back into the door. Quality dead-bolts have an inclined exterior |
| to prevent it from being gripped. For these, diamond-cutting string can |
| be applied. This is available at select plumbing supply houses for $150 |
| upwards. |
|
|
| -- Ceilings and adjacent offices. Not only are the doors cheap inside |
| office buildings, so are the walls. If you're having trouble with a |
| door or lock, push up a ceiling tile with your screwdriver and see if |
| the wall stops or is continuous. If it stops, you may choose to climb |
| over. If you're already inside an office and find a particular room |
| locked, climbing is always an option because walls are never continuous |
| between rooms. Walls are seldom continuous between business either; if |
| you can't get into a particular office space, try through adjacent |
| space. |
|
|
| -- Brute force. If making noise is not a serious concern, a crowbar |
| will pry any door open. For most situations requiring this level of |
| force, a sleek, miniature bar is all you need. You can also saw or |
| hammer your way through any interior wall. Once you've made a hole in |
| the sheetrock, you can practically break out the remainder of an opening |
| yourself using only your hands. |
| From the outside, windows can be broken or removed. Office |
| building glass is installed from the outside, so by removing the seal |
| and applying a suction device, you can pull the entire window out. |
| Breaking the glass is not too difficult, but frighteningly loud. Using |
| a screwdriver, push the blade between the edge and its frame and pry. |
| Eventually you'll have holes and cracks running across the window. |
| Building glass is typically double-paned; once through the exterior |
| layer, you'll have to break the next. Because the second layer isn't as |
| thick, you have the option of prying or smashing. This sounds extremely |
| primitive -- it is, but it may be the only method available to you. |
| Highly-alarmed office structures do not have the windows wired. When |
| there's a 5,000-port NEC NEAX 2400 in view and alarms everywhere else, |
| you'll break the fucking glass. |
|
|
| -- Alarm manipulation. Entire files could be written on this subject. |
| Some relevant facts will be touched on here; no MacGyver shit. |
| Our "typical" office building, if alarmed, has one of three types |
| of alarm plans. The alarm system is either externally-oriented, |
| internally-oriented, or both. More often than not, externally-oriented |
| alarm systems are encountered. These focus on keeping outside intruders |
| from entering the building -- interior offices are secured only by |
| locks. Alarm devices such as magnetic switches and motion detectors are |
| in place solely in lobby areas and on doors leading from outside. If |
| you know in advance that you can readily enter any of the offices, the |
| alarm is harmless. After entering, go directly into the office and look |
| out the window. Eventually, security or police will arrive, look |
| around, then reset the alarm and leave -- so long as you haven't left |
| any trace of your entry (damaged doors, ceiling tile fragments, etc). |
| Although common areas and corridors will be briefly scanned, no company |
| offices will be entered. |
| Internally-oriented alarm plans include alarms on individual |
| offices and are more difficult to reckon with. However, the sensors are |
| only on the doors; any method that avoids opening the door can still be |
| used. |
| Access controls like cardkeys are impressive in appearance but do |
| not automatically represent an alarm. If you open the door without |
| inserting a cardkey, the system must be equipped to know whether a |
| person entered the building or exited. Thus, only those systems with |
| motion detectors or a "push button to exit" sign and button can cause an |
| alarm at the cardkey-controlled door. Otherwise the door and cardkey |
| device is no more than a door with an electronic lock. There are always |
| exceptions to the rules, of course; never trust any alarm or access |
| control system. Sometimes a system will be programed to assume any |
| opened door is someone entering, not exiting. Check for sensors -- |
| mounted flush on the door frame -- look carefully, they'll sometimes be |
| painted over. Check both sides and top of the frame. If a sensor is |
| found (or when in doubt) hold the door open for about ten seconds, then |
| wait and watch for up to an hour to see if there's a silent alarm. |
| For the "push button to exit" entrances, you can sometimes use a |
| coat hanger or electricians fish tape to push the button from outside |
| using cracks around the door. Where motion detectors automatically open |
| the entrance, similar devices can be employed to create enough commotion |
| to activate the detector (depending on detector type). |
| Disabling part of the alarm system may be a possibility during the |
| day. Chances are, if you can access the control CPU you've also got a |
| place to hide, and the control box is often alarmed against tampering |
| anyway. Many of the latest systems are continuously monitored from a |
| central station. If not, you can disconnect the alarm box from its |
| phone line. Your best approach however is to alter a door |
| sensor/magnetic switch circuit. You can use a piece of conductive hot |
| water duct tape to trick the sensor into thinking the door is always |
| closed. This tape looks like tin foil with an adhesive on one side. |
| Obtain a similar sensor and test at home before relying on this -- |
| magnetic switches come in many shapes and forms. The better systems |
| don't even check for normally-open or normally-closed states, but for |
| changes in the loop's resistance. This means simply cutting or |
| shorting the lead wires won't suffice. But if the conductive tape won't |
| do, you can always just cut the leads and return in a couple days. If |
| the cut hasn't been repaired, then you have an entry point. Building |
| managers become lax with an alarm system after it's been installed for a |
| while and there haven't been any break-ins. Other loops are disabled |
| after late-working employees repeatedly off the alarm. One other option |
| is to cut and splice both parts of the sensor back into the loop so that |
