All Activity

This stream auto-updates   

  1. Today
  2. when you're not certain about any of these hackers which is why 94% of our customers recommended grayhathackin @ gmail . com to other people 100% money back guaranteed Our staffs are veterans with cutting edge insight when it comes to executing hacks with an amazing track record of 96% success rate in all executed exploits since 2009 till date "’2019”. Discrete, secure and efficient satisfaction of our customers is our only goal and we will take your secrets to the grave with us. Our services includes but is not limited to the following Teaches how to hack anything, bypass any security system University grade hacking Facebook hacking, Gmail hack Whats app hack And Other social network Phone hacks and monitoring Clearing credit card debt, Clearing mortgages Fixing credit scores Burner number hack Website hack Bank account hack Erase criminal records Hack airlines and boom cheaper tickets American citizenship HACKING IS ALL WE DO skype: baddy kay whtpp:+1 682 302 5207 icq : 659 839 138
  3. Yesterday
  4. Last week
  5. I believe YATE has some sort of implementation, not sure if it’s part of the public open source release though.
  6. I don’t believe he is ignoring you, just banned from the forum for some reason. Reach out to me via PM and I can get you in touch.
  7. It is with deep regret, that I must announce that the conference (to the general public) is now dead. Attempts have been made to make a conference relevant again but the regulars have seemed to move on. As one of the regulars from all the way in March 2015, I had a fun time conversing with people such as Thoughtphreaker, whose experience has taught me that stuff can happen over something so simple, and gewt, whose expertise in the Meridian allowed me to understand command prompts much more better. But as they decided to make everything private, all good things must come to an end. From 631 to 510, thank you guys so much for coming.
  8. Earlier
  9. ...And they just replaced the cabinet late last week. I got to admire their creative use of yellow "CAUTION HAZARDOUS AREA" ribbon as an interim binder to hold the cabinet shut! Now we'll see how long this one lasts before somebody else drives into it.
  10. Thanks, that looks like an excellent starting point for further research. My earlier research had turned up a lot of mentions of SIP-T and ISUP, and it wasn't clear to me if those correspond to all of SS7, or just certain aspects, like call set-up. None of these pages seems to mention SigTran, which is a mapping of SS7 to TCP/IP. I wonder why that is....
  11. Asterisk has the ability to use SS7, so with a pair of computers, each running asterisk and containing a T1 card, you could have an SS7 connection in your own home. I've never done it myself, but google is your friend. This looks like a good website to start with: https://www.voip-info.org/asterisk-ss7/
  12. I'd like to learn about SS7 and SigTran, but the protocol documents like most protocol documents, are not written as introductory texts. And I prefer to learn hands-on. I realize that I'm unlikely to find some kind of open-access SS7 portal connected to the honest-to-god PSTN, but I'm wondering if there are simulators available, or if anyone has any ideas about alternatives. Thanks....
  13. Awesome! Really interesting.
  14. I remember doing phone directories of odd and old weird numbers and even payphone numbers. I actually was working on compiling an updated version of the original some numbers thread on binrev but had a drive fail during that time. I'm honestly surprised no one has attempted to do anothee phone phreaking directory especially with the technology and communication being where it's at today.
  15. Hey guys, I've been reading this forum for about 8 years as a guest and I just joined as a member and I'm really interested in these strange phone numbers. I've saved a lot of my favorites over the years and I've started a subreddit over at reddit.com/r/weirdnumbers where I've posted a lot of them. The subreddit is open to new submissions and I've already put a lot of my favorites from this forum there, but if you guys have any others in mind, feel free to share them there as well And this is not just a promotion post for my page, I'm also interested in reviving this one with regular scans I'm going to be posting from now on. I love this forum and its a shame that this thread is mainly dead now because back in the day (2012-2015), I'd come on here every month and find tons and tons of new stuff. Let's make that happen again! ThoughtPhreaker, many of the best posts here and stuff I've shared at r/WeirdNumbers came from your amazing work and scans. You're an inspiration, man, keep up the good work and feel free to join the subreddit. Meanwhile, I'll be here waiting for more of your gems and hopefully posting some new ones myself! I finish off by posting a few of my favorites: All circuits are busy, chopped up message: 580-251-9131 Year 2000 Testing Number (odd): 212-255-9901 Hang up now: 212-251-9901 Live Feed of Fox News: 212-301-3799 Telephone Number, please try again: 516-626-9901 All Channels are normal: 310-347-3277 This number is IN service! : 303-651-0002
  16. I looked up how to hack fire alarm and the first site pops up like TA-DA!
  17. 510-940-0102 as of a couple weeks ago, last time I was on.
