About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Phreak
Boxes, Old and New
Bugs and Taps
Cellular Phones
Introduction to Telecommunications
PBX's and Switches
Payphones
Phone Phun
VMB's, Pagers, E-Mail, and S&F Systems
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

How to break into answering machines


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
Hacking Telephone Answering Machines

by Doctor Pizz and Cybersperm

******************************************************************************
DISCLAIMER: The following is for informational purposes only. All information
provided is simply to point out how easy it is to access such a system. The
author accepts no responsibility for irresponsible use of this knowledge, and
it is provided solely so people can be aware of the low security of such
systems. (Now that I'm off the hook in case you do something stupid...).
******************************************************************************

It seems that lately there is very little discussion of one of the most
simple but useful and rewarding forms of electronic information gathering,
hacking the telephone answering machine. Almost everyone has one of these
wonderful devices these days, to catch important messages while they are away
from their phones, or to screen important telephone calls. Nowadays, they
typically have the added advantage of being accessible from remote telephones,
so one needs to simply call his or her answering machine, enter their secret
code, and then either retrieve new messages, or listen to anything they had
previously recorded on the incoming messages tape, or perform any of a set of
additional functions determined by which key they press on their touch tone
phone. They also typically ignore the fact that virtually anyone else can
gain access to their messages by entering the appropriate code. Hence this is
a wonderful system to gather information from anyone without their knowledge,
especially if they are technologically illiterate.

For the most part, there are two main types of "electronic password"
used by these systems. They are amazingly simple to crack, as they are
typically only 2-digit or even 1-digit numbers!!!!!! On some machines, the
code must be entered before the outgoing message is over, on others, it must
be entered after the outgoing message, and on more sophisticated models, it
can be entered at any time.

MODERN 2-DIGIT PASSCODE SYSTEMS:

These are the most common systems in use today, typically made by
Panasonic, AT&T, etc. In these systems, the code can be entered before during
or after
the beep tone. For security reasons, we recommend BEFORE the beep tone, so
your intrusions are unnoticed... We will begin by discussing how to identify
the passcode.

Now, the question of how to hack their code. Well, this is so simple,
you don't even need a computer to do it. You can just enter all 2-digit
combinations until you get the right one (usually signalled by a series of
beeps on the other end). A relatively crude way was to enter each number in
sequence 01, 02, 03, 04,...,99. This works, but may take too long to enter
all numbers within the 20-30 second window we typically have before the beep
(The best time to play arounnd, as any tones entered after the beep will be
recorded on his incoming messages tape, and could let him know something is
up...). It is also important to stop as soon as you hit the right number, as
the additional entered numbers may be interpreted by the answering machine as
codes, and cause you to delete all their messages, or record a new greeting,
etc. That is really asking for trouble, and may cause them to try and change
their password (though it's usually only possible to choose from a range of
three consecutive numbers anyway...). Still, you need to be careful not to
let them catch on, eh?

A more sophisticated and fast way to do this is to take advantage of the
fact that such machines typically do not read two numbers at a time, and
discard them, but just look for the correct sequence, reading one at a time.
In other words, you can enter all 100 possible codes with roughly 1/2 the
number of keystrokes. Just enter as follows:

0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9,etc.

By reading in one phase we get:

0 0,1 0,2 0,3 0,4 0,5 0,6 0,7 0,8 0,9 1,1 2,1 3,1 4,1 5,1 6,1 7,1 8,1 9,etc.

In the other phase we get:

0 1,0 2,0 3,0 4,0 5,0 6,0 7,0 8,0 9,1 1,2 1,3 1,4 1,5 1,6 1,7 1,8 1,etc.

So by proceeding as follows we enter the following matrix sequentially,
encompassing all possible 2 digit numbers:

0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9
1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9
2 2 3 2 4 2 5 2 6 2 7 2 8 2 9
3 3 4 3 5 3 6 3 7 3 8 3 9
4 4 5 4 6 4 7 4 8 4 9
5 5 6 5 7 5 8 5 9
6 6 7 6 8 6 9
7 7 8 7 9
8 8 9
9 0

The last zero is important, as it completes the cycle, and allows for the code
9 0, which is the only one not as yet allowed for. I must emphasize the
importance of quitting as soon as you get the correct code, and also do not
keep going after the beep, if you are on a modern 2-digit access code system.
This way, you can record the passcode for your future reference, and prevent
detection.

Now, we shall get on to the question of how to use their system, once
you've broken in. In general, it is recommended to obtain a copy of the
owners' manual for various machines, but I have summarized some of the basics
below.

