Technical information

Introduction
2-6 Issue 7 June 2001
If the system allows uninterrupted, continuous access, a war dialer
can crack a 6-digit code within 6 hours. The codes are then
distributed via bulletin boards or pirated voice mailboxes, or are sold
to call sell operators. Some systems hang up after a specified
number of invalid access attempts, thereby extending the amount of
time required to crack the code. However even if a hacker is
disconnected, he or she may call back repeatedly in an attempt to
crack the code.
Network-Based Activities
Shoulder Surfing
Network hackers use video cameras in airports supposedly to take
pictures of their family, but they are actually taking pictures of people
using their calling cards. Hackers may also use an audio tape
recorder to capture calling card numbers as they are spoken to an
operator. This technique is known as Shoulder Surfing.
Social Engineering
Social Engineering is a con game hackers frequently use. It is
sometimes referred to as Operator Deceit. The success of this con
requires gullibility or laxity on the part of the operator or employee,
of which the hacker takes full advantage.
For example, hackers call an employee, claim to have the wrong
extension number, and ask to be transferred back to the operator.
The call looks to the operator like an internal call. The hacker then
asks for an outside line. Often, because operators do not know any
better, they will connect the hacker to an outside line.
Another example of social engineering is a hacker calling the
operator and pretending to be a telephone maintenance repair
person. They make statements like: I am a qualified telephone
repairman testing your lines. Please transfer me to 900 or 9#; or I
need to verify your DID number range. An untrained operator may
provide the requested transfer or information, giving the hacker
more ammunition with which to crack your system.
Dumpster Diving
Hackers obtain switch and security information by browsing through
company trash cans. They are looking for discarded phone bills,
corporate phone directories, and access codes. The found
information can be used to make fraudulent calls.
Alternate Carrier Access
If your system is not secure, hackers can dial out by using carrier
codes that bypass routing restrictions you have placed on your
primary carriers features.