=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- \\ \ __________ \\ \ _________ //// \ \\ \ ||| \ .------. //// ___ | \\ \ ||| ___ \ // ____ \ \\\\ /\\\\/ \\ \ ||| |\\\ \ <--> // /```\`--' \\\\ \ \\ \ ||| | \\\ | <--> || | ``` \\\\ \ __ \\ _\ ||| | ||| | <--> || `._____ \\\\ \ ////\ ////\ ||| | ||| | <--> || ___ \ ___ \\\\ | ||| |:|| | ||| | ||| | <--> || /``\\ \ //// \/_// / ||| |:|| |\||| | ||| | <--> || | || | \\\\ / \\\ \// / ||| |/// / \\ \___/ / \\\\______/ \\\____/\\ |||_______/ \\_______/ =-=-=-=- =-=-=- \\ =-=-=-=-= ``````` \\ \ \\_/ ` -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= y0 all n stuph, I see there's some movement towards getting internet access, and that's good, once you get hooked to it, it's all go n stuph ;) I see some people are having a fight, two groups, one that's retired and doesn't actually do much and have very few members, and the other that are against it with evertyhing within them, and have this fantasy in their heads that the other group is the HUGE group with lots of members, and that this BiG group actually do evil things all the time, or something like that.....they are making up all sorts of things about how they are cracking down on this group and have actually got one of the members leeching stuff out to them, argh, this is making me tired, isn't that the sort of things you were supposed to stop at an age of 10? I am amazed over the lack of security on the unix setups some of the inter- net providers have...I'm thinking of going to hack them all ;) I need a neat account where I can compile and run nuke.c and flash.c on ;) Whatever, I'll get pHaze to spend his time on cracking it, he likes that kind of thing, having a lot more experience in C than I do, and hopefully these bastards are not running SCO unix, I hate shadowed passwords, I love encrypted passwords ;) These internet providers have nice 64k internet hookups, so it would be nice to set up an FTP site for all us haqrs ;) Getting a legal internet account are worth it aswell, it's really good, I pay for my access, because I see it's really not that expensive for what you can get out of it. Hmmm, trading pirated software are illegal and are regarded as a civil crime as of yet, or maybe criminal, but the police never goes out to bust people for that, that's the job of the Business Software Alliance, who only got one good case in their book, and that's one where they beat a major corporation. They go for large companies that pirate the software within the company etc. The man with his warez-filled computer in the house are not regarded as such a threat, if he was forced to he would rather have NO warez than to actually pay for it, and the BSA can't leech much money out of him by winning a court case. So warez trading are safe as of yet, it's so safe that I personally don't regard it as 'underground', those of you so called 'underground scene' that's only into warez should go find something usefull to do. The underground's so dead because the larger part of it are just a bunch of warez pups or at the most they are games crackers....games cracking are so legal that even the university database at stellenbosch keep cracks it ;) Good cracking are where you can crack you novell network link layers into letting you be able to steal the bypassing packets from other computers etc. Er...well, that's actually called hacking (bah) Argh I don't know. What I'll really do in a later issue of SuD is edit the alt.2600 FAQ to fit the South African stuff. And maybe I'll put together a UGSA faq or something, with all those questions you always ask over and over again. IMPORTANT: If you bluebox, make sure the quality of the sound you send through are OK, and not distant, holding the phone to a desktop speaker n stuph will NOT work, to test your sound quality...if you are on a fully electronic exchange just set your blue[beep/dial] to DTMF and try phoning at about 35ms, if it wont work, you should know your sound quality sux. Your speaker should be small, like a PC internal speaker will work, and you have to hold directly over the phone's microphone. It's a bit strange when people, come and ask me 'how to do it' when they send the tones down so poorly, bah, if you really want to, connect your soundcard directly to the phoneline via a 100k resistor, that usually works, and you can put a 1:1 resistor on if you are afraid something might happen to you eleet soundcard, like Telkom playing 'fry the guy' or the lighting play 'snap'n'zap', or whatever. Hmmm, I did a bit of research, and will be working on