[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]

..[ Phrack Magazine ]..
.:: Hacking Rolm's CBXII ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #31 | Release date : 1990-05-28 | Editor : Crimson Death
Introduction to Phrack 31DH
Phrack Pro-Phile of Markus HessMarkus Hess & PHz
Hacking Rolm's CBXIIDH
TAMS & Telenet SecurityPhrack Accident
The history of The Legion Of Doomunknown
Cosmos OverviewEBA
Tymnet Security Memounknown
PWN/Part01Phrack Accident
PWN/Part02Phrack Accident
PWN/Part03Phrack Accident
Title : Hacking Rolm's CBXII
Author : DH
                             ===Phrack Inc.===
               Volume Three, Issue Thirty-one, Phile #3 of 10
             / *                                            * \
             \                                                /
             /           Hacking Rolm's CBXII/9000            \
             \                by DH                  /
             /                   05/24/90                     \
             \ *                                            * /

     IBM Rolm's CBXII/9000 is a very powerful machine.  Powerful in the aspect
that one has the switch(s) at his control.  Controling switches means you can
control the entire PBX environment (And it's users).
     This file will not get technical.  Basically, I'm writing this file on
the HOW-TO's of the internal works of CBXII and the basics of obtaining the
dialups and account information need to access the machines.  For further
information on CBX's in general, read Epsilon's Phrack Phile on them, or
consult Evil Jay's phile on OSL's.

Obtaining Dialups
--------- -------
      Obtaining dialups unfortunately is the hardest part of hacking CBXII's.
(Yes, even harder than hacking them).  There are several ways to obtain the
dialups.  I would say a good bit of CBX's are at universities and hospitals
where they own their own switches.  Most of the time you can determine if they
have one by calling the Telecommunications Department of the target location.
Or, another way is to check with ROLM.  If you *KNOW* that a target location
has a CBXxx machine, you can call ROLM's 800 wats line and say your with the
Telecommunications Department and your looking for the DIALUP.  Rolm has files
on all their CBXxx's and the Dialups also.  They might ask you for a NODE #
for the dialup, and you should usually respond with what node you want (Since
different nodes handle different areas of the PBX).  Basically, nodes start at
ONE and usually goto THREE or FOUR, depending on the size of the PBX.
       CBXxx's are greatly compatible of IBM Rolm's Phone-Mail system (Which
is a highly used and common voice mail system).  This of course doesn't mean
that every PHM (Phone-Mail) system has a CBXxx attached.  But it is generally
a good start.
       The following is a checklist to determine if the target location could
have a CBXxx for controlling their switch.  By no means however, if your target
location has all of the following it could have a CBXxx.
        1) Does the location handle it's own switch?
            If so, what kind, and who services it.
        2) Does IBM Rolm handle any aspect of their telecommunications
            If so, this is a possible CBXxx location.
        3) Does the location have Rolm Phone-Mail?
        These three guidelines are not requirements.  I.E. -- The location
could have a non-IBM PBX but still have a CBXxx for handling the switch.
So who knows.. It's up to you and your bullshitting and scans.
Hacking the CBXxx's
------- --- -------
        Well, once you have obtained the dial-ups, you are almost halfway
there.  Hacking the CBX is the easy part.  1st off, IBM Rolm ships *ALL*
of their machines with a default account (Yes, and they never change it).
When the destination of the CBX recieves the machine, they use the default
to create other accounts for employees, PBX operators, and administration.
Rolm IBM also has a field support account embedded in the machine.  These
are different to each location and correspond to the serial number of the
machine (Rolm's accounts can be obtained from Rolm's 800 technical support
line).  So, now that we know that there is a default account that telecom
department uses to setup the other accounts after they recieve the machine,
tells us that this is a priviledge account.  And it is.
         USERNAME: SU
        How nice for them to give us such power.  Yes, it's a basic default
with SuperUser priviledge.  If for some reason the account default has been
changed, their are other ways of getting in:
         1) Call Rolm and get the Field account information.
         2) Try first names of Telecom Dept. employees, and PBX Operators.
         3) Use every Hacking skills you have (If any).
        Some older versions of CBX don't even require logging in with an
account.  Those versions are less responsive to the administrators needs,
but can be useful to one also.  Don't be discouraged if the SU password is
changed, just call Rolm and get the field account.
        The following is the matrix before one access the machine. *Note that
it clearly identifies* *Also: Accessible at 300 baud and e,7,1*
CONNECT                                ID banner
                 _Release version #  /
                /                   /\
Rolm CBXII  RELEASE 9004.0.65 RB74UCLA11956
BIND DATE: 8/SEP/88                 \
YOU HAVE ENTERED NODE 1, CPU 2       \_Name of owner, IE: UCLA
11:14:30 ON FRIDAY 2/11/1990             (System ID)

Once your in
---- ---- --
         Once your in, you should have no problems wondering around the
machine and using the utilities in the machine's operating system.  There is
very specific help functions inside the machine that will guide you through
with no problems.  At the CBX prompt:
%. HELP ?
%. ?
          Should produce a valid listing of options and sub-functions.  Every
function can be followed with a '?' to give lists of valid sub-functions under
that function or how the syntax of that function should be used.
          The following is a listing of commands for CBXII/9000:
ABORT              ACTIVATE            ATTR                BYE
CANCEL             CARD                CDRSM               CDT
CHANGE             CHG                 CLEAR               CLR
CMPCT              CMSTS               CNCL                CNFG
CONVERT            COPY                CPEG                CTMON
CTRA               CTRTL               CXCLR               COPY
CXCLR              CXCON               CXNET               DACK
DADD               DAEVT               DANS                DBDMP
DCAT               DCF                 DCOM                DDMA
DDQ                DDT                 DE                  DEACTIVATE
DEFINE             DELETE              DEMOUNT             DESUM
DEX                DFACK               DFCOM               DFEAT
DFEVT              DHTQ                DHWS                DIAG
DIQ                DISABLE             DIWQ                DKQ
DML                DMNT                DMS                 DMTST
DOWN               DPATR               DPMR                DPMS
DPPRI              DPTR                DQQ                 DRCT
DREGS              DSBLE               DSQ                 DSST
DSTAK              DTCB                DTDQ                DWQ
DX_TR              ENABLE              ENB                 ENBLE
ETIO               EX                  EXM                 EXN
EXP                EXPAND              FINIT               FORMAT
FREER              FSD                 GTOD                HDBST
HELP               INSTALL             KPFA                LCT
LIST               LOAD                LOGOFF              LOGON
LPEG               LPKT                LSCT                LSL
LST                LTCB                MNT                 MONITOR
MOUNT              MTRACE              NEXT                NSTAT
PAGE               PCNFG               PDIO                PFA
PKTS               PLIST               PLTT                PPFA
PS                 PSH                 QAT                 QITM
QTEST              RCT                 RECEIVE             RENAME
REPLY              RESTART             RESTORE             REVERSE
RM                 RMOFF               RPFA                RSC
RSCLK              RSTOR               RSTRT               SAT
SCAN               SEND                SET                 SHOW
SITM               SOCON               SOUNC               SSAT
START              STATE               STATUS              STEST
STOD               STOP                STRT                STS
TDCD               TEST                TKSTS               TRTL
TST                TX                  UNLK                UNLOCK
UP                 VERIFY              XDEF                XMIT
     These commands can be executed from and '% ' prompt.  If the command is
followed by a '?', more information will be supplied about the command.
Using the ICI
----- --- ---
     The Interactive Configuration Interface controls immediate changes in
the switch and PBX environment.  The Utility is explained in great detail
through the actual running of it.  You can access the ICI by typing:
                         CPU 2
15:14:32 ON FRIDAY 5/02/1990
      This is the main command prompt.  From here you can exercise the '?'
help list to get valid commands.  There are four phases of the ICI utility:
Modify, Create, List, and Delete.  These can be used on Extentions, Trunks,
Logon accounts, Feature Group sequences, Data_line access, Trunk Groups, ect.
The following is a sample of using 'list' to list a current extention in the
                               _Forward to EXTN 2000
COMMAND: LIST EXT 4038        /                            _Outside number
                             /             FORWARD ON     /  to forward to
                           FORWARDING     BSY RNA DND    /
   ----     ----   ---   ------- -------  - - - - - - --------  ----------
DS 4038     EXTN   56    2000             1 1 1 1 1 1 95551212  R.STABELL
    \          \    \                     /   /    \               \
    Extention  /     -Class of service   if  R    Auto. Forward   Owner of
              --Type of line            BUSY  I   No Matter What   EXTN.
                (Reg. Extention)               N
Note: The 1's specifies to forward to target#1    & NO ANSWER
      (As 2's would mean forward to #2 target)
     This should detail how to modify a listing like above using the 'MODIFY'
command in the ICI.  Once modified, all transactions are processed immediately.
Using the 'Delete' command one can delete extentions, trunks, ect.
     So now we have the following commands in ICI: MODIFY, DELETE, LIST, CREATE.
Each can be used with the following "Nouns" to modify that "Noun":
BUTTON_120         BUTTON_240          CDR_EXCLUDE         CNFG_ERRORS
DATA_LINE          DATA_SUBMUX         DLI                 ETS
EXTEN              FAC                 FAC_TYPE            FAMILY
FEAT_CODE          FIRST_DIGIT         HD_GROUP            LEX
LOGON_PROFILE      MAP                 MEM_PARTS           PARAM
PICK               POWER               Q_TYPE              ROUTE_LIST
RP                 RPD                 RPI                 RPS_120S_ON
RPS_240S_ON        SAT_NAME            SEARCH_SEQ          SECTION
SPEED              T1D3                T1D3_GRP            TRUNK
      The FAMILY, LOGON_PROFILE, and CNFG_USER all deal with the accounts on
the system.  One can use MODFIY or CREATE to set them up an account with SU
access.  The FAMILY noun is the listing of the groups with different access,
to different "nouns" available. I.E.: Not everyone can access the CHANGE
LOGON_PROFILE to create an account.
      To create an account with SU access, type (while in ICI):
      Next it will ask you for a family.  For SU access, type "SYSTEM_ADMIN".
After family, the machine should prompt you for a "verb". Verbs are the actual
functions or commands, so in this environment you can set the commands a user
can access.  So, for SU, enter "ALL" for every command access.
      To get a valid listing of users online, try this:
     3                  5
17      SU           17:47:57    0:28:34
2       FIELD        18:16:03    0:0:28
3       MARYB        18:16:03    0:10:03

