[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]

..[ Phrack Magazine ]..
.:: Physical Access and Theft of PBX Systems ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ]
Current issue : #43 | Release date : 1993-01-07 | Editor : Erik Bloodaxe
IntroductionDatastream Cowboy
Phrack Loopback Part IPhrack Staff
Phrack Loopback Part II / EditorialPhrack Staff
Line Noise Part IPhrack Staff
Line Noise Part IIPhrack Staff
Phrack Pro-Phile on Doctor WhoDoctor Who
Conference News Part Ivarious
Conference News Part IIvarious
How To Hack Blackjack (Part I)Lex Luthor
How To Hack Blackjack (Part II)Lex Luthor
Help for Verifying Novell SecurityPhrack Staff
My Bust (Part I)Robert Clark
My Bust (Part II)Robert Clark
Playing Hide and Seek, Unix StylePhrack Accident
Physical Access and Theft of PBX SystemsCodec
Guide to the 5ESSFirm G.R.A.S.P.
Cellular InfoMadjus
LODCOM BBS Archive Informationunknown
LODCOM Sample Messagesunknown
Step By Step Guide To Stealing a CamaroSpy Ace
Acronyms Part IFirm G.R.A.S.P.
Acronyms Part IIFirm G.R.A.S.P.
Acronyms Part IIIFirm G.R.A.S.P.
Acronyms Part IVFirm G.R.A.S.P.
Acronyms Part VFirm G.R.A.S.P.
International Scenevarious
Phrack World NewsDatastream Cowboy
Title : Physical Access and Theft of PBX Systems
Author : Codec
                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 15 of 27

[** NOTE:  The following file is presented for informational purposes
           only.  Phrack Magazine takes no responsibility for anyone
           who attempts the actions described within. **]


                    Physical Access & Theft of PBX Systems

                             A DSR Tutorial by :

                     CO/der DEC/oder & Cablecast 0perator.

                  (K)opywronged 1993, by Dark Side Research



July 1989, Mobil Oil Corporation Headquarters -- Fairfax, VA.

