1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Hackers need only your cell number to eavesdrop on your Phone...

Discussion in 'Black Hat SEO' started by originalBanker, Apr 19, 2016.

  1. originalBanker

    originalBanker Junior Member

    Joined:
    Apr 13, 2013
    Messages:
    118
    Likes Received:
    30
    Hi y'all,

    Did you know that hackers need only your cell number to eavesdrop on your phone?

    German security researcher Karsten Nohl, revealed the flaw more than two years ago.

    To prove a point, he hacked a congressman's phone -- albeit with his permission.

    "He could hear any call," said Rep. Ted Lieu (D-CA, 33rd), a privacy advocate, "It could be stock trades... it could be calls with a bank."

    Does anyone on this forum know how to make use of this exploit??

    Thanks...

    Read more here:

    http://www.zdnet.com/article/how-ha...=nl.e589&s_cid=e589&ttag=e589&ftag=TREc64629f
     
  2. Tpati

    Tpati Registered Member

    Joined:
    Sep 12, 2015
    Messages:
    92
    Likes Received:
    40
    I guess it is called phone taping ?
     
    • Thanks Thanks x 1
  3. kahuna74

    kahuna74 Regular Member

    Joined:
    Aug 19, 2014
    Messages:
    270
    Likes Received:
    102
    Gender:
    Male
    Occupation:
    Software Developer
    Location:
    Grand Rapids, MI
    Someone knows, I am sure. And will let you in on it for the right price.
     
    • Thanks Thanks x 1
  4. originalBanker

    originalBanker Junior Member

    Joined:
    Apr 13, 2013
    Messages:
    118
    Likes Received:
    30
    Pati,

    The wire tap received its name because the monitoring connection was an actual electrical tap on the telephone line.

    I do not believe this is what the hackers are doing :)
     
    Last edited: Apr 19, 2016
  5. amoon

    amoon Jr. VIP Jr. VIP

    Joined:
    May 16, 2015
    Messages:
    1,553
    Likes Received:
    814
    Gender:
    Male
    Occupation:
    IM - BHW
    Location:
    Map–Territory
  6. originalBanker

    originalBanker Junior Member

    Joined:
    Apr 13, 2013
    Messages:
    118
    Likes Received:
    30
    This isn?t actually Hacking ? it?s called Phreaking.

    Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore, telecommunication systems.
     
  7. umerjutt00

    umerjutt00 Jr. VIP Jr. VIP

    Joined:
    Oct 28, 2011
    Messages:
    3,826
    Likes Received:
    2,066
    Occupation:
    Ninja
    The article is too vague and doesn't reveal that much information but this is surely shocking.
     
    • Thanks Thanks x 1
  8. pressrelease

    pressrelease Power Member

    Joined:
    Jan 6, 2016
    Messages:
    661
    Likes Received:
    235
    Location:
    Disneyland

    LOL..you nailed it.
     
  9. originalBanker

    originalBanker Junior Member

    Joined:
    Apr 13, 2013
    Messages:
    118
    Likes Received:
    30
    LOL ? ignorance is truly bliss!

    Bank robbery decades ago would have involved criminals physically entering a bank and yes robbing the bank with some show of brutal force - this can still be done today as I?m sure you are aware of.
    In today?s computer age you can still rob a bank but without the physical means, i.e. by hacking into banks accounts.

    Likewise ?Phone Tapping? decades ago would have involved using physical means to yes tap into and listen to an individual?s conversation ? this can still be done today.
    However in today?s computer age you can still apparently listen into an individual?s telephone conversation but without the physical means of tapping!

    And it is this method of ?Phreaking? that I am interested in :)
     
  10. n0de32

    n0de32 Regular Member

    Joined:
    Jan 25, 2010
    Messages:
    201
    Likes Received:
    230
    Occupation:
    IM Scientist
    Location:
    Earth. Mostly.
    Those journalists are usually don't have a clue about the real thing. It always turn out something different when you actually know about the exploit. It's not that easy how they picturized it.

    OP, if you're looking for the exploit, you're at wrong place.
     
    • Thanks Thanks x 1
  11. kahuna74

    kahuna74 Regular Member

    Joined:
    Aug 19, 2014
    Messages:
    270
    Likes Received:
    102
    Gender:
    Male
    Occupation:
    Software Developer
    Location:
    Grand Rapids, MI
    Except that every phone switching system is digital. Voip - Digital. GSM - Digital. So yeah, if you're phreaking in the year 2016 you're hacking.

    Phreaking was originally sending tones down analog lines in order to do fun things. That's dead. IMO, phreaking is dead, and it's just hacking now.
     
  12. mackay22

    mackay22 Regular Member

    Joined:
    Jul 22, 2009
    Messages:
    244
    Likes Received:
    93
    Drew Porters wardriving jeep, budget stingray phone tracker, etc.