cellular phreaking soon, GSM are phreakable, but I'll have to get a good ROM reader aswell before I'll do my research (and buy a fuxn cellular phone aswell) Anyone want to sponsor me with a 14.4k modem? or maybe a 386-sx motherboard? or maybe a 80meg IDE hard drive? That's the things I really need to put my internet link up so it will work at a more reasonable speed, and I want to run Unix on my system aswell. So those things are needed ;) those of you with the eleet 486's and SVGA's and huge hard drives... please pity me ;) have things like fun #####@###@##@#@@#@@@#@@@@#@@@@@#@@@@#@@@#@@#@##@###@####@#####@####@###@##@#@ ----/---/--/-//-///-////-/////-////-///-//-/--/---/----/-----/----/---/--/-/ ---/---/--/-//-///-////-/////-////-///-//-/--/---/----/-----/----/---/--/-/- ---`---'--'-''-'''-''''-'''''-''''-'''-''-'--`---'----`-----'----`---'--`-' We all those nice little green phones, they are so cool, they take all those eleet kards, and yes, you can fool the....but er....not with the microwave oven. I did some research and came upon this text.... I read part of it before....it took me a hell of a time to find it again Extraxtion from file-----------mewha II ) The cards from ODS, Giesecke & Devrient, ORGA Karten systeme, ============================================================= Uniqua, Gemplus, Schlumberger and Oldenbourg Kartensysteme: =========================================================== II-1) Introduction: ------------ These cards are in fact 128 bit memory in NMOS technology, and the map of these cards are the following: 64 bit EPROM written protected (manufaturer area). 40 bit EEPROM (5x8 bits). 24 bits set to "1". II-2) Pinout: -------- ISO 7816-2 -------------+------------- | 1 | 5 | Pinout: | | | ------- +-------\ | /-------+ | 2 +----+ + 6 | 1 : Vcc = 5V 5 : Gnd | | | | 2 : Reset 6 : n.c. +--------| |--------+ 3 : Clock 7 : I/O | 3 | | 7 | 4 : n.c. 8 : n.c. | +----+----+ | +-------/ | \-------+ n.c. : not connected | 4 | 8 | | | | -------------+------------- II-3) Main features: --------------- - ISO 7816- 1/2 compatible. - use a single 5V power supply. - low power consuption. - NMOS technology. II-4) Time Diagrams: ---------------- Reset: ------ The address counter is reset to 0 when the clock line CLK is raised while the control line R is high. Note that the address counter can not be reset when it is in the range 0 to 7. __________________ _____| |_____________________________________________ Reset : : : _____ : _____ _____ _____ _____ _____:_______| |____:_| |_____| |_____| |_____| |_ Clk : : : : : : : : : : : _____:_______:__________:_:_____:_____:_____:_____:_____:_____:_____:_ _____:___n___|_____0____:_|_____1_____|_____2_____|_____3_____|___4_:_ (Addrss) : : : : : : _____: :_______:___________:___________:___________:_ _____XXXXXXXXXXXXXXXXXXXX_______|___________|___________|___________|_ Data Bit n Bit 0 Bit 1 Bit2 Bit3 The address counter is incremented by 1 with each rising edge of the clock signal Clk, for as long as the control line R remains low. The data held in each addressed bit is output to I/O contact each time Clk falls. It is not impossible to decrement the address counter, therefore to address an earlier bit, the address counter must be reset then incremented to require value. Write: ------ All unwritten or erased bits in the address 64-104 may be unwritten to. When a memory cell is unwritten to, it is set to 0. The addressed cell is unwritten to by the following sequence. 1- R is raised while Clk is low, to disable address counter increment for one clock pulse. 2- Clk is then raised for a minimum of 10ms to write to the address bit. When to write operation ends, and Clk falls, the address counter is unlocked, and the content of the written cell, which is now 0, is output to I/O contact if the operation is correct. The next Clk pulse will increment the address by one, then the write sequence can be repeated to write the next bit. _____ _____ _____________| |______________________________| |_______________ Reset : : ___ : _____ ___ : _____ ____| |____:__________| |_________| |_____:__________| |____ Clk : : : : : : : : : ____:________:__________:_____:_________:___:_____:__________:_____:_____ n | n+1 | n+2 | : n+3 | : (Address) ----'--------:----------'-----:---------'---:-----:----------'-----:----- : : : : : : : _________ _: : : ____________: ___: : : _________XXX_XXXXXXXXXXXXXXXXXXX____________ XX___XXXXXXXXXXXXXXXXXXXXXXX I/O n n+1 : : n+1 n+2 : : : : : : write write WriteCarry: ----------- A counter is erased by performing the WRITECARRY sequence on the stage of the next highest weighing to that to be erased. The writecarry sequence is as follows: 1 - Set the address counter to an unwritten bit in the next highest counter stage to that to be erased. 