PANASONIC

Here are the codes for a Panasonic Easa-phone KX-T1450. The KX-T2420 is
identical without Room Monitor function In this case, strange things happen
when you enter 5:

1 = Back Space (Rewind the OGM tape)
2 = Skip Forward (Fast forward the OGM tape)
3 = Reset (Go back to the beginning of the OGM tape. MAY CAUSE ERASURE!!!)
4 = Memory Playback (Listen to new messages)
5 = Room Monitor (!!!! Listen to what is going on in the room NOW !!!!)
(This is only available on some models... But, try it...)
7 = OGM-REC (Record a new greeting!!!)
9 = OGM-STOP (Stop recording the new greeting)
* = OGM Skip (Don't Listen to the OGM)
0 = Turn off the machine !!!!!

To set to the answer mode remotely,
1. Dial the phone number
2. Wait 15 rings and hang up

To turn off the unit remotely (!!),
1. Dial the phone number
2. Push the code number, wait for the beep, enter 0, and hang up. Panasonic answering machino respond to the user with a series of
codes which I will now outline. If you hear something different, you may not
be on a Panasonic system.

1 long beep : This is the "beep" after which people can leave their messages.

Also, this is sounded when the correct passcode is entered from

a remote telephone. (Same sound- Hint for software developpers)
It sounds when the tape has fully rewound, and after each

message is played back in entirety.
3 short bps : This sounds after the last message has been played back.

2 short bps : (10 seconds later) You are then being recorded - marker message

6 short bps : End of the incoming message tpe

6 short bps : (Quickly) Tape Broken (either incoming or outgoing)

Also, after entering the correct code, and after the one long beep, you will
hear n additional short beeps, where n is the number of new messages since the
last time the messages were retrieved. Remember, you can listen to earlier
ones on the same tape, by additionally backspacing from the first new message.

Anyway, that is a basic summary of the Panasonic answering machine system for
this machine. Many machines unfortunately do not have the Room monitor
function, so you can not see if you left your TV on, or anything like that...
Also, not all systems are identical, but on Panasonic machines, the numbers 1-
4 are the same, so this is the most important thing for you to remember
anyway...


AT&T

On AT&T machines, like the Answering System 1304, the passcode is again a 2-
digit number enterable before, during, or after the beep. Follow the same
guidelines as above.

After you enter the correct code on these machines, the system will
automatically begin to play back new messages. This is one key way to
distinguish these machines from the Panasonic ones discussed above.

To summarize the key functions for the AT&T system, look below:

2 Rewind tape (tape rewinds for as long as this key is depressed)
3 3 Clear messages (reset the tape to the beginning.)
5 Fast Forward (tape ffwds for as long as this key is depressed)
7 Replay messages from the beginning
8 8 Turn off the answering machine
* Record a memo (After listening to messages) OR
Skip the greeting (w/o entering code)
0 Turn on the machine (after hearing two beeps)
# Pause (for 5-7 seconds)

Basically this system is less sophisticated than the Panasonic. You cannot
change the OGM remotely (Damn!). As seen above, the codes are also quite
different, but fortunately they are easily distinguished by how they answer
after the security code is entered. The AT&T plays the messages, while the
Panasonic just beeps to tell you how many new messages are waiting. Here
also, the rewind and fast forward functions operate for the length of time you
depress the 2 and 5 keys respectively. On the Panasonic, they reewind or fast
forward for 15 seconds. Also, this system has a pause feature. By entering
the # sign, you can pause for a few seconds while listening to a message. One
extra safety (from your perspective...) feature is that on this system you
cannot erase messages until they have all played back, so you have less risk
of fucking up someone's system if it is an AT&T. You cannot change his
greeting, and it is difficult to accidentally erase his messages. If you wish
to do so, however, you must hit the 3 key twice after listening to the
messages in their entirety. To record a memo (why would you want to do
this???), you can press the * key after you hear 5 beeps (after listening to
the messages). Then begin to record. Also, the * key can be used before the
message is finished to skip listening to the OGM (useful for long distance
callers who are actually paying for the calls...) without the need for
entering a security code. To turn on the system from remote points, you need
to let it ring ten times, and after it answers with 2 "beeps", hit the 0 key.
It will subsequently be on. Similarly to turn it off, just enter 88. If the
machine answers the phone with no greeting, and just 2 beeps, it means the
tape is full. You can now enter the security code (without risk of them
recording the BEEPS!!!) and listen away for a long time!!! Basically, this
sums up the properties of the two most common systems I've encountered of the
2-digit passcode variety. SINGLE DIGIT PASSCODE MACHINES:

On some old model Panasonic and Phone Mate systems, the secret entry
passcode is only a one digit number(!!!). On these primitive systems, one
merely enters the correct number, during the message, and playback begins.
The other codes are simple to derive, and just for the sake of making this
hobby a sport, I will not give details for these systems. It is easy enough
to figure them out, and on these systems, it is hard to screw things up, as
there is little you can do anyway.

