what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 33 RSS Feed

Files from hybrid

First Active1999-09-24
Last Active2000-04-15
ukphreak.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

an introductory guide to phreaking in the uk, one of hybrid's earlier files, for darkcyde and 9x, specifically aimed at uk dudes.

tags | telephony
SHA-256 | d0fe4706aaa5dd12e2bf945787f311ab29f1b44e20556423ececddb6395a9ec7
ss7.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a guide to the SS7 telephony protocol - Signaling System 7 is a means by which elements of the telephone network exchange information. Information is conveyed in the form of messages.

tags | telephony, protocol
SHA-256 | 42a056c65c9a65c98a8ee7c1e0e60c7bd1063c7ea2f29dd4cb12cd1ca849d8c0
Shiva LanRover Guide
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

A guide to the Shiva LanRover networking platform, ppp connections, dialout modems etc, system configuration.

tags | paper
SHA-256 | 47814ac73410ffb0faa0055dba3300a21839a2bf6b863a2adf9b2a2873f9b1aa
satpstn.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

brief introduction to satelite communications and the intergration of the PSTN (public switched telephone network) - addition to a file written for faith magazine.

tags | telephony
SHA-256 | 09909cf86afcac4ff319e109e0f78ddd6392520a87c2993ff1e0cd86590d42f7
rboc-ixc.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a guide to different RBOCs - The US phone network is split into different areas that are controled by RBOCs (Regional Bell Operating Comapnies). For example, if you live in Texas, your RBOC will be SouthWestern Bell. These LECs (Local Excahnge Carriers) and IXCs (Inter eXchange Carriers divide America into different call handling sections.

tags | local, telephony
SHA-256 | bd80bce4df01dae94feca9e4cbc900882827c6b725df6071c315f536eacb89a7
mm1admin.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

advanced guide to meridian mail administration, call routing etc via meridian adminstation tool (MAT) aswell as ESN analysis, and MIRAD built in conference loops.

tags | telephony
SHA-256 | 2baad51dc964ac0856e14493d9de2b3b2d4d22472fd36b219d3b5d27df8b7064
dc_sysad.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a very old file hybrid wrote for darkcyde when it first started in 97 - brief guide to some administration box in a voicemail system.

tags | telephony
SHA-256 | a6b102f043e4e34adfc77a8f4b2c85f9445f76a83df3d032af8121068d565d03
dc_line.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

introduction to line attenuation. - A transmission line can be considered as a conductor, or a group of conductors, with suitable insulating materials, whose function is to carry electronic information signals.

tags | telephony
SHA-256 | d8d65a9174430a73a042a12eb850b407a47b6fa7d67f9d6e483d12d3ead33813
dc_ionic.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to ionica class services such as *43#. (old).

tags | telephony
SHA-256 | c5bd48016784f65de74d39d1a50520dd7634b4b13541d65f2aff0d03f4a6b397
dc_btpag.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

old file on a vulnerabilty in BT easyreach pagers.

tags | telephony
SHA-256 | c700ac591d27aa9fb3383bcfcfe076d742d17cc06df85401de347382f920061b
bcss.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

basic guide to CCS (Common Channel Signalling) and the SS7 network.

tags | telephony
SHA-256 | f4fe807aa75419b1c1d8228c5cd3cabe9172e73be9089f927ec4716c7b2f0962
audix.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

very brief guide to using audix voicemail systems (old).

tags | telephony
SHA-256 | 835a363a0bad0b9392d21318e46762edb76ae50ba4198afd786b207cacf0219e
9x_tel.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

introduction to the digital phone network. - Analogue systems and techniques, Basic network structures, Basic exchange structures, centrex, FDM hierarchy, PCS services, signalling, SPC, trunking, ACD, ADSL, ATM, digital centrex, CCITT parts.

tags | telephony
SHA-256 | d2e0b0c4150823e03f2c18945456897d2a3ca52f6dc857b195f626c03fa11217
9x_swr8.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to the switched route of an 8oo number via the means of SS7 network protocols. also information on DSAC(dial service admin center).

