exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 58 RSS Feed

Files

vomit-0.2c.tar.gz
Posted Jan 5, 2004
Authored by Niels Provos | Site vomit.xtdnet.nl

Vomit, or voice over misconfigured internet telephones, is a utility that converts a Cisco IP phone conversation into a wave file that can be played with ordinary sound players. Vomit requires a tcpdump output file.

Changes: Requires libdnet.
tags | telephony
systems | cisco
SHA-256 | b2aff5a6ecb556864e9d1338fae07ec85c43f5e7642c6d57aaa980434ccdc24c
tonengenerator.txt
Posted Sep 29, 2003
Authored by ThEcYnicaLonE

Simple tone generator script that will play the 2600Hz blue box tone on an HP39G graphical calculator.

tags | telephony
SHA-256 | 9bf3a037ffe01de3ed4f73753a1bff4dbfae8e03a78eba1a52e03d25492d6eeb
vomit-0.2.tar.gz
Posted Sep 25, 2003
Authored by Niels Provos | Site vomit.xtdnet.nl

Vomit, or voice over misconfigured internet telephones, is a utility that converts a Cisco IP phone conversation into a wave file that can be played with ordinary sound players. Vomit requires a tcpdump output file.

tags | telephony
systems | cisco
SHA-256 | 39781b0d74b5139af7a5256779e01855f6e015c12dafc16f9fc6f86d7c316ceb
jew.c
Posted Sep 20, 2000
Authored by Morbid

jew.c v1.1 is a linux based bluebox program. Features DTMF dialing, CCITT 5 dialing, some c5 toys, ACTS tone generation, and more. Dosn't studder like ADM's linux tone generation program.

tags | telephony
systems | linux
SHA-256 | d885f5f4273ab67eb9826c4627253a1fe638e6aa037101077d2dfa0c2e663614
Cidspecs.zip
Posted Jun 1, 2000

This document provides specifications for the Austrailian Calling Line Identification presentation for Analogue (CLIPA) service. The service may also be as Calling Number Display or Caller ID. Thanks to Biftek

tags | telephony
SHA-256 | 42494334b00e46047d8803c98d10d0c7bc403c4d1dcd2298b5688d9197519881
ukphreak.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

an introductory guide to phreaking in the uk, one of hybrid's earlier files, for darkcyde and 9x, specifically aimed at uk dudes.

tags | telephony
SHA-256 | d0fe4706aaa5dd12e2bf945787f311ab29f1b44e20556423ececddb6395a9ec7
ss7.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a guide to the SS7 telephony protocol - Signaling System 7 is a means by which elements of the telephone network exchange information. Information is conveyed in the form of messages.

tags | telephony, protocol
SHA-256 | 42a056c65c9a65c98a8ee7c1e0e60c7bd1063c7ea2f29dd4cb12cd1ca849d8c0
satpstn.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

brief introduction to satelite communications and the intergration of the PSTN (public switched telephone network) - addition to a file written for faith magazine.

tags | telephony
SHA-256 | 09909cf86afcac4ff319e109e0f78ddd6392520a87c2993ff1e0cd86590d42f7
rboc-ixc.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a guide to different RBOCs - The US phone network is split into different areas that are controled by RBOCs (Regional Bell Operating Comapnies). For example, if you live in Texas, your RBOC will be SouthWestern Bell. These LECs (Local Excahnge Carriers) and IXCs (Inter eXchange Carriers divide America into different call handling sections.

tags | local, telephony
SHA-256 | bd80bce4df01dae94feca9e4cbc900882827c6b725df6071c315f536eacb89a7
dc_line.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

introduction to line attenuation. - A transmission line can be considered as a conductor, or a group of conductors, with suitable insulating materials, whose function is to carry electronic information signals.

tags | telephony
SHA-256 | d8d65a9174430a73a042a12eb850b407a47b6fa7d67f9d6e483d12d3ead33813
dc_ionic.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to ionica class services such as *43#. (old).

tags | telephony
SHA-256 | c5bd48016784f65de74d39d1a50520dd7634b4b13541d65f2aff0d03f4a6b397
dc_btpag.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

old file on a vulnerabilty in BT easyreach pagers.

tags | telephony
SHA-256 | c700ac591d27aa9fb3383bcfcfe076d742d17cc06df85401de347382f920061b
bcss.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

basic guide to CCS (Common Channel Signalling) and the SS7 network.

tags | telephony
SHA-256 | f4fe807aa75419b1c1d8228c5cd3cabe9172e73be9089f927ec4716c7b2f0962
9x_tel.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

introduction to the digital phone network. - Analogue systems and techniques, Basic network structures, Basic exchange structures, centrex, FDM hierarchy, PCS services, signalling, SPC, trunking, ACD, ADSL, ATM, digital centrex, CCITT parts.

tags | telephony
SHA-256 | d2e0b0c4150823e03f2c18945456897d2a3ca52f6dc857b195f626c03fa11217
9x_swr8.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to the switched route of an 8oo number via the means of SS7 network protocols. also information on DSAC(dial service admin center).

tags | telephony, protocol
SHA-256 | 220b86d49b3fc6c96f1c7ea9d4b3dd63bec785bbccf620093c36e68705940e40
9x_scntp.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to uk prefix assignments, including uk toll-free prefixes. - usefull for scanning, spunged from oftel.

tags | telephony
SHA-256 | 770b3014436d291933bfc943457579e27a8951e5f57cf3c26718ca8926119475
9x_lmpt.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to latitude meetingplace teleconferencing. - Meeting Place is a powerful teleconferencing system designed to accommodate up to 120 ports in any combination of simultaneous conference calls.

tags | telephony
SHA-256 | 02413e0f5bd47a3d86f63f9296f758c0c0992c93e1855eaa708dffbaf3718507
9x_gets.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

GETS (Government Emergency Telecommunications System) - Since the begining of telecommunications, goverments around the world have always had their own secure voice and data networks. These secret networks have always served many purposes for government and military organistaions.

tags | telephony
SHA-256 | cc46de7475a686d85616d54b70db7ac998ccf2c8f48ee3d098804807fcd336c5
9x_dcom.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to new digital telcoms - Switching Hierarchys, North American Digital Hierarchies, The Local Subscriber Loop and various other digitaly derived telcom info.

tags | local, telephony
SHA-256 | 7de56b697a52773d920f7a91309a1ec034564102e14dca0a72f5d620bf68b882
9x_cit.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

CTI (Computer-Telephony-Integration) - CTI stands for Computer Telephony Integration, the term covers a vast range of different technologys, from single user modem integration pacages to vast three-tier architectures for call-centres.

tags | telephony
SHA-256 | 05ffbebe5244763192d49793b38a1b169d2c76f527235d3573c3547e4f077f78
wb900.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a guide to the BT WB900 unit. - WB9OO is a system designed by BT to split a line into two carriers. This way two seperate BT customers can use the same line with privacy, in other words two seperate incoming/outgoing calls can be made on 1 subscriber loop similtaniously.

tags | telephony
SHA-256 | cb9e51cddf2dabb8ed811cc676abcb10559ec38bb0f2fbccb6bb0266062fcb5f
autodin.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

government and military defense telecommunications networks. an overview of various networks that are deployed by the military in the event of national emergency or covert communication. autodin and the more contemporary dsn networks.

tags | telephony
SHA-256 | bf17d5ecd745c0c48104c2d4f495f40ab342f6375a62691f5b7d24950c7ce2a5
clid-cid.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

defeating the caller-id system with simple but effective stealth. a guid to routing your call through the international pstn ninja style. describes some methods that could be used to effectivly block/cloak the origionating point code of your call, aswell as technical information on clid, and cli data transmission bursts. written for f41th magazine.

tags | telephony
SHA-256 | 6a710385a4c995edc29e8c654b689cd6df9fc0ada572b3c521fa33c8bae65079
systemx.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

bt systemx switch administration and overview of bt telcom operations and maintanance centers, written for f41th magazine. the system is based on a vax/vms platform with multi-level oracle databases, a look into the man-machine interface of uk switching, and remote switch/node interfaces.

tags | remote, telephony
systems | vax
SHA-256 | 779a4ec91dd89436fd5f104ed274d52dc3ddd09f544a61c1d4556c2c9473b03f
comint.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

covert government/military and diplomatic interception of telecommunications protocols and mediums. written for f41th magazine. an article that looks into the various covert methods deployed by international intellegence entitys to monitor/audit international communications for reasons of "national security" and informational gathering. includes a look into gchq, nsa and surrounding agencies that use provate wan's to form covert networks such as "project echelon".

tags | telephony, protocol
SHA-256 | 11595f66582c00b0f21a5b10af46020a74de3a4975af5e4d190e80bc49ba9b82
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close