Google Maps Search

Phreaking

Phreaking is a slang term coined to describe the activity of a subculture of people who study, experiment with, or explore telecommunication systems, like equipment and systems connected to public telephone networks. The term "phreak" is derived from the words "phone" and "freak". It may also refer to the use of various audio frequencies to manipulate a phone system. "Phreak", "phreaker", or "phone phreak" are names used for and by individuals who participate in phreaking. Additionally, it is often associated with computer hacking. This is sometimes called the H/P culture (with H standing for Hacking and P standing for Phreaking). information on this site is for educational purposes only! Wyretap Network ©2007 - 2010

Disclaimer: The information on this site is for educational and entertainment purposes only. It is not intended to encourage or teach you to break the law, that's what TV is for, albeit in a very flawed manner. The owner(s) of this website will not be held liable for anything you choose to do with the information contained on this site. If you want to learn how to rape, murder, loot, and commit acts of terror on a monumental scale, well, you won't find it here. Instead, tune-in to your nightly news and take a lesson from your 'elected' 'leaders'.

Social engineering techniques and terms

All social engineering techniques are based on specific attributes of human decision-making known as cognitive biases.[1] These biases, sometimes called "bugs in the human hardware," are exploited in various combinations to create attack techniques, some of which are listed here:
Pretexting
Pretexting is the act of creating and using an invented scenario (the pretext) to persuade a targeted victim to release information or perform an action and is typically done over the telephone. It is more than a simple lie as it most often involves some prior research or set up and the use of pieces of known information (e.g. for impersonation: date of birth, Social Security Number, last bill amount) to establish legitimacy in the mind of the target. [2]
This technique is often used to trick a business into disclosing customer information, and is used by private investigators to obtain telephone records, utility records, banking records and other information directly from junior company service representatives. The information can then be used to establish even greater legitimacy under tougher questioning with a manager (e.g., to make account changes, get specific balances, etc).
As most U.S. companies still authenticate a client by asking only for a Social Security Number, date of birth, or mother's maiden name, the method is effective in many situations and will likely continue to be a security problem in the future.
Pretexting can also be used to impersonate co-workers, police, bank, tax authorities, or insurance investigators — or any other individual who could have perceived authority or right-to-know in the mind of the targeted victim. The pretexter must simply prepare answers to questions that might be asked by the victim. In some cases all that is needed is a voice that sounds authoritative, an earnest tone, and an ability to think on one's feet.
Phishing
Main article: Phishing
Phishing is a technique of fraudulently obtaining private information. Typically, the phisher sends an e-mail that appears to come from a legitimate business—a bank, or credit card company—requesting "verification" of information and warning of some dire consequence if it is not provided. The e-mail usually contains a link to a fraudulent web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card's PIN.
For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user’s account was about to be suspended unless a link provided was clicked to update a credit card (information that the genuine eBay already had). Because it is relatively simple to make a Web site resemble a legitimate organization's site by mimicking the HTML code, the scam counted on people being tricked into thinking they were being contacted by eBay and subsequently, were going to eBay’s site to update their account information. By spamming large groups of people, the “phisher” counted on the e-mail being read by a percentage of people who already had listed credit card numbers with eBay legitimately, who might respond.