     Abundant technology, late hours, and shadows between city lights
made up the typical environment CO/der DEC/oder repeatedly found
adventure in.  On one such night in the summer of '89, a reconnaissance
outing landed him at the offices of Mobil Oil Corp.  The door leading
from the multi-level parking garage into the foyer was equipped
with an access-request phone and a square black pad.  The pad was flush
with the wall, and sported a red LED in its center -- a rather imposing
device used to read magnetic access cards.  CODEC picked up the phone
and listened to a couple rings followed by the voice of a security
guard, "Good evening, security ..."
     "Evenin', this is Dick Owens with CACI graphics.  I don't have a
card, but just call upstairs and they'll verify."
     "Hold on, sir ..."
     Kastle Security's verification call registered as a sudden 90 VAC
spike on Cablecast 0perator's meter.  Clipped on the blue and white pair
of CACI's incoming hunt group, Cable picked up on his TS-21:
     "This is Kastle Security.  We've got a Dick Owens downstairs
requesting access."
     "Yeah Sure.  Let him in please."
     The security man took Codec off hold, "Okay sir, what entrance are
you at?"
     "Garage level one."
     The door clicked, and in went the hacker-thief -- grinning.
Another lock at the end of a hallway also hindered access, but a
screwdriver, placed between door and frame, removed the obstruction with
a quickly applied force.
     CACI was a graphics outfit sharing the same building with Mobil.
After a perusal through its desks and darkened corridors turned up a
cardkey for later use, Codec -- pausing casually along the way at the
drunking fountain -- made his way to the opposite end of the hallway and
into Mobil's mail receiving room.  In contrast to elsewhere in the
building, this room was chilly -- as if heavy air conditioning was
nearby.  There was also a faint roar of fans to enhance this notion.
And behind a countertop in the direction of the noise, a split door could
be seen through which mail and parcels were passed during business
hours.  Hardly an obstacle, he was on the other side in an instant.
This "other side" was no less than a gateway to nirvana.  At first he
began taking in the sight of a mini-computer, console, and mass storage
devices, but his eyes were virtually pulled to the giant on his left.
It was the largest and most impressive PBX he had yet seen; a label
above the five gargantuan, interconnected cabinets read, "AT&T SYSTEM
85."  The hacker's heart raced -- he wanted to explore, control, and own
the switch all at once.  Within seconds his gloved hands caressed the
cabinets while his hungry eyes scanned circuit pack descriptors, mouth
agape.  Codec grabbed some manuals, jotted down numbers to a modem
stack, and reluctantly departed.  A week later, he stole the switch.
     To the Dark Side Research group, the System 85 would be worth
approximately $100,000 -- but to Mobil, the system was worth at least
six times that figure.  In its entirety it was more valuable, but DSR
was only concerned with the guts; the digital circuitry of the system.
When Codec reentered the building the following week, he was wearing a
VOX headset attached to a hand-held 2-meter band (HAM) radio.  This was
strapped to his chest except for the rubber-whip antenna which protruded
out of a hole in his jacket.  His awestruck, gleeful countenance from
a week prior had been replaced by a more grave expression, and the
moisture now on his body was no longer from unconscious salivation
but due to the sweat of anticipation and rapid movement.
     "Phase one complete," he spoke into the boom mic in front of his
     "Roger Nine-Two.  Quit breathing on the VOX or adjust sensitivity,
     "Roger Nine-Three.  Entering heavy EMI area," Codec acknowledged to
one of the lookouts.
     Steps were retraced through the mail room, where several empty
boxes marked "U.S. Mail" and a dolly were conveniently stored.  The
System 85 was shut down, cabinet by cabinet, as most of the circuit
boards were hastily removed and boxed.  Seven boxes were filled,
requiring two trips with the dolly to a side door.
     "All units: ready for docking."
     "Roger Nine-Two.  Standby.  Nine-Three, okay for docking?"
     "Step on it, over ..."
     A Ford Escort with its hatch open raced up to where Codec and the
boxes stood.  Within fifteen minutes the circuit packs were unloaded in
a public storage unit.  Within half an hour, CO/dec DEC/oder, Cablecast
0perator, and the remainder of the night's crew were filling up with
doughnuts of the nearby 7-11, observing local law enforcement doing the

APRIL 1993: Security memorandum broadcast from wrq.com -- Internet

     "We've all heard of toll fraud as a way to steal telecommunications
resources.  Now the ante has been escalated.  I've heard of a
company on the East Coast that was having some minor troubles with their
PBX.  A technician showed up at the door and asked directions to the PBX
closet.  The company showed this person the way without checking any
credentials, and about five minutes later the phones went completely
dead.  They went up to the PBX closet and found that several boards from
the PBX had been removed and that the 'repairman' had departed."

     The theft of PBX circuit boards is a novel idea and seldom heard
of, but -- as made apparent above -- it does occur.  In the used PBX
scene, often referred to as the "secondary" or "grey" market, there is
always a demand for circuit packs from a wide variety of PBXs.  The
secondhand PBX industry grew from $285 million in 1990 to $469 million
in 1992 -- despite the recession.
     The essence of any PBX is a rack or multiple racks of circuit
cards/boards/packs, with an average grey market value of anywhere from
$50 to $2000 each.  The cards are lightweight, small in size, and can
even withstand a moderate dose of abuse.  Transport of misappropriated
circuit boards is done without risk -- under and police scrutiny, a box
of these looks like a mere pile of junk (or senior engineering project)
in the trunk of your car.  Furthermore, the serial numbers on the boards
are seldom, if ever, kept track of individually, and these can be
removed or "replaced" in any case.  Unlike computer equipment or
peripherals, PBX cards are extremely safe, simple, and non-proprietary
components to handle -- even in quantity.
     Although you may wish to physically access PBXs for reasons other
than theft, it will be assumed here that monetary gain is your motive.
In either case, this introductory file makes it clear that access can be
achieved with varying levels of ease.  A PBX theft should be thought of
in terms of two phases:  reconnaissance and extraction.  Recon involves
finding and selecting prime targets.  Extraction is the actual theft of
the system.  Both phases can be completed through "office building
hacking," a wide variety of deception, breaking and entering, social
engineering, and technical skills.