APPLICATIONS:

This can be a rewarding adventure if you decide to follow those
instructions (though far be it from me to suggest you to do this...). I will
point out some of the potentially entertaining, useful, and/or informative
applications of this technology.

As the true weirdos that we are, we shall begin with what we consider
the truly entertaining applications... If you have ever read the Village
Voice, Screw or other such newspaper, you will notice a large number of
advertisements for "unlicensed massage parlors", "Oriental relaxation spas",
"Escort services", etc. Call some of those numbers, preferrably at off-duty
hours (6-9 AM??) and try to hack their answering machine codes, listen to
their messages, and let the fun begin. You can hear lots of perverts, and
lowlifes making appointments for "services" about which they are sometimes
graphic. Also, they often leave telephone and credit card numbers (What
fun!!!). In case they are married, think of the blackmail potential...

Further, these "adult entertainment companies" also often run help
wanted ads in the Village Voice, and other such publications. Call these, and
you will get a plethora of phone numbers for nubile young women who might
believe you are the proprietor of the establishment in question. You might be
able to con some "free samples" as a sort of "job interview"... (hehehe)
Especially given the illegal activity they desire to become involved in, they
will be in no position to complain when they find out you are not for real...
Also, this way, the girls are often not so jaded as the old pros... They will
be trying to impress you if you get my drift, so you'll "hire" them.

Other similar companies can be hacked to get similar entertaining and
enjoyable results. In many cases, the outcomes can be QUITE LUCRATIVE in one
way or another... I do not advocate that you do these things, but I just want
to point out what COULD be done...

Let us move on to the informative espionnage type of application of this
technology. One could very easily use this technology to listen to the
messages of friends, and see what they are up to. If you are trying to call
your buddy Evan, and he isn't home, perhaps you can find out where he is by
going through some of his old answering messages. Say, Eric called him a
couple of hours ago and suggested that Evan come over to his place for some
beers. Well, you could then call Eric and voila, you may connect with Evan.

Now, let us assume you have a girlfriend, and you suspect she might be
cheating on you, yet you do not wish to confront her about it without any
evidence, or certainty of her cheating. Well, her new beau probably thinks
her answering machine is secure, and calls leaving messages about their
upcoming dates, or various discussions of their relationship. If you can hack
her machine {actually, you might even look at the bottom (where the passcode
is usually printed...) to save time and energy.} you will be afforded with a
plethora of potentially incriminating evidence. Hehehe.

A similar application can be when you have a new love interest. Suppose
there is some woman you are interested in, but you aren't sure if she is
available. A little phone answering machine surveillance can provide all of
the answers, and then some... In case she asks her friends about you, you'll
know everything she does. Also, you will learn details about her life, and
schedule, the better to run into her "accidentally", or strike up a
conversation about "common" interests...

Now, if you know someone in the same profession, say musicians, and you
call his answering machine, and hear someone offering him a gig. You could
call that person back, and accept the gig in your name, saying the originally
called musician was unavailable, but suggested that you call. Then be sure to
erase the original message on your buddy's machine. He'll never be the wiser,
and you'll get more work. Though he may wonder why he isn't getting much work
anymore...

Millions of applications exist, and if you have any additional
suggestions, please leave them with us. We can be reached on several BBS'es,
in 212, 718, and 914 area codes. Thanks. Also, if you have information on
other answering machine systems, please pass it along...

Again, in closing, we reiterate that the authors take no responsibility
for the misuse of this information. The ideas for applications were presented
for informational and entertainment purposes only, and we do not encourage you
to try any of the above suggestions. Remember, listening to the pass-code
protected messages of others constitutes an invasion of privacy, and may be in
violation of state and federal laws.

******************************************************************************

ANOTHER FINE PIZZ-SPERM T-FILE...

Please upload this file to other fine BBS'es, and give credit to the original
authors, Doctor Pizz and Cybersperm, of the TUBA crew.

******************************************************************************

***************************************************************
* *
* Another Fine File From the libraries of the TUBA crew. *
* *
***************************************************************

____ _______ *
/ \ ___ ___ ____ ___ ___ / / ___ ___
/ // // / / // / /______/ / / /
/ // // / / //-< / / / /
/_____//__//__ / /__// / / / /__ /__

-N-

CCCC Y Y BBB EEEE RRR SSSS PPP EEEE RRR M M
C Y Y B B E R R S P P E R R MM MM
C Y BBB EEE RRR SSSS PPP EEE RRR M M M
C Y B B E R R S P E R R M M M
CCCC Y BBB EEEE R R SSSS P EEEE R R M M M


 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS