Search the Community

Showing results for tags 'caller id'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General
    • General.Rules, Guidelines and Announcements
    • Nubie HQ
    • General Hacking
    • Old Skool Phreaking
    • LinkZ
    • Hacker Media
    • Hacker Meetings
    • Programming/Code
    • HAM Radio/Hardware Hacking
    • Retail Hacking
    • Urban Exploration And Social Engineering
    • *NIX
    • Graphic Designs
  • BinRev members section
    • Assorted Projects
  • Off-Topic
    • General Chat
    • Scratchytcarrier's Joke-A-Thon

Calendars

  • Community Calendar

Blogs

  • StankDawg: Howling@the.moon
  • Brokennode
  • RedAnthrax the BLOG!!!
  • CETX_var_log
  • The Hillbilly Hacker
  • Exit Status One
  • Bit Bucket
  • 1337_snic's Blog
  • Kotrin's Blog
  • LibbsSecurity E|Hacker Network Security Blog
  • R4p1d's Blog
  • Ohm's Blog
  • Letting the smoke out
  • 1337_snic's Blog
  • 1337_snic's Blog
  • jeremy_.html
  • tekio's blog
  • lattera's Blog
  • The Microwave Rider

Categories

  • Audio
    • Internet Radio shows
    • Miscellaneous
  • Zines
    • Phrack
    • BR Magazine
    • PoC||GTFO
  • Video
    • HackTV

Found 2 results

  1. Hello all, nubie alert. I recently was able to setup the war dialer ModemScan on my old Win XP eMachine, and have just been dialing known numbers like my cell phone to see what happens. When I dial out from my PC to my cell, my home phone number appears on my cell, when answered it is empty air with some very very faint beeping in the background. Now, I've never took it into consideration before, but was this always true when war dialing in the past? If you were war dialing from home that was the number that appeared to everyone in the dial list? I guess that's why going to some other location to war dial was the preferable thing to do? Or not calling locally either I suppose? I might be even using the wrong tool for just general old school war dialing, since it seems ModemScan is just that, a scanner for open modems, although it does give a log for BUSY, NO ANSWER, etc. I thought I had seen in some penetration test book that going into the Windows Modem options and putting *67 in the "dial for outside local calls" would hide the caller ID, but I've not had that happen so far in my experiments. Basically my question boils down to is, if you are going to war dial from home, then there's no means of hiding the fact that its your home phone number you are dialing from?
  2. Introducing the Toll-Free Anonymizer Due to concerns of blowback from participants of the World Wide Wardial Project, I decided to make a "telephone condom" for those who wish to explore the depths of in-WATS. The Anonymizer is a very simple diverter service, which provides dialtone for placing US toll-free calls. What makes this service special is that every call is automatically placed with a completely random Caller*ID. The Anonymizer takes an exhaustive list of valid US npa-nxx pairs, and couples them with a random 4-digit subscriber number, to create a valid-looking Caller*ID associated with a random city somewhere in America. Only valid in-service exchanges from the 50 US states are used. This service combines a free DID from IPKall with Toll-Free termination from Alcazar Networks. Because of these free services, this system does not cost me anything to operate, and I invite anyone to use it, as much as you like. By using this system, you agree to obey all applicable laws. To use this service, simply dial: 1-425-606-3712 At the dialtone, enter your US toll-free number, including the country code (1): 1-8xx-nxx-xxxx Your anonymous call will then immediately connect. Once the dial-sequence has been completed, my server will remove itself from the data-stream by remotely bridging the SIP connections between IPKall and Alcazar, providing a crystal-clear call experience. If you have access to an Anonymous SIP client such as Ekiga, you can use this service by placing calls directly to my server, using a SIP URI such as: sip:18004444444@quickspoof.kb3tpa.pgh.pa.us This entire system is beautifully simplistic, and the pertinent parts of the source code are as follows: ; Toll-Free Anonymizerexten => 14256063712,1,Goto(tollfree,disa,1)exten => _1800NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1822NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1833NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1844NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1855NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1866NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1877NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1880NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1881NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1882NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1883NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1884NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1885NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1886NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1887NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1888NXXXXXX,1,Goto(tollfree,${EXTEN},1)exten => _1889NXXXXXX,1,Goto(tollfree,${EXTEN},1)[tollfree]exten => disa,1,Answer()exten => disa,n,DISA(no-password,tollfree)exten => _1NXXNXXXXXX,1,Set(CALLERID(all)=${CURL(http://quickspoof.kb3tpa.pgh.pa.us/api/random_cid.php)})exten => _1NXXNXXXXXX,n,Dial(SIP/${EXTEN}@tollfree.alcazarnetworks.com) The Random Caller*ID number is generated by a PHP script located at: http://quickspoof.kb3tpa.pgh.pa.us/api/random_cid.php The source code for this script is available at: http://quickspoof.kb3tpa.pgh.pa.us/api/random_cid.php.txt If you find this service useful, I would encourage you to contribute back to the community by adopting an exchange for the World Wide Wardial project.