Phase I : Reconnaissance

     PBXs are found where people's communications needs warrant the
capabilities of such a system -- offices, schools, hotels, convention
centers, etc.  The PBXs we will concert ourselves with in this discourse
however are those located in shared or multiple-leased office
structures; the "typical" office buildings.  The typical office building
has enough floors to require an elevator, some parking space, a lobby,
and a company directory (Because it is shared by more than one
business).  Companies that occupy an entire building by  themselves are
generally too secure to be worthwhile targets.
     Tenant companies in the typical building lease all different size
office space -- some rent only 300 sq. ft., others take up entire
floors.  Those that use half a floor or more usually meet the criteria
for PBX ownership.  Obviously, the larger the firm's office at that
site, the greater its PBX will be, so those business spread out over
several floors will have the most valuable systems.  This is not always
an overwhelming factor in determining a target however.  The smaller
systems are often easier to get at -- and ultimately to remove --
because they tend to be located in utility closets off publicly
accessible hallways as opposed to within a room inside an office space.
Those closets, sometimes labeled "telephone" and even unlocked, will be
found one or two per floor!  Other closets may exist for electrical
equipment, HVAC, plumbing, janitorial supplies, or for a combination of
these uses in addition to telephone service.
     A phone closet is easily distinguishable whether or not a switch or
key system is present.  A web of low-voltage (22 AWG), multi-colored
wiring will be channelled and terminated on a series of white "66"
blocks mounted on the wall.  These blocks are a few inches wide, and
roughly a foot long, with rows of metallic pins that the wiring is
punched into with a special tool.  As a general rule, if the system is
fastened to the wall and doesn't have at least one muffin fan built-in
and running, it's either a measly key system or a PBX too small to
deserve your attention.  Those worthy of your time will stand alone as a
cabinet with a hinged door, contain shelves of circuit cards, and
emanate the harmonious hum of cooling fans.  As an example, Mitel PBXs
commonly fit cozily in closets -- sometimes even one of the newer ROLMs
or a voice mail system.  On the other hand, an NT SL-100 should
not be an expected closet find.
     Wandering through office buildings in search of phone closets
during business hours is easy, so long as you dress and act the part.
You'll also want to look confident that you know what you're doing and
where you're going.  Remember, these buildings are open to the public
and an employee of one company can't tell whether or not you're a client
of another.  When going in and out of the phone closets, who's to know
you're not a technician or maintenance man?
     Apart from searching the closets, you can approach the secretaries.
Feign being lost and ask to use the telephone.  Steal a glance at the
console and you'll know (with a little practice) what type of PBX
they've got.  This is very valuable information, for it may save you
from unsuccessfully breaking into the closet (should it be locked) or
the company itself.  Secretaries are cute, courteous, and dumb.  You
shouldn't have a problem convincing her to give you the key to the phone
closet if you're posing as a technician.  If you're feeling as confident
as you should be, you may even get a date with the bitch.  And should
you ever raise suspicion, you always have the option of bailing out and
making a break for the stairwell.  No business exec is going to chase
you down.
     Some additional methods can be employed in conjunction with
visiting the buildings, or as a precursor to such :

-- Classified ads.  A company with job openings is all the more
vulnerable to your dark motives.  Using the help-wanted section of your
newspaper, look for receptionist and secretarial positions.  Call and
ask, "What type of phone system will I be required to handle?"  You may
also want to go in and apply for the job -- any job at a large firm will
do.  You'll learn the type of system installed, some details about
security, etc; this is a very sophisticated way of "casin' the joint."

-- Scanning for RMATS.  Using your preferred wardialer (such as
ToneLoc), scan business districts for PBX remote maintenance modems then
CNA your finds.

-- Targeting interconnects.  Interconnects are PBX dealers that sell,
install, and maintain the systems on contract.  Capture a database of
clients and you'll have a windfall of leads and pertinent info.  AT&T
allegedly sells its database by region.  Also, intercept voice mail or
company e-mail.  Interconnects make decent targets themselves.

-- Users groups and newsletters.  Some of the extremely large PBX owners
join users groups.  Though this is abstract, owners will discuss their
systems openly at the meetings.  Newsletters are mailed out to members,
often discussing special applications of specific locations in detail.
Great for making sales contacts.

Phase II : Extraction

     Removing the PBX calls for an assessment of obstacles versus
available means and methods.  The optimum plan incorporates a late
afternoon entry with a nighttime departure.  This means entering the
building during business hours and hiding, either in the PBX closet
itself or any room or empty space where you can wait until after hours
to re-emerge.  This is the most safest and effective of methods.  You
need not worry about alarms or breaking in from outside, and you can
take advantage of one of the greatest weaknesses in corporate office
security -- janitors.  The janitorial staff, if you act and dress
properly, will allow you to walk right into an office while they're
cleaning.  If you're already in an office and they enter, just act like
you own the place and it'll be assumed you work there.  If you prefer
not to be seen, keep hidden until the cleaning is done on your floor.
(Be sure not to make the idiotic mistake of hiding in the janitor's
closet).  Although the custodians will lock the doors behind them, any
alarms in the building will remain off until cleaning for the entire
structure is complete.
     There is simply nothing so elegant as entering the building during
the daytime hours, hiding, and re-emerging to wreak havoc when
everyone's gone.  (A patient wait is required -- take along a Phrack to
read).  Unfortunately, entry will not always be so easy.  The phone
closet may have a dead-bolt lock.  There may be no feasible hiding
place.  People may constantly be working late.  Because of all the
potential variables, you should acquire a repertoire of means and
methods.  Use of these methods, though easy to learn, is not so quickly
mastered.  There is a certain "fluidity of technique" gained only
through experience.  Deciding which to use for a given situation will
eventually come naturally.

-- Use of tools.  You can easily get around almost any office building
using only screwdrivers.  With practice, prying doors will be quick and
silent.  Although some doors have pry-guards or dead-bolts, about every
other phone closet you'll encounter can be opened with a screwdriver.
Before forcing the gap between door and frame, try sliding back the
locking mechanism.  For best results, work it both ways with a pair of
screwdrivers; a short one for leverage, a longer one for manipulation.
     For dead-bolts, a pipe wrench (a wrench with parallel grips) can
turn the entire lock 90 degrees.  Interior doors are cheaply
constructed; if you can wrench the lock, it'll turn and the bolt will be
pulled back into the door.  Quality dead-bolts have an inclined exterior
to prevent it from being gripped.  For these, diamond-cutting string can
be applied.  This is available at select plumbing supply houses for $150

-- Ceilings and adjacent offices.  Not only are the doors cheap inside
office buildings, so are the walls.  If you're having trouble with a
door or lock, push up a ceiling tile with your screwdriver and see if
the wall stops or is continuous.  If it stops, you may choose to climb
over.  If you're already inside an office and find a particular room
locked, climbing is always an option because walls are never continuous
between rooms.  Walls are seldom continuous between business either; if
you can't get into a particular office space, try through adjacent

-- Brute force.  If making noise is not a serious concern, a crowbar
will pry any door open.  For most situations requiring this level of
force, a sleek, miniature bar is all you need.  You can also saw or
hammer your way through any interior wall.  Once you've made a hole in
the sheetrock, you can practically break out the remainder of an opening
yourself using only your hands.
     From the outside, windows can be broken or removed.  Office
building glass is installed from the outside, so by removing the seal
and applying a suction device, you can pull the entire window out.
Breaking the glass is not too difficult, but frighteningly loud.  Using
a screwdriver, push the blade between the edge and its frame and pry.
Eventually you'll have holes and cracks running across the window.
Building glass is typically double-paned; once through the exterior
layer, you'll have to break the next.  Because the second layer isn't as
thick, you have the option of prying or smashing.  This sounds extremely
primitive -- it is, but it may be the only method available to you.
Highly-alarmed office structures do not have the windows wired.  When
there's a 5,000-port NEC NEAX 2400 in view and alarms everywhere else,
you'll break the fucking glass.

-- Alarm manipulation.  Entire files could be written on this subject.
Some relevant facts will be touched on here; no MacGyver shit.
     Our "typical" office building, if alarmed, has one of three types
of alarm plans.  The alarm system is either externally-oriented,
internally-oriented, or both.  More often than not, externally-oriented
alarm systems are encountered.  These focus on keeping outside intruders
from entering the building -- interior offices are secured only by
locks.  Alarm devices such as magnetic switches and motion detectors are
in place solely in lobby areas and on doors leading from outside.  If
you know in advance that you can readily enter any of the offices, the
alarm is harmless.  After entering, go directly into the office and look
out the window.  Eventually, security or police will arrive, look
around, then reset the alarm and leave -- so long as you haven't left
any trace of your entry (damaged doors, ceiling tile fragments, etc).
Although common areas and corridors will be briefly scanned, no company
offices will be entered.
     Internally-oriented alarm plans include alarms on individual
offices and are more difficult to reckon with.  However, the sensors are
only on the doors; any method that avoids opening the door can still be
     Access controls like cardkeys are impressive in appearance but do
not automatically represent an alarm.  If you open the door without
inserting a cardkey, the system must be equipped to know whether a
person entered the building or exited.  Thus, only those systems with
motion detectors or a "push button to exit" sign and button can cause an
alarm at the cardkey-controlled door.  Otherwise the door and cardkey
device is no more than a door with an electronic lock.  There are always
exceptions to the rules, of course; never trust any alarm or access
control system.  Sometimes a system will be programed to assume any
opened door is someone entering, not exiting.  Check for sensors --
mounted flush on the door frame -- look carefully, they'll sometimes be
painted over.  Check both sides and top of the frame.  If a sensor is
found (or when in doubt) hold the door open for about ten seconds, then
wait and watch for up to an hour to see if there's a silent alarm.
     For the "push button to exit" entrances, you can sometimes use a
coat hanger or electricians fish tape to push the button from outside
using cracks around the door.  Where motion detectors automatically open
the entrance, similar devices can be employed to create enough commotion
to activate the detector (depending on detector type).
     Disabling part of the alarm system may be a possibility during the
day.  Chances are, if you can access the control CPU you've also got a
place to hide, and the control box is often alarmed against tampering
anyway.  Many of the latest systems are continuously monitored from a
central station.  If not, you can disconnect the alarm box from its
phone line.  Your best approach however is to alter a door
sensor/magnetic switch circuit.  You can use a piece of conductive hot
water duct tape to trick the sensor into thinking the door is always
closed.  This tape looks like tin foil with an adhesive on one side.
Obtain a similar sensor and test at home before relying on this --
magnetic switches come in many shapes and forms.  The better systems
don't even check for normally-open or normally-closed states, but for
changes in the loop's resistance.  This means simply cutting or
shorting the lead wires won't suffice.  But if the conductive tape won't
do, you can always just cut the leads and return in a couple days.  If
the cut hasn't been repaired, then you have an entry point.  Building
managers become lax with an alarm system after it's been installed for a
while and there haven't been any break-ins.  Other loops are disabled
after late-working employees repeatedly off the alarm.  One other option
is to cut and splice both parts of the sensor back into the loop so that
it remains unaffected by movement of the door.  The throughways to
target for any of these alterations are minor side doors such as parking
garage or stairwell exits.  You should be pleasantly surprised with the

-- Locks and picks.  (This could be another textfile in itself).
Lockpicking is an extremely useful skill for PBX appropriation but
requires quite a bit of practice.  If you aren't willing to invest the
time and patience necessary to become effective with this skill,
screwdrivers are the next best thing.  Furthermore, with all the
different types and brands of locks in existence, you'll never be able
to solely rely on your lockpicking skills.  Acquire this ability if your
involvement in underworld activities is more than just a brief stint...

