Hot News On The Net   »   Emma Watson will enter Brown University | Erin Andrews video peep | Tour de france stage 17 results | So you think you can dance results july 23 | Michael Jackson Memorial Booklet Program
Featured Posts
Basic Tutorials
Downloads
DOWNLOADS
Browsers
Recent Articles

Wireless Hacking And Phreaking

This is very short tutorial , I made it very short because I know the Security addicts are bit lazy like me.

We 'll Discuss

*) What is wireless hacking and what is phreaking ?
*) Do they come under Black Hat hacking ?


What Does Wireless hacking Mean ?

In security breaches, wireless hacking is the unauthorized use or penetration of a wireless network

Wireless network refers to any type of computer network that is wireless, and is commonly associated with a telecommunications network whose interconnections between nodes is implemented without the use of wires.

It can also be Wireless Lan , Bluetooth communication etc ..

Wireless hacking includes Sniffing the networks ultimately gaining some information of remote host, Gaining access on to remote box via few wireless hacking tools.


What does phreaking mean ?


Phreaking is simply defined as taking control over phone systems.

It is an act which is considered slightly as Black Hat hacking.

The main aim of Phreakers will be making long distance calls for free, gaining access on to telecommunication networks etc..

Phreaks soon started building devices which could produce these 'master tones' and thus allowed them to explore the side of the network that were not available to the general subscriber base. These devices became known as blue boxes. Next came the red box which tricked the phone station into believing that a coin had been dropped into a pay-phone when actually none had been fed.

Modern phreaking often involves taking advantage of companies' Private Branch Exchange systems, especially those which are accessible via toll-free numbers, to make phone calls. Another target for phreaks are the country direct toll-free numbers. These are telephone numbers in one country which connect to a number in another country, often used to enable people to speak to an operator in their home country (and language), but also used by larger corporations and government organizations. Such systems are often used by phreaks, enabling easy collaboration between people from different countries (e.g. via voice mail systems), often allowing access to toll-free numbers in other countries (e.g. via PBX features) and thus a range of opportunities for new systems to abuse, occasionally allowing blue-boxing if they connect to a country with older switching gear. Phreaks have also taken a new interest in development of VoIP services and open source PBX's like Asterisk that interface with VoIP protocols, as well as the VXML language.


Relation Between Wireless hacking And Phreaking ?

There is some similarity between them , but if we go in deep they are quiet different from each other.

Do They Come Under Black Hat hacking ??

They both can be legal and illegal in many ways.
How we use the knowledge of wireless hacking and phreaking will obviously play a key role.

This is very short tutorial. If you have any queries , shoot them up replying to this post.

Bookmark and Share
Share and Enjoy:

0 comments for this post

Leave a reply

Write your message here.
Please leave your Email Id so that I can contact you.
Thanks for your Valuable Suggestion,

We will keep You Updated...
Sign up to receive breaking news
as well as receive other site updates!

subscribe via email:


Your information will not be shared. Ever.
Advertise Here
RevolutionWooThemesElegant Themes
Theme ForestGorillaThemesWP WebHost
Upcoming Events
RevolutionWooThemesElegant Themes
Theme ForestGorillaThemesWP WebHost
Site Stats
Find Me
Follow SpicyTricks on Twitter. Only interesting tweets are shared

Subscribe and join my readers to keep up-to-date Issue in Feedburner

Our Friends