IVR or phone phishing
This technique uses a rogue Interactive voice response (IVR) system to recreate a legitimate sounding copy of a bank or other institution's IVR system. The victim is prompted (typically via a phishing e-mail) to call in to the "bank" via a (ideally toll free) number provided in order to "verify" information. A typical system will reject log-ins continually, ensuring the victim enters PINs or passwords multiple times, often disclosing several different passwords. More advanced systems transfer the victim to the attacker posing as a customer service agent for further questioning.
One could even record the typical commands ("Press one to change your password, press two to speak to customer service" ...) and play back the direction manually in real time, giving the appearance of being an IVR without the expense.
The technical name for phone phishing, is vishing.
Baiting
Baiting is like the real-world Trojan Horse that uses physical media and relies on the curiosity or greed of the victim.[3]
In this attack, the attacker leaves a malware infected floppy disk, CD ROM, or USB flash drive in a location sure to be found (bathroom, elevator, sidewalk, parking lot), gives it a legitimate looking and curiosity-piquing label, and simply waits for the victim to use the device.
For example, an attacker might create a disk featuring a corporate logo, readily available off the target's web site, and write "Executive Salary Summary Q2 2009" on the front. The attacker would then leave the disk on the floor of an elevator or somewhere in the lobby of the targeted company. An unknowing employee might find it and subsequently insert the disk into a computer to satisfy their curiosity, or a good samaritan might find it and turn it in to the company.
In either case as a consequence of merely inserting the disk into a computer to see the contents, the user would unknowingly install malware on it, likely giving an attacker unfettered access to the victim's PC and perhaps, the targeted company's internal computer network.
Unless computer controls block the infection, PCs set to "auto-run" inserted media may be compromised as soon as a rogue disk is inserted.
Quid pro quo
Quid pro quo means something for something:
An attacker calls random numbers at a company claiming to be calling back from technical support. Eventually they will hit someone with a legitimate problem, grateful that someone is calling back to help them. The attacker will "help" solve the problem and in the process have the user type commands that give the attacker access or launch malware.
In a 2003 information security survey, 90% of office workers gave researchers what they claimed was their password in answer to a survey question in exchange for a cheap pen.[4] Similar surveys in later years obtained similar results using chocolates and other cheap lures, although they made no attempt to validate the passwords.[5]
Other types
Common confidence tricksters or fraudsters also could be considered "social engineers" in the wider sense, in that they deliberately deceive and manipulate people, exploiting human weaknesses to obtain personal benefit. They may, for example, use social engineering techniques as part of an IT fraud.
The latest type of social engineering techniques include spoofing or hacking IDs of people having popular e-mail IDs such as Yahoo!, GMail, Hotmail, etc. Among the many motivations for deception are:
Phishing credit-card account numbers and their passwords.
Hacking private e-mails and chat histories, and manipulating them by using common editing techniques before using them to extort money and creating distrust among individuals.
Hacking websites of companies or organizations and destroying their reputation.