     You can more readily take advantage of the skills possessed by
locksmiths.  Because the offices within a typical building all use the
same brand lock with a common keying system, any of the locks can yield
the pattern for a master key to the whole system.  Obtain a spare lock
from the basement, maintenance room, or anywhere extra doors and
hardware are stored, and take it to a locksmith.  Request a key for that
lock and a master.  Many of the offices should now be open to you.
     Some keys are labeled with numbers -- if the sequence on the key
equals the number of pins in the lock, you can write down the number and
lock brand, and get a duplicate of the key cut.
     There is also a little locksmithing you can do on your own.  With a
#3 triangular "rat tail" file and a key blank to the brand lock you are
targeting, you can make your own key.  Blanks are either aluminum or
brass and scratch easily -- this is no accident.  By inserting a key
blank in the lock and moving it from side to side, you'll create
slate-colored scratch lines on the blank from the lock's pins.  The
lines will indicate where to begin filing a valley -- there'll be one
for each pin.  Move the file back and forth a few times and re-insert
the key to make new lines.  Use the point of the file only when
beginning the valley; successive passes should not create a point at the
bottom of the cut but leave a flat gap.  When no new scratch appears on
the bottom of a particular valley, don't file the valley any deeper --
it's complete.  Eventually, all the valleys will be cut and you'll have
a key to open the lock.
     Last but certainly not least, you can drill most locks where a
little noise can be afforded.  Using a 1/4 inch Milwaukee cordless drill
with about a 1/8 inch carbide-tipped bit, you can drill a hole the
length of the lock's cylinder.  Drill approximately 1/8 inch directly
above the keyhole.  This destroys the lock's pins in its path, and
allows others above to fall down into the hole.  Now the cylinder will
turn with any small screwdriver placed in the keyhole and open the lock.
Little practice is demanded of this technique, and it's a hell of a lot
of fun.

-- Elevator manipulation.  Elevators can be stubborn at times in
rejecting your floor requests.  Companies that occupy entire floors must
prevent an after-hours elevator from opening up on their unattended
office.  If there's a small lock corresponding or next to that floor's
selection button, unscrew the panel and short out the two electrical
leads on the other end of the lock.  Continue to short the contacts
until you press the button and it stays lit -- you'll then arrive at
your desired floor.
     The elevator motor and control room is located either on the roof
or penthouse level and can be frequently found accessible.  Besides
being a place to hide, sometimes you can find a bank of switches that
override the elevator's control panel (if for some reason you can't open
it or it's cardkey-controlled) and get to your floor that way.  Two
people with radios are needed to do this -- one in the equipment room,
one in the elevator.  Watch for high voltage and getting your coat
caught in a drive belt ...

Operation Integrity

     By taking advantage of daytime access, hiding places, and some of
the more sophisticated methods, there's no need to become an alarm
connoisseur or full-blown locksmith to liberate PBX equipment.  When
you can't avoid nighttime activity or an activated alarm system, then be
sure to take extra precautions.  Have lookouts, two-way radios, even a
police scanner.  Don't use CB radios, but rather HAM transceivers or
anything that operates on proprietary frequencies.  This will require a
small investment, but there's no price on your safety.
     Office buildings in downtown areas tend to be more secure than
those in the suburbs or outlying areas.  Location and surroundings are
important considerations when your operation takes place at night.  It
should also be noted that a building without a security guard (typically
the norm) may still subscribe to sporadic security checks where
rent-a-cops drive around the building at some regular interval.
     With regard to transportation and storage, rent vehicles and
facilities in alias names where appropriate.  Use taxis to pick you up
when you're departing with only a briefcase or single box of cards.  No
matter what the time may be, anyone seeing you enter a taxi in front of
the office will assume you're legit.
     It is our sincere wish that you apply this information to the
fullest extent in order to free yourself from becoming a mere tool of
capitalism, and use this freedom to pursue those things in life that
truly interest you.  We have tried to summarize and convey enough
basic information here to provide you with a complete underground
operation possibility.  All material in this file is based on actual
experience of the authors and their associates.

     For information on the sale of PBX or other telecommunications
equipment, or for any other inquiry, contact the Dark Side Research
group at the following Internet address :


[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2014, Phrack Magazine.