2 - Increment is disabled on the following rising edge of R where Clk remains low. 3 - Clk is then raised for a minimum of 10ms, while R is low, to write to the next address bit. 4 - R is the raised again while Clk remains low to disable increment a second time. 5 - Clk is the raised for a minimum of 1ms, while R is low, to write to the addressed bit a second time, erasing the counter level immediately below that the addressed bit. _____ _____ ______| |____________________| |_________________________________ Rst : : : _______ : _______ ___ ______:___________| |______:_____________| |______| |______ Clk : : : : : : : : : : : : : : : : <------------------------- address n ------------------------>:<--- n+1 ------ : : : : : : : : : : : : : : ______: : :______: : :__________: _____ ______XXXXXXXXXXXXXXXXXXXXX______XXXXXXXXXXXXXXXXXXXXXXX__________XX_____ I/O : : n : : n n+1 : : : : Write Erase II-5) Memory Map: ------------- Bytes Bits Binary Hexa +-----------+-----+ 1 1 --> 8 | | | +-----------+-----+ 2 9 --> 16 | 0010 1111 | $2F | ---> Germany | 0011 0111 | $37 | ---> Netherland | 0011 1011 | $3B | ---> Greece +-----------+-----+ 3 17 --> 24 | | | 4 25 --> 32 | | | ---> Issuer area (written protected) 5 33 --> 40 | | | 6 41 --> 48 | | | 7 49 --> 56 | | | 8 57 --> 64 | | | +-----------+-----+ 9 65 --> 72 | | | ---> c4096 ) 10 73 --> 80 | | | ---> c512 ) 11 81 --> 88 | | | ---> c64 ) 5 stage octal counter 12 89 --> 96 | | | ---> c8 ) 13 97 --> 104 | | | ---> c0 ) +-----------+-----+ 14 105 --> 112 | 1111 1111 | $FF | 15 113 --> 120 | 1111 1111 | $FF | ---> area of bits set to "1" 16 120 --> 128 | 1111 1111 | $FF | +-----------+-----+ The Issuer area: ---------------- This issuer consists of 40 bits. The contents of the issuer area are specified by the card issuer, and are fixed during the manufacturing proces. The contents of the issuer area will include data such as serial numbers, dates, and distribution centers. This area may only be read. The Counter area: ----------------- The counter area stores the card's units. Its initial value is specified by the card issuer and set during manufacturing. The counter area is divided into a 5 stage abacus. Note that you can only decrease the counter and it is not authorised to write in the counter a value greater than the old value. I-6) Electrical features: -------------------- Maximum ratings: ---------------- +--------+------+------+------+ | Symbol | Min | Max | Unit | +----------------------+--------+------+------+------+ | Supply voltage | Vcc | -0.3 | 6 | V | +----------------------+--------+------+------+------+ | Input voltage | Vss | -0.3 | 6 | V | +----------------------+--------+------+------+------+ | Storage temperature | Tstg | -20 | +55 | °C | +----------------------+--------+------+------+------+ | Power dissipassion | Pd | - | 50 | mW | +----------------------+--------+------+------+------+ DC caracteristics: ------------------ +--------+-----+-----+-----+------+ | Symbol | Min.| Typ.| Max.| Unit | +---------------------------+--------+-----+-----+-----+------+ | Suplly current | Icc | - | - | 5 | mA | +---------------------------+--------+-----+-----+-----+------+ | Input Voltage (low) | Vl | 0 | - | 0.8 | V | +---------------------------+--------+-----+-----+-----+------+ | Input voltage (high) | Vh | 3.5 | - | Vcc | V | +---------------------------+--------+-----+-----+-----+------+ | Input current R | Ih | - | - | 100 | uA | +---------------------------+--------+-----+-----+-----+------+ | Input current Clk | Il | - | - | 100 | uA | +---------------------------+--------+-----+-----+-----+------+ | Output current (Vol=0.5V) | Iol | - | - | 10 | uA | +---------------------------+--------+-----+-----+-----+------+ | Output current (Voh=5V) | Ioh | - | - | 0.5 | mA | +---------------------------+--------+-----+-----+-----+------+ AC caracteristics: ------------------ +--------+------+------+------+ | Symbol | Min. | Max. | Unit | +----------------------+--------+------+------+------+ | Pulse duration | tr | 50 | - | us | | R address reset | | | | | +----------------------+--------+------+------+------+ | Pulse duration | ts | 10 | - | us | | R write | | | | | +----------------------+--------+------+------+------+ | High level Clk | th | 8 | - | us | +----------------------+--------+------+------+------+ | Low level Clk | tl | 12 | - | us | +----------------------+--------+------+------+------+ | Write window | Twrite | 10 | - | ms | +----------------------+--------+------+------+------+ | Erase window | Terase | 10 | - | ms | +----------------------+--------+------+------+------+ | | tv1 | 5 | - | us | +----------------------+--------+------+------+------+ | | tv2 | 3.5 | - | us | +----------------------+--------+------+------+------+ | | tv3 | 3.5 | - | us | +----------------------+--------+------+------+------+ | | tv4 | 3.5 | - | us | +----------------------+--------+------+------+------+ | | tv5 | 3.5 | - | us | +----------------------+--------+------+------+------+ | | tv6 | 5 | - | us | +----------------------+--------+------+------+------+ | | tv7 | 5 | - | us | +----------------------+--------+------+------+------+ | | tv8 | 10 | - | us | +----------------------+--------+------+------+------+ !@#!@#!@#!@#!@#!@# Hmmm, you want to 'copy' these cards? Well, to read them....1st of all...here's a circuit of the reader There's many usefull ways of using this device.....like reading all those filled up cards....cellular sim cards, etc. etc. and store them to disk for later eleet use. !@#!@#!@#!@@#$@#$@ IC card reader ~~~~~~~~~~~~~~ External 5V (Optional) 5V o------, | / T2 PNP d13 r7 10 0V o--, | / BC 177 |\ | _____ | | ,-------o/ o--*------. E C .--| >+-[_____]--------, __+__ | | | \ / |/ | | \\\\\ | __|__ Batery | \ / | | - 22.5V | --------- | ....... | | | _____ | _____ | : | __+__ +--[_____]--*--[_____]--, | D2 : | \\\\\ r6 150k r5 15k | | 4 o-------|---------------------------*------------------|-------------, | : | | r3 220k / C | | Ack : | | _____ |/ T1 - NPN | | 10 o------|--------. '--[_____]-*---| BC107 | | : | | _____ | |\ | | : ,-, ,-, +--[_____]-' \ E | | : | |r2 | |r1 | r4 390k | | | : | |220 | |22k __+__ __+__ | | : |_| |_| \\\\\ \\\\\ | | : | |\ | | | | : *--| >+--|----------------*----------------------------------|--* : | |/ | | ,-----|-----------------------------, | | : | d1 | | | ,----------,----------, | | | : | | | *---|--* Fuse | Reset *--|---' | | : | | | | |----------|----------| | | D0 : | | | ,-|---|--* I/O | Clk *--|---, | | 2 o-------|--------|----------' | | |----------|----------| | | | : | | | '---|--* Vpp | R/W *--|---|----' | Busy : | | | |----------|----------| | | 11 o------|--------|--------------' ,---|--* Gnd | 5V * | | | : | | | '----------'-------|--' | | D1 : | | __+__ Chip connector | | | 3 o-------|--------|--------, \\\\\ | | | : | | '------------------------------|------' | Str : | |\ | | | | 1 o-------*--| >+--*----*----*----*----*-------------------' | : d2|/ | |d3 |d4 |d5 |d6 |d7 | : -+- -+- -+- -+- -+- | : /_\ /_\ /_\ /_\ /_\ | D3 : | | | | | |\ | d8 | 5 o----------------*----|----|----|----|---| >+-------*-------------------' : | | | | |/ | | : | | | | | D4 : | | | | |\ | d9 | 6 o---------------------*----|----|----|---| >+-------* : | | | |/ | | : | | | | D5 : | | | |\ | d10 | 7 o--------------------------*----|----|---| >+-------* : | | |/ | | : | | | D6 : | | |\ | d11 | 8 o-------------------------------*----|---| >+-------* : | |/ | | : | | D7 : | |\ | d12 | 9 o------------------------------------*---| >+-------' : |/ | : : 25 o------. : | .......: | d1 to d13: 1N4148 __+__ \\\\\ Okay, one you got this....you need something to read the reader with.... here's a nice little program for the PC to do it with: Remember....I do not take credit for the program, if there's any errors...fix it, I'm not a pascal wizz or something. --------------- cut here (begin) {*****************************************************************************} { T E L E C A R D . PAS } {*****************************************************************************} { This program enable you to dumb the memory of electronics phonecards } { from all over the world, so that you will be able to see which country } { the card is from how many units are left and so on .... } {*****************************************************************************} { } { Written by Stephane BAUSSON (1993) } { } { Email: sbausson@ensem.u-nancy.fr } { } { Snail Mail Address: 4, Rue de Grand } { F-88630 CHERMISEY } { France } { } {*****************************************************************************} {* Thanks to: Tomi Engdahl (Tomi.Engdahl@hut.fi) *} {*****************************************************************************} USES crt,dos; CONST port_address=$378; { lpr1 chosen } TYPE string8=string[8]; string2=string[2]; VAR reg : registers; i,j : integer; Data : array[1..32] of byte; car : char; byte_number : integer; displaying : char; {-----------------------------------------------------------------------------} PROCEDURE Send(b:byte); BEGIN port[port_address]:=b; END; {-----------------------------------------------------------------------------} FUNCTION Get:byte; BEGIN get:=port[port_address+1]; END; {-----------------------------------------------------------------------------} { FUNCTION dec2hexa_one(decimal_value):hexa_character_representation; } { } { - convert a 4 bit long decimal number to hexadecimal. } {-----------------------------------------------------------------------------} FUNCTION dec2hexa_one(value:byte):char; BEGIN case value of 0..9 : dec2hexa_one:=chr(value+$30); 10..15 : dec2hexa_one:=chr(value+$37); END; END; {-----------------------------------------------------------------------------} { FUNCTION d2h(decimal_byte):string2; } { } { - convert a decimal byte to its hexadecimal representation. } {-----------------------------------------------------------------------------} FUNCTION d2h(value:byte):string2; VAR msbb,lsbb:byte; BEGIN msbb:=0; if ( value >= $80 ) then BEGIN msbb:=msbb+8; value:=value-$80; END; if ( value >= $40 ) then BEGIN msbb:=msbb+4; value:=value-$40; END; if ( value >= $20 ) then BEGIN msbb:=msbb+2; value:=value-$20; END; if ( value >= $10 ) then BEGIN msbb:=msbb+1; value:=value-$10; END; lsbb:=0; if ( value >= $08 ) then BEGIN lsbb:=lsbb+8; value:=value-$08; END; if ( value >= $04 ) then BEGIN lsbb:=lsbb+4; value:=value-$04; END; if ( value >= $02 ) then BEGIN lsbb:=lsbb+2; value:=value-$02; END; if ( value >= $01 ) then BEGIN lsbb:=lsbb+1; value:=value-$01; END; d2h := dec2hexa_one(msbb) + dec2hexa_one(lsbb); END; {-----------------------------------------------------------------------------} Function Binary( b : byte):string8; var weigth : byte; s : string8; BEGIN weigth:=$80; s:=''; while (weigth > 0) do BEGIN if ((b and weigth) = weigth) then s:=s+'1' else s:=s+'0'; weigth:=weigth div $02; END; Binary:=s; END; {-----------------------------------------------------------------------------} FUNCTION Units:byte; VAR u, i : integer; s : string8; BEGIN u:=0; i:=13; while (Data[i] = $FF) do BEGIN u:=u+8; i:=i+1; END; s:=Binary(Data[i]); while(s[1]='1') do BEGIN inc(u); s:=copy(s,2,length(s)); END; units:=u; END; {-----------------------------------------------------------------------------} function Units_2:LongInt; BEGIN Units_2:=4096*Data[9]+512*Data[10]+64*Data[11]+8*Data[12]+Data[13]; END; {-----------------------------------------------------------------------------} PROCEDURE Card_Type; BEGIN case Data[2] of $03: BEGIN write('Telecard - France - '); case Data[12] of $13: write('120 Units - ',units-130,' Units left'); $06: write('50 Units - ',units-60,' Units left'); $15: write('40 Units - ',units-40,' Units left'); END; END; $2F:BEGIN write('Telecard - Germany - ', Units_2, ' Units left'); END; $3B:BEGIN write('Telecard - Greece - ', Units_2, ' Units left'); END; $83:BEGIN write('Telecard'); case Data[12] of $1E: write(' - Sweden'); $30: write(' - Norway'); $33: write(' - Andorra'); $3C: write(' - Ireland'); $47: write(' - Portugal'); $55: write(' - Czech Republic'); $5F: write(' - Gabon'); $65: write(' - Finland'); END; if (Data[12] in [$30,$33,$3C,$47,$55,$65]) then BEGIN case ((Data[3] and $0F)*$100+Data[4]) of $012: write (' - 10 Units - ',units-12,' Units left') $024: write (' - 22 Units - ',units-24,' Units left'); $027: write (' - 25 Units - ',units-27,' Units left'); $032: write (' - 30 Units - ',units-32,' Units left'); $052: write (' - 50 Units - ',units-52,' Units left'); $067: write (' - 65 Units - ',units-62,' Units left'); $070: write (' - 70 Units - ',units-70,' Units left'); $102: write (' - 100 Units - ',units-102,' Units left'); $152: write (' - 150 Units - ',units-152,' Units left'); END; END; { write(' - N° ',Data[5]*$100+Data[6]);} END; END; END; {-----------------------------------------------------------------------------} PROCEDURE waiting; BEGIN send($00); write('Enter a card in the reader and press a key ...'); repeat until keypressed; gotoxy(1, wherey); clreol; END; {-----------------------------------------------------------------------------} PROCEDURE Full_Displaying; BEGIN writeln('Memory dump:'); for i:=1 to 80 do write('-'); for i:=1 to (byte_number div 6 + 1) do BEGIN for j:=1 to 6 do BEGIN if j+6*(i-1) <= byte_number then write(binary(Data[j+6*(i-1)]):); END; gotoxy(60,wherey); for j:=1 to 6 do if j+6*(i-1) <= byte_number then write(d2h(Data[j+6*(i-1)]),' '); writeln; END; for i:=1 to 80 do write('-'); Card_Type; writeln; END; {-----------------------------------------------------------------------------} PROCEDURE Short_Displaying; VAR j : integer; BEGIN for j:=1 to byte_number do BEGIN write(d2h(Data[j]),' '); END; writeln; END; {-----------------------------------------------------------------------------} PROCEDURE Reading; VAR i, j : integer; Value : byte; BEGIN send($FE); send($F8); for i:=1 to 32 do BEGIN Value:=0; for j:=1 to 8 do BEGIN Value:=Value*$02 + ((get and $08) div $08); send($FB); delay(1); send($F8); END; Data[i]:=Value; END; case displaying of 'F':full_displaying; 'S':short_displaying; END; END; {-----------------------------------------------------------------------------} PROCEDURE writting; VAR i,n:integer; car:char; BEGIN write('Which bit do you want to set to "1" : '); readln(n); waiting; car:=readkey; send($FA); send($F8); for i:=1 to n do BEGIN send($F9); if i=n then BEGIN send($FD); delay(20); send($FF); delay(20); END; send($FB); END; reading; END; {-----------------------------------------------------------------------------} PROCEDURE Saving; VAR filename : string; f : text; i : word; BEGIN write('Enter the filename: '); readln(filename); assign(f, filename); rewrite(f); for i:=1 to byte_number do write(f,d2h(Data[i]),' '); close(f); END; {-----------------------------------------------------------------------------} PROCEDURE initialize; VAR i : integer; BEGIN byte_number:=32; displaying:='F'; clrscr; writeln(' 1 - to dump a 256 bits card'); writeln(' 2 - to dump a 128 bits card'); writeln(' F - to display in full format'); window(41,1,80,25); writeln(' S - to display in short format'); writeln(' F2 - to save in a file'); writeln(' Q - to exit the program'); window(1,4,80,25); for i:=1 to 80 do write('='); window(1,5,80,25); END; {=============================================================================} BEGIN initialize; repeat waiting; car:=upcase(readkey); case car of 'W':writting; 'Q':; '1':byte_number:=32; '2':byte_number:=16; 'F','S':displaying:=car; #00: BEGIN car:=readkey; if car=#60 then saving; END; else reading; END; until car='Q'; END. --------------- cut here (end) =-=-=-=-=-=-=-=-=-=-=-=- okay....next month I'll ad in a circuit and diagram for a cloned card using a microcontroller, for all you digital electronics experts. =-=-=-=-=-=-=-=-=-=-=-=- Hey, people told me "I got no soundcard" so they can't make ccitt5 tones, or "I got no soundcard" so they can't play at least MOD files properly. This is the R5,00 DAC I'm currently using... Hmmm, I did some editing to the circuit myself..but this is the origional If the thing sounds noisy...a bit...then you can put a little cap in parralel to the output (excuse the 8-bit ascii, but all of you can support it so I didn't bother to change it) REMEMBER!@#!@# ALL THE RESISTORS SHOULD BE OF A 1% TOLERANCE!@#$% your electronics buddy with a shack full of parts usually keep the 5% ones (yello/brown)...this ones are blue most of the time...you actually have to go out and BUY it....well, if you pay more than 20c for each it's a rip-off ;) Printer Port: signal pin 20k 20k D0 2 >ÄÄÄ°°°ÄÂÄ°°°ÄÄ0v <---are connected to the 0v 20k ° 10k at the bottom down there. D1 3 >ÄÄÄ°°°Ä´ || 20k ° 10k \/ D2 4 >ÄÄÄ°°°Ä´ 20k ° 10k D3 5 >ÄÄÄ°°°Ä´ 20k ° 10k D4 6 >ÄÄÄ°°°Ä´ 20k ° 10k D5 7 >ÄÄÄ°°°Ä´ 20k ° 10k D6 8 >ÄÄÄ°°°Ä´ 20k ° 10k D7 9 >ÄÄÄ°°°Ä´ 20k ° 10k 100nF ÃÄÄÄÄÄÄ´ÛÄÄÄÄ> TO AMPLIFIER ° 10k GND 20 >ÄÄÄÄÄÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄ> 0v ^--are connected to the 0v up there .-^ If you have no clue what this is....go buy a soundblaster. \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\//////////////////////////////////// -------------- dEUS sPeeKinG -------------- brackets (I'm Z0rpHix)> Well, I'd been promising Z0rphix an article for his zine, but it's still in the "product testing" stage. Meanwhile for those of you that weren't there, DEFCON 94 in Las Vegas, prompted the biggest "legal" get together of hackers so phar, with conphrence programs saying : "If you see some shady MIB (Men in Black) Earphone pennyloafers sunglass-wearing Clint Eastwood to-live-and-die-in-LA type lurking about, point him out." Verified fed spotters get an "I spotted the Fed T-shirt", while the Fed gets an "I am the Fed" T-shirt. Four wogs from the super secret National Security Agency were spotted. For those of you who don't know who or what the N.S.A are, they are the Hi Tech version of the FBI. Responsible for all the electronic snooping that makes America what it is. Besides being noted for paying their