    May not be exactly what you're looking for, but should get you started if you really are that way inclined ;)

    Oh and as someone else said, it's not called "phreaking" anymore, bruh ;)
     
    • Thanks Thanks x 1
  13. originalBanker

    originalBanker Junior Member

    Joined:
    Apr 13, 2013
    Messages:
    118
    Likes Received:
    30
    My oh my 'kahuna74', are you and 'Tpati' related!

    Is there a ?special needs? convention in town that I am unaware of??

    Yes, Phreaking does indeed still exist today but as you have correctly pointed out not in its original form-

    http://www.cio.com/article/2995038/...-phone-phreaking-yes-with-android-on-lte.html

    Please also note that Hacking also started out in a primitive form but progressed to the level it is at now in pace with technological advances.

    Please do not enlightening me on what you don?t know, but by all means you are more than welcome to enlighten me on the little you do know :)
     
  14. KHer0

    KHer0 Supreme Member

    Joined:
    Mar 22, 2011
    Messages:
    1,248
    Likes Received:
    1,169
    Occupation:
    Architect
    First, I have no idea about this phreaking thing but I know about hacking. Second, There are thousands of ways to achieve what you are describing in the article. The more complex the system gets, the more it is exposed to vulnerabilities. You are talking basically about 0-day exploit. They are everywhere and they are called 0-days because they are not in the public yet. It can be a 0-day in the OS ( Android - Windows Phone or iOS ) it can be in satellites software ... etc Thousands of opportunities thereIt's the same as hacking any pc that has IE 8 installed. It's exploitable .... However, you can't get anything useful from it, because if the exploit is published, then it's not a 0-day anymore Hope this helps
     
  15. abhi007

    abhi007 Jr. VIP Jr. VIP

    Joined:
    Aug 31, 2010
    Messages:
    5,716
    Likes Received:
    3,889
    Location:
    Theatre of dreams :)
    This is lounge type material...make sure you request a moderator to get this moved in the lounge section.
     
  16. jigsaw23

    jigsaw23 Registered Member

    Joined:
    Aug 27, 2015
    Messages:
    89
    Likes Received:
    38
    Gender:
    Male
    Occupation:
    R&D
    Location:
    Pluto
    Yeah the report was first published in 2014

    It was found by two german researchers working separately
    Karsten Nohl and other Tobias Engel

    The vulnerabilities were first published publically in 2008
    SO it has been around for a quite a long time.

    How do you think Govt agencies snoop in ?

    It is done by exploiting the flaws in Signalling System No. 7 (SS7) that has been around since 1980s

    If you want a detailed explanation go watch this video where the first vulnerability was publicised by Tobias Engel

    https://www.youtube.com/watch?v=q0n5ySqbfdI

    AND IF ANYONE KNOWS HOW TO MAKE THIS EXPLOIT.
    DO NOT SEARCH FOR THEM. STAY AWAY.
    OTHERWISE YOU WILL BE AN EXAMPLE OF CURIOSITY KILLS THE CAT

    EDIT
    PS
    i agree with abhi007
    ask mods to move this to lounge section.
     
    • Thanks Thanks x 1
    Last edited: Apr 20, 2016
  17. Conor

    Conor Jr. VIP Jr. VIP

    Joined:
    Nov 7, 2012
    Messages:
    3,549
    Likes Received:
    5,863
    Gender:
    Male
    Location:
    South Africa
    Home Page:
    Did you know that psychopaths only need a teaspoon to gouge your eyes out?

    I'm surprised this thread is still open actually. It would have been a fairly interesting topic until I got to the annoying yellow question in the OP.

    I'm not worried about this sort of stuff anyway. Why? Because criminals in my country are morons. As long as I don't get stabbed or shot, I'm happy.
     
  18. jigsaw23

    jigsaw23 Registered Member

    Joined:
    Aug 27, 2015
    Messages:
    89
    Likes Received:
    38
    Gender:
    Male
    Occupation:
    R&D
    Location:
    Pluto

    DO they have their front two teeth removed aka Passion gap.

    AGREED
     
  19. lostandfound86

    lostandfound86 Newbie

    Joined:
    Apr 16, 2016
    Messages:
    29
    Likes Received:
    5
    The process is called wire tapping. And I don't think that upon getting your number, the hackers will be able to hack your phone.
     
  20. Ambitious12

    Ambitious12 Elite Member

    Joined:
    Jun 26, 2014
    Messages:
    3,097
    Likes Received:
    608
    Occupation:
    No Occupation
    Location:
    Among the Stars
    This is phone tapping Indeed,you will watch in movies also that FBI tapping any criminal phones,its simply tapping.