Using the Monitoring Utility
----- --- ---------- -------
      This command is one of the more powerful commands in the CBXxx system.
The monitor command should be invoked from within the main function command
level and not in the ICI level.  The monitoring command allows you to actually
watch or monitor TRUNKS and EXTENTIONS.  So, if I were to type:
10:02:43 ON FRIDAY MAY/02/1990
EXT#   STATE            DI  CODE  DIGITS         PROCESS      STATUS
----   ---------------  --  ----  -------------  ------------ ------
4038   IDLE                                      STN FWD NUM   FWD
 \         \                                     /    /    /    \
Extention   Not in use                   Standard     \   /        Forwarded
                                         Extention     \ /
                                                    Forwarded to
                                                     a number
      This shows the extention to be IDLE and not in use.  But, with forwarded
call processes to a standard number.  You would have to use ICI to look up the
number it's forwarded to if you wanted.
10:03:44 ON FRIDAY MAY/11/1990
EXT#    STATE           DI  CODE  DIGITS         PROCESS     STATUS
----    --------------  --  ----  -------------  ----------- ------
4038    DIAL TONE                                STN FWD NUM  FWD
4038    DIALING         Y         9             /    \   \     \
4038    DIALING         Y         92           S     F    N     \Extention
4038    DIALING         Y         923           t     o    u       Forwarded
4038    DIALING         Y         9233           a N   r    m
4038    DIALING         Y         92334           n u   w    b
4038    DIALING         Y         923345           d m   a    e
4038    DIALING         Y         9233456           a b   r    r
4038    DIALING         Y         92334564           r e   d
4038    CONN T025N      N              \              d r   e
 /             \        /               \                    d
 \              \       \_Dialing NO     \_Number dialed
  \_Extention    \
               Connected to
              Outside trunk T025N
     This monitoring shows the extention actually dialing the number, and then
connecting to an outside truck.  Unfortunatley, one we cannot monitor without
access to a bell switch.
     Monitoring can also be done with trunks.  I will not display any trunk
monitoring since it is quite simple to decypher.
Manipulating the switch
------------ --- ------
     There are many ways you can manipulate the CBX's to gain accounting
information on data lines within the PBX environment.  One sure-fire method
would be to forward an actual data dial-up extention to a bridge or loop and
then write an emulation to intercept the user's account information real-time
as they connect to your fake dial-up.
     Or perhaps if an university uses the CBX, one could maybe forward the
computer help desk extention to a bridge or loop and as an unsuspecting user
calls up, ask him what machine and account info he has access to for a help
log sheet you are taking.
    Who cares. Who knows.  There are thousands of things you can do to use
the CBX to your advantage.  Hell, you have the whole switch at your command.
DH -  05/11/90

[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.