The Real ID Coming Soon!!!

Tuesday, February 9, 2010

Cordless Phone frequencies

46/49MHz Cordless Phone frequencies

Here are the frequencies for the first generation 46/49MHz cordless phones.

Channel Handset Frequency Base Frequency
1 49.670 46.610
2 49.845 46.630
3 49.860 46.670
4 49.770 46.710
5 49.875 46.730
6 49.830 46.770
7 49.890 46.830
8 49.930 46.870
9 49.990 46.930
10 49.970 46.970

900MHz Cordless Phone Frequencies

Second generation 900MHz cordless phones have been allocated the frequencies between 902-928MHz, with channel spacing between 30-100KHz.

Following are some examples of the frequencies used by example cordless phones:

Panasonic KX-T9000 (60 Channels) Base Frequency: 902.100 - 903.870 Handset Frequency: 926.100 - 927.870

Channel Base Frequency Handset Frequency Channel Base Frequency Handset Frequency
01 902.100 926.100 31 903.000 927.000
02 902.130 926.130 32 903.030 927.030
03 902.160 926.160 33 903.060 927.060
04 902.190 926.190 34 903.090 927.090
05 902.220 926.220 35 903.120 927.120
06 902.250 926.250 36 903.150 927.150
07 902.280 926.280 37 903.180 927.180
08 902.310 926.310 38 903.210 927.210
09 902.340 926.340 39 903.240 927.240
10 902.370 926.370 40 903.270 927.270
11 902.400 926.400 41 903.300 927.300
12 902.430 926.430 42 903.330 927.330
13 902.460 926.460 43 903.360 927.360
14 902.490 926.490 44 903.390 927.390
15 902.520 926.520 45 903.420 927.420
16 902.550 926.550 46 903.450 927.450
17 902.580 926.580 47 903.480 927.480
18 902.610 926.610 48 903.510 927.510
19 902.640 926.640 49 903.540 927.540
20 902.670 926.670 50 903.570 927.570
21 902.700 926.700 51 903.600 927.600
22 902.730 926.730 52 903.630 927.630
23 902.760 926.760 53 903.660 927.660
24 902.790 926.790 54 903.690 927.690
25 902.820 926.820 55 903.720 927.720
26 902.850 926.850 56 903.750 927.750
27 902.880 926.880 57 903.780 927.780
28 902.910 926.910 58 903.810 927.810
29 902.940 926.940 59 903.840 927.840
30 902.970 926.970 60 903.870 927.870

GE model 26938GE1-C

Channel Base Frequency Handset Frequency Channel Base Frequency Handset Frequency 926.7
01 923.7 925.9 21 924.7 926.9
02 923.8 925.95 22 924.75 926.95
03 923.8 926.0 23 924.8 927.0
04 923.85 926.05 24 924.85 927.05
05 923.9 926.1 25 924.9 927.1
06 923.95 926.15 26 924.95 927.15
07 924.0 926.2 27 925.0 927.2
08 924.05 926.25 28 925.05 927.25
09 924.1 926.4 29 925.1 927.3
10 924.15 926.35 30 925.15 927.35
11 924.2 926.4 31 925.2 927.4
12 924.25 926.45 32 925.25 927.45
13 924.3 926.5 33 925.3 927.5
14 924.35 926.55 34 925.35 927.55
15 924.4 926.6 35 925.4 927.6
16 924.45 926.65 36 925.45 927.65
17 924.5 37 925.5 927.7
18 924.55 926.75 38 925.55 927.75
19 924.6 926.8 39 925.6 927.8
20 924.65 926.85 40 925.65 927.85

V-Tech Tropez DX900 (20 Channels)

Base Frequency: 905.6 - 907.5 (100Khz spacing) Handset Frequency: 925.5 - 927.4

Channel Base Frequency Handset Frequency Channel Base Frequency Handset Frequency
01 905.600 925.500 11 906.600 926.500
02 905.700 925.600 12 906.700 926.600
03 905.800 925.700 13 906.800 926.700
04 905.900 925.800 14 906.900 926.800
05 906.000 925.900 15 907.000 926.900
06 906.100 926.000 16 907.100 927.000
07 906.200 926.100 17 907.200 927.100
08 906.300 926.200 18 907.300 927.200
09 906.400 926.300 19 907.400 927.300
10 906.500 926.400 20 907.500 927.400

Other 900MHz cordless phones:

AT&T #9120 902.0 - 905.0 & 925.0 - 928.0 MHz
Otron Corp. #CP-1000 902.1 - 903.9 & 926.1 - 927.9 MHz
Samsung #SP-R912 903.0 & 927.0 MHz

2.4GHz Cordless Phone Frequencies

Third generation 2.4GHz cordless phones have been allocated the frequencies between 2.4Ghz and 2.4835Ghz, with a channel spacing of 5MHz.

The 2.4GHz cordless phone frequencies are shared with 802.11b and 802.11g wireless networks.

5.8GHz Cordless Phone Frequencies

Fourth generation 5.8GHz cordless phones have been allocated the frequencies between 5.725Ghz and 5.850Ghz.

It is important to note that some 5.8GHz cordless phones use the 5.8Ghz frequencies only for base-to-handset transmissions, while still using the 2.4Ghz frequencies for handset to base transmissions.

This split-frequency technique saves batter life on the cordless phone handset, because it requires more power to transmit at the higher 5.8GHz frequency than at the lower 2.4Ghz frequency.

The 5.8GHz cordless phone frequencies are shared with 802.11a wireless networks.

Happy FreQing!!!

No comments: