First page Back Continue Last page Summary Graphics
Threat | Vulnerabilities contd
Wiretapping
- Omahas telephone infrastructure fairly old, relatively easy to crack
- Access to public telephone lines uncontrolled
- Toadstools and manholes not locked
- Determining which wiring pair belongs to the target is easy...just call the number from a cell phone and feel for the ring current
- PBXs complicate the problem, but only a little...
- PBXs can be hacked
- Access to company wiring closets gained through social engineering
- Most PBXs have a feature that allows a single extension to hard-assigned to a specific loop
- Typically used for the operator or executives
- Hackers like this feature
- Most speaker phones can be remotely commanded for listening, even when the phone is on-hook