registration fee with a queue from some bogus veterans' organisation, they also stood out for their fanatical support of the Clipper encryption chip and general lack of computer knowledge. Shortly after being identified, all the feds disappeared, failing even to claim their festive T-shirts. The NSA is also one of the worlds largest users of Next machines, using them RISC machines to crack each others mail encryption schemes. If ya don't know what the Clipper chip is, Remember the movie Sneakers ? Well, imagine the encryption/decryption version of that chip in EVERY new PC made in America, which would mean, secure communication of sensitive and financial data to be used and transmitted via the internet, etc., but with the NSA having such a big stake in the chip, all internet comms. would be secure, with nobody being able to decode it except the NSA. This is the worst development of it's kind for the hacker community, if it were to implemented on a world wide scale. A clipper chip in YOUR modem meaning every listening fed decoding your transmission in realtime. For them kids new to the internet : Internet security ain't all that secure. Anonymous E-mail isn't anonymous at all. So go forth and encrypt my children all over the internet. Here's a little gem I picked up this week.... Underground Virus Bulletin Boards Ian Douglas, one of South Africa's authorities on viruses, reflects on the local scene.... The underground bulletin scene is alive and well in South Africa. They even have their own "filezine" modelled on the popular RobList which lists most of the bulletin boards. A recent issue of the filezine, The Hacker BBS List of RSA, listed the following systems: Warlocks, Dwayne's World, Hai World HQ BBS, The Birds Nest, Rebel, Pandions, Toxic Shade II, Ace of Base, The Lair, Raids, and Polytechnics. [h0h0, Dwayne dude, better delete them Gifs] Several of these claim to be support sites for "H/P/A/C/A". That means they offer files and message about Hacking, Phreaking, Anarchy, Credit, and Viruses. Hacking (Cracking in reality) [Bah!!] is the breaking of software protection. Do not confuse this with the original hackers, who were more noble in their aims and techniques, [yeah, RIGHT] Phreaking is the art of using specialized circuitry to make phone calls at no cost. [I dig the specialized circuitry.... lemme see, I take dis wire & put it dere. now I take deze resistors & put dem in parallel with me receiver. I turn on de LED and.... Z0rphix...are you reading this????? HAHAHAHAHA ] Anarchy refers to How to Make Explosives, How to Make Knock Out Powder, How not to Pay Tax and other topics on the fringes of the law.[FRINGES ??? ] There are also files which will generate valid credit card numbers. There is an active trade in genuine credit card numbers, complete with names and expiry dates. These are used to order product by mail order. [ I guess that bitch would like some flowers again] Virus Polytechnics apparently has gates in several files and newsgroups from the underground in the USA and distributes them in South Africa. The existence of these boards has been reported to the police, [ W00P ] who have taken note and are busy with investigations. [ W0000000P ! ] [Possession of information is NOT illegal, but the use thereof in a criminal context may lead to prosecution. You may OWN a copy of CCNUM, but if ya use it yere on yere own ] There have been some cases of viruses being uploaded to popular conventional boards. These include a hacked version of the Nympho, Milan, Demon, two versions of trivial, and a virus created with the virus Creation Laboratory. They were quickly identified as most sysops scan new uploads before posting them. F-PROT Professional detects all these viruses. [Some extra marketing hype there, hmmmmm ?] Several virus attacks have been reported in the last two months. The more common follow: Cape Town: Many cases of what may be a new variant of Exebug, CoffeeShop, Stoned.A, Kaos4, B1, Bravo, a new variant of Honey, Exebug.Hooker, and jerusalem. Durban: Kaos4, Mummy 2 and Anticad. Johannesburg: ExebugF, Bouncing Ball, Exebug A, Maltese_Amoeba, and Matura. Police informed Gas Software has traced the telephone numbers of four underground bulletin boards which offer viruses. This information has been passed on to Major Phillip Venter [ A name is ALL dat needed to phone phreak the man to death at home...] of South African Police Services for investigation. [looked em up on beltel, eh? ] Easy Access to Virus Boards Jeremy Gumbley, F-PROT's distributor in Italy, also addressed the Virus Bulletin Conference. He Showed how easy it is to gain access to an underground virus bulletin board. [Imagine THAT ?!? ] In front of the audience, Jeremy called a virus BBS he had never visited before. He proved once and for all that virus BBSs do exist and at the same time showed their audience an example of their contests. The bottom line is that computers do not spread viruses, people do. Since there are no practical means to stop viruses being written, it is best to condemn the practice outright. [YEAH RIGHT] The dangers of viruses should be discussed at school's computer glasses, universities, colleges, offices, in every possible forum. Viruses are a hindrance to business and may cause great financial losses. Viruses and the Law Many are not aware of it, but the creation and distribution of viruses is not illegal in most countries of the world, including, South Africa. The legal structures have just not caught up with the development of the virus scourge. [Exactly, BUT, dey still go and report dem] Finland is examining proposals for the definition and punishment of virus creation and distribution. If written into law those transgression could be imprisoned for up to two years. Taken from the antidote : December 1994 The Anti-Virus Newsletter, Published by Gas Software, distributors of F-PROT professional anti-virus software. Hate mail may be addressed to : P.O. Box 142 Randburg, 2125 Phone sex line : 011 886-3757 Hate faxes : Personally I find it a lot of hype and publicity, to encourage the average dumb user to buy the new, better, and safe for fabrics F-PROT. We all knew, that at one stage of another, U/G BBS's would start to be exposed. Like all other things in this country, the "informed/advised few" in the government and or cooperates, software importers, etc. like to take an example from the states. But, in the states, H/P/A/V/C has been around for DECADES. Remember that infamous whistle that came with each box of cornflakes ? Which means that the worlds first phreakers, billed up thousands of dollars in transatlantic calls, due to a corn flakes box whistle. Later electronic boxes were build to duplicate this effect. (hmmm.... Mark Tabas, cornflakes, BLUE BOXES ?????) I guess we all know what color these boxes were. Eventually laws were changes, kids put in prison, blacks legalized, and Ma bells changes to CCiTT 5.BUUUUUT, still phreakers are managing to blue box. People are still writing viruses, and hacking [( Cracking, in reality) HAHAHAHA, I LOVE this mans choice of words], and phreaking, in them thar states, but nobody gives a phuck. H/P/V/A/C is here to stay..... What first caught my eye is the fact that some u.g. puke had passed on a HBBS plus passwords. Few people, hackers included, could figure out the encryption used, let alone a anti virus fag, which leads me to conclude that they sourced the list plus password from someone. The next issue is, if they start poking around our BBS's them warez dudes better hide their shit from the business alliance. [ they fined a branch of ENGEN R 120 000 fer pirate copies of after dark ] The B.S. is comprised of a panel of mostly lawyers, who can and will search your premises IF they find justified cause. [better stop bragging about that windows beta ver.] If it looks like the rest business world want to expose some of our loved ones, to sell extra software, then they'll find they don't know who their phuking with. There are some powerful people in the underground, in all kinds of positions of doing damage. I have little worry for the mentioned boards, as it is NOT illegal to be in possession of information, but as to the active hackers/phreakers/warez dudez/anarchists, and I mean ACTIVE, not kids who consider themselves eelite for owning anything written by Mark Tabas or dem Binary Surgeons. With bits and pieces being added on the our spanking new constitution its just a matter of time before the "theft of telecommunication services" or the "making, copying, or distribution of software, specifically meant for the illegal modification, corruption, of destruction of electronically stored information in any form" or even to call yourself a hacker [dem beltel dudes, sheeesh]. Enuf from me....... dEUS ----\\\\\\\\\\\\ <---------()()()()()()()()()()())))))))))>>>>>>>>>>------------------> Okay....see ya on the net....I'm tired, gots lots of things to put in the next issue....but way to tired to put it in this issue now. <---------()()()()()()()()()()())))))))))>>>>>>>>>>------------------> Hi's goes to the members of KiLL ,,, *<:-]} ```