tags | telephony, protocol
SHA-256 | 220b86d49b3fc6c96f1c7ea9d4b3dd63bec785bbccf620093c36e68705940e40
9x_scntp.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to uk prefix assignments, including uk toll-free prefixes. - usefull for scanning, spunged from oftel.

tags | telephony
SHA-256 | 770b3014436d291933bfc943457579e27a8951e5f57cf3c26718ca8926119475
9x_lmpt.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to latitude meetingplace teleconferencing. - Meeting Place is a powerful teleconferencing system designed to accommodate up to 120 ports in any combination of simultaneous conference calls.

tags | telephony
SHA-256 | 02413e0f5bd47a3d86f63f9296f758c0c0992c93e1855eaa708dffbaf3718507
9x_gets.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

GETS (Government Emergency Telecommunications System) - Since the begining of telecommunications, goverments around the world have always had their own secure voice and data networks. These secret networks have always served many purposes for government and military organistaions.

tags | telephony
SHA-256 | cc46de7475a686d85616d54b70db7ac998ccf2c8f48ee3d098804807fcd336c5
9x_dcom.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to new digital telcoms - Switching Hierarchys, North American Digital Hierarchies, The Local Subscriber Loop and various other digitaly derived telcom info.

tags | local, telephony
SHA-256 | 7de56b697a52773d920f7a91309a1ec034564102e14dca0a72f5d620bf68b882
9x_cit.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

CTI (Computer-Telephony-Integration) - CTI stands for Computer Telephony Integration, the term covers a vast range of different technologys, from single user modem integration pacages to vast three-tier architectures for call-centres.

tags | telephony
SHA-256 | 05ffbebe5244763192d49793b38a1b169d2c76f527235d3573c3547e4f077f78
wb900.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a guide to the BT WB900 unit. - WB9OO is a system designed by BT to split a line into two carriers. This way two seperate BT customers can use the same line with privacy, in other words two seperate incoming/outgoing calls can be made on 1 subscriber loop similtaniously.

tags | telephony
SHA-256 | cb9e51cddf2dabb8ed811cc676abcb10559ec38bb0f2fbccb6bb0266062fcb5f
netserve.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

brief article explaining different commands etc on the U.S Robotics NetServers which are becomming incresingly popular. These servers are an extreame sercutity risk to any network that uses them for network managment, they essentialy give whoever has administrator access _total_ control over its surrounding network.

tags | paper
SHA-256 | d02357ba9581b3dad1b56ebeccdec08e451d1a441e354506566480a440a693f7
swtchhst.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a brief guide to the evolution of switching systems, from electromechanical switches to present day digital switches. - very brief.

tags | telephony
SHA-256 | a702810609512317bf0c37f09ea85296f68989fcb6795483dd6343c33f369b73
autodin.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

government and military defense telecommunications networks. an overview of various networks that are deployed by the military in the event of national emergency or covert communication. autodin and the more contemporary dsn networks.

tags | telephony
SHA-256 | bf17d5ecd745c0c48104c2d4f495f40ab342f6375a62691f5b7d24950c7ce2a5
mer-ninj.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

hacking meridian mail, ninja style.. a brief introduction to some of the efffective methods that can be used to gain access to a meridian mail voice mail network. written from both an attack and defense perspective.

tags | telephony
SHA-256 | a2cd05576d0d0a5638ca0ce6a96aea57eb36657b30511d1216d8d128ae7b65f1
clid-cid.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

defeating the caller-id system with simple but effective stealth. a guid to routing your call through the international pstn ninja style. describes some methods that could be used to effectivly block/cloak the origionating point code of your call, aswell as technical information on clid, and cli data transmission bursts. written for f41th magazine.

tags | telephony
SHA-256 | 6a710385a4c995edc29e8c654b689cd6df9fc0ada572b3c521fa33c8bae65079
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close