  18. Number please?
  19. If anyone was wondering who's been "sandbagging" the line for the last 3 nights, it's just me.
  20. Because of road construction early last year, the phone company installed a new SLC servicing my neighborhood. Not a week after they did somebody hit it with their car, damaging the cabinet and (presumably) breaking the bolts holding it onto the concrete pedestal (seriously, I go to close the door and you can literally rock it back and forth) and it's been damaged since. Lately my line has become intermittant so I called it into repair service last week. They're just now getting out there to fix it as I write this, over a week later. Gee, under Ma Bell they would have been out there working on it within maybe 20 minutes of your call. Centurylink doesn't care about their own outside plant equipment I guess.
  21. Very nice discovery. Thank you for sharing.
  22. Pinned! This is definitely of interest to many people and shouldn't be buried over time.
  23. I have a recording of DTMF tones but I can't find anywhere to decode them. I've tried decoding by ear, but I have no sensory recall, so after a couple of notes, I'm lost. Any ideas on how to decode?
  24. I've worked on this project for quite a while, and have discussed it on the conference, but have never officially posted recordings on here. There is a large presence of analog and electromechanical switches still in service in the former Soviet countries. The following are 3 recordings of me successfully boxing some of these switches: East Ukraine, ATSK Crossbar Using SF (in-band 2600 dial pulse) Signaling -- seizing and SFing another number: http://technotite.com/SF-exampUKR1.wav West Russia, Crossbar Using SF (in-band 2600 dial pulse) Signaling -- seizing and SFing another number: http://technotite.com/SF-exampRUS1.wav East Ukraine, Crossbar Using R1.5 (weird bi-directional MF protocol using R1 tones, used in CIS countries) - seizing and MFing another number: http://technotite.com/R1.5-examp1.wav
  25. indeed... I'm sure it's not what I have saved... do share.
  26. Back in 2007, I designed a blue box for use with my ProjectMF server, a telephone PBX switch that allows phone phreaking in a manner similar to the old days of in-band signalling - MF and SF audio tones. That blue box was based upon the PIC 12F683 8-pin DIP microcontroller. Phil Lapsley ("Exploding the Phone") designed a PCB board for it and many aspiring phreaks have built the circuit over the years. One issue with the original code was that it was written in PicBASIC Pro. PicBASIC had a "tone" command that could produce two simultaneous tones if a 20MHz oscillator was used. However, the tone generation never sounded quite right. David Griffith, a vintage telephony and computer buff, decided to re-write my code in C. He followed the same general design principles as I used in my 2007 box, but added some very impressive features and - most importantly - the tones sound great! The code now runs on a modern 8-bin ATTINY85 microcontroller. Dave has also designed circuit boards for the chip and circuit. However, I found the circuit is straightforward enough to build on protoboard, which allowed me to produce this replica of the blue box featured on the first page of the famous October, 1971 Esquire magazine article which popularized phone phreaking. Dave's code may be found at: https://gitlab.com/DavidGriffith/blue... Manual, schematic and and precompiled .hex files at: https://661.org/proj/bluebox/ df99
  27. Back in 2007, I designed a blue box for use with my ProjectMF server, a telephone PBX switch that allows phone phreaking in a manner similar to the old days of in-band signalling - MF and SF audio tones. That blue box was based upon the PIC 12F683 8-pin DIP microcontroller. Phil Lapsley ("Exploding the Phone") designed a PCB board for it and many aspiring phreaks have built the circuit over the years. One issue with the original code was that it was written in PicBASIC Pro. PicBASIC had a "tone" command that could produce two simultaneous tones if a 20MHz oscillator was used. However, the tone generation never sounded quite right. David Griffith, a vintage telephony and computer buff, decided to re-write my code in C. He followed the same general design principles as I used in my 2007 box, but added some very impressive features and - most importantly - the tones sound great! The code now runs on a modern 8-bin ATTINY85 microcontroller. Dave has also designed circuit boards for the chip and circuit. However, I found the circuit is straightforward enough to build on protoboard, which allowed me to produce this replica of the blue box featured on the first page of the famous October, 1971 Esquire magazine article which popularized phone phreaking. Dave's code may be found at: https://gitlab.com/DavidGriffith/blue... Manual, schematic and and precompiled .hex files at: https://661.org/proj/bluebox/ df99
  1. Load more activity