Wireless Hacking And Phreaking
This is very short tutorial , I made it very short because I know the Security addicts are bit lazy like me.
We 'll Discuss
*) What is wireless hacking and what is phreaking ?
*) Do they come under Black Hat hacking ?
What Does Wireless hacking Mean ?
In security breaches, wireless hacking is the unauthorized use or penetration of a wireless network
Wireless network refers to any type of computer network that is wireless, and is commonly associated with a telecommunications network whose interconnections between nodes is implemented without the use of wires.
It can also be Wireless Lan , Bluetooth communication etc ..
Wireless hacking includes Sniffing the networks ultimately gaining some information of remote host, Gaining access on to remote box via few wireless hacking tools.
What does phreaking mean ?
Phreaking is simply defined as taking control over phone systems.
It is an act which is considered slightly as Black Hat hacking.
The main aim of Phreakers will be making long distance calls for free, gaining access on to telecommunication networks etc..
Phreaks soon started building devices which could produce these 'master tones' and thus allowed them to explore the side of the network that were not available to the general subscriber base. These devices became known as blue boxes. Next came the red box which tricked the phone station into believing that a coin had been dropped into a pay-phone when actually none had been fed.
Modern phreaking often involves taking advantage of companies' Private Branch Exchange systems, especially those which are accessible via toll-free numbers, to make phone calls. Another target for phreaks are the country direct toll-free numbers. These are telephone numbers in one country which connect to a number in another country, often used to enable people to speak to an operator in their home country (and language), but also used by larger corporations and government organizations. Such systems are often used by phreaks, enabling easy collaboration between people from different countries (e.g. via voice mail systems), often allowing access to toll-free numbers in other countries (e.g. via PBX features) and thus a range of opportunities for new systems to abuse, occasionally allowing blue-boxing if they connect to a country with older switching gear. Phreaks have also taken a new interest in development of VoIP services and open source PBX's like Asterisk that interface with VoIP protocols, as well as the VXML language.
Relation Between Wireless hacking And Phreaking ?
There is some similarity between them , but if we go in deep they are quiet different from each other.
Do They Come Under Black Hat hacking ??
They both can be legal and illegal in many ways.
How we use the knowledge of wireless hacking and phreaking will obviously play a key role.
This is very short tutorial. If you have any queries , shoot them up replying to this post.
Related posts:
If you enjoyed this article, subscribe to receive more great content just like it.
0 comments for this post
Leave a reply
Write your message here.
Please leave your Email Id so that I can contact you.
Thanks for your Valuable Suggestion,
- Making a blog at blogspot
- Blog Setting
- How to backing up template
- How to backing up widgets
- How to changing template
- Make a Post Summary (Read more)
- Blog Comment send to @mail
- Adding search engine to blog
- Making a drop down menu
- Add google talk to blog (1)
- Making a News Paper Style Drop Caps
- Adding Recent Post & Recent Comments
- Adding Yahoo!Massenger icon
- Adding Google talk (2)
- Adding yahoo! Massenger Emoticons (1)
- Fix error "Widget IDs should be unique"
- Making a Table of Content
- Adding shoutbox
- Adding user online tracker
- Adding Statistic & tracker
- Adding digg button to post page
- Upload image to image hosting
- Making a Logo and image button
- Adding Favicon to URL address
- Adding a Clock to blog
- Removing the number of label