Page 871 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 871

box technologies have been developed and widely used by phreakers,

               but only a few of them work against today’s telephone systems based
               on packet switching. Here are a few of the phreaker tools often used to
               attack telephone services:

                    Black boxes are used to manipulate line voltages to steal long-
                    distance services. They are often just custom-built circuit boards
                    with a battery and wire clips.

                    Red boxes are used to simulate tones of coins being deposited into
                    a pay phone. They are usually just small tape recorders.


                    Blue boxes are used to simulate 2600 Hz tones to interact directly
                    with telephone network trunk systems (that is, backbones). This
                    could be a whistle, a tape recorder, or a digital tone generator.

                    White boxes are used to control the phone system. A white box is a
                    dual-tone multifrequency (DTMF) generator (that is, a keypad). It
                    can be a custom-built device or one of the pieces of equipment that
                    most telephone repair personnel use.






                             As you probably know, cell phone security is a growing


                  concern. Captured electronic serial numbers (ESNs) and mobile
                  identification numbers (MINs) can be burned into blank phones to
                  create clones (even subscriber identity modules—SIMs—can be
                  duplicated). When a clone is used, the charges are billed to the
                  original owner’s cell phone account. Furthermore, conversations

                  and data transmission can be intercepted using radio frequency
                  scanners. Also, anyone in the immediate vicinity can overhear at
                  least one side of the conversation. So don’t talk about confidential,
                  private, or sensitive topics in public places.
   866   867   868   869   870   871   872   873   874   875   876