| it remains unaffected by movement of the door. The throughways to |
| target for any of these alterations are minor side doors such as parking |
| garage or stairwell exits. You should be pleasantly surprised with the |
| results. |
|
|
| -- Locks and picks. (This could be another textfile in itself). |
| Lockpicking is an extremely useful skill for PBX appropriation but |
| requires quite a bit of practice. If you aren't willing to invest the |
| time and patience necessary to become effective with this skill, |
| screwdrivers are the next best thing. Furthermore, with all the |
| different types and brands of locks in existence, you'll never be able |
| to solely rely on your lockpicking skills. Acquire this ability if your |
| involvement in underworld activities is more than just a brief stint... |
|
|
| You can more readily take advantage of the skills possessed by |
| locksmiths. Because the offices within a typical building all use the |
| same brand lock with a common keying system, any of the locks can yield |
| the pattern for a master key to the whole system. Obtain a spare lock |
| from the basement, maintenance room, or anywhere extra doors and |
| hardware are stored, and take it to a locksmith. Request a key for that |
| lock and a master. Many of the offices should now be open to you. |
| Some keys are labeled with numbers -- if the sequence on the key |
| equals the number of pins in the lock, you can write down the number and |
| lock brand, and get a duplicate of the key cut. |
| There is also a little locksmithing you can do on your own. With a |
| #3 triangular "rat tail" file and a key blank to the brand lock you are |
| targeting, you can make your own key. Blanks are either aluminum or |
| brass and scratch easily -- this is no accident. By inserting a key |
| blank in the lock and moving it from side to side, you'll create |
| slate-colored scratch lines on the blank from the lock's pins. The |
| lines will indicate where to begin filing a valley -- there'll be one |
| for each pin. Move the file back and forth a few times and re-insert |
| the key to make new lines. Use the point of the file only when |
| beginning the valley; successive passes should not create a point at the |
| bottom of the cut but leave a flat gap. When no new scratch appears on |
| the bottom of a particular valley, don't file the valley any deeper -- |
| it's complete. Eventually, all the valleys will be cut and you'll have |
| a key to open the lock. |
| Last but certainly not least, you can drill most locks where a |
| little noise can be afforded. Using a 1/4 inch Milwaukee cordless drill |
| with about a 1/8 inch carbide-tipped bit, you can drill a hole the |
| length of the lock's cylinder. Drill approximately 1/8 inch directly |
| above the keyhole. This destroys the lock's pins in its path, and |
| allows others above to fall down into the hole. Now the cylinder will |
| turn with any small screwdriver placed in the keyhole and open the lock. |
| Little practice is demanded of this technique, and it's a hell of a lot |
| of fun. |
|
|
| -- Elevator manipulation. Elevators can be stubborn at times in |
| rejecting your floor requests. Companies that occupy entire floors must |
| prevent an after-hours elevator from opening up on their unattended |
| office. If there's a small lock corresponding or next to that floor's |
| selection button, unscrew the panel and short out the two electrical |
| leads on the other end of the lock. Continue to short the contacts |
| until you press the button and it stays lit -- you'll then arrive at |
| your desired floor. |
| The elevator motor and control room is located either on the roof |
| or penthouse level and can be frequently found accessible. Besides |
| being a place to hide, sometimes you can find a bank of switches that |
| override the elevator's control panel (if for some reason you can't open |
| it or it's cardkey-controlled) and get to your floor that way. Two |
| people with radios are needed to do this -- one in the equipment room, |
| one in the elevator. Watch for high voltage and getting your coat |
| caught in a drive belt ... |
|
|
| Operation Integrity |
|
|
| By taking advantage of daytime access, hiding places, and some of |
| the more sophisticated methods, there's no need to become an alarm |
| connoisseur or full-blown locksmith to liberate PBX equipment. When |
| you can't avoid nighttime activity or an activated alarm system, then be |
| sure to take extra precautions. Have lookouts, two-way radios, even a |
| police scanner. Don't use CB radios, but rather HAM transceivers or |
| anything that operates on proprietary frequencies. This will require a |
| small investment, but there's no price on your safety. |
| Office buildings in downtown areas tend to be more secure than |
| those in the suburbs or outlying areas. Location and surroundings are |
| important considerations when your operation takes place at night. It |
| should also be noted that a building without a security guard (typically |
| the norm) may still subscribe to sporadic security checks where |
| rent-a-cops drive around the building at some regular interval. |
| With regard to transportation and storage, rent vehicles and |
| facilities in alias names where appropriate. Use taxis to pick you up |
| when you're departing with only a briefcase or single box of cards. No |
| matter what the time may be, anyone seeing you enter a taxi in front of |
| the office will assume you're legit. |
| It is our sincere wish that you apply this information to the |
| fullest extent in order to free yourself from becoming a mere tool of |
| capitalism, and use this freedom to pursue those things in life that |
| truly interest you. We have tried to summarize and convey enough |
| basic information here to provide you with a complete underground |
| operation possibility. All material in this file is based on actual |
| experience of the authors and their associates. |
|
|
| For information on the sale of PBX or other telecommunications |
| equipment, or for any other inquiry, contact the Dark Side Research |
| group at the following Internet address : |
|
|
| codec@cypher.com |
|
|
| *************************************************************************** |