War dialing
Rob Shimonski ([email protected])
Lead Network and Security Engineer
August 2002
Contents:
War dialing basics
A step-by-step attack
The war dialer configuration
An attack
Additional threats
Preventative measures
Summary
Resources
About the author
Rate this article
Related content:
Building secure software: Selecting technologies, Part 1
Remote registry access
Subscribe to the developerWorks newsletter
More dW Security resources
This article looks at a popular form of attack on an organization's computer network known as war dialing. The term war dialing involves the exploitation of an organization's telephone, dial, and private branch exchange (PBX) systems to penetrate internal network and computing resources. After introducing and exploring the different forms war dialing attacks can take and some tools used to execute such attacks, the article examines measures that can be taken to prevent such an attack.
...
http://www-106.ibm.com/developer ... r,lnxw06=WarDialing