Thursday, December 23, 2010

Caller ID spoofing - iPhone Application Allows to Fake Number


Caller ID spoofing has been around for several years now and the controversy surrounding it has not waned. Call spoofing is the act of changing the phone number that appears on someone's call display when you place a call to them. Instead of blocking or revealing your real number, you choose the number that is displayed.

Although it is still somewhat unknown to the general public, this type of service has continued to gain in popularity and is used by everyone from regular individuals to professionals, law enforcement, and even celebrities. It's a tool that allows people to retain anonymity and keep their identity, or at least their phone numbers, private. Even when placing a call to someone that is familiar and trusted, there is a chance that the person's telephone could be lost or stolen with your number contained on it. For celebrities in particular, this could be disastrous.



There are several providers that offer the call spoofing service to anyone. In addition to call spoofing, other services and calling features have been added over the years. Some of these include voice changing, call recording, SMS spoofing, personal Spoof Numbers, and, most recently, mobile applications.

SpoofTel, one caller ID spoofing provider, has recently released an iPhone application that allows you to use its service from your iPhone. Due to its controversy, it has not become available on the iPhone store but is still available for download on other sites. Although it is still fairly new, the application has already been downloaded by thousands of iPhone users.

Caller ID spoofing has appeared in various news stories over the years, typically related to some type of proposal to ban or outlaw the service. There is a lot of controversy surrounding call spoofing because it has been know in the past to be used by scammers. Certain individuals have used spoofing services for fraudulent and illegal purposes in the past. However, most providers have become quite successful at preventing scammers from exploiting their services and it has not been as large of a problem as it was in the past. As well, spoofing services are used by many individuals for a multitude of purposes. The majority of individuals use spoofing services legitimately.

With spoofing providers continuously producing additional services and features, it doesn't look like caller ID spoofing is going anywhere any time soon.

Christian Shmidt
Author/ Editor
Tool for sending sms spoofing : spoofcard



Wednesday, November 24, 2010

IPhone - Caller ID spoofing is NOT illegal?


General has been informed that Apple has withdrawn the production of iSpoofCard mobile applications for their iphone product. Accordingly, SpoofApp and SpoofCard has become an alternative for iPhone users to install applications on their phones. Both of these applications 100% web base tools "installed" on the mobile phone users. This web based platform take advantages of the ability to bookmark a web page to the home screen and launched as a full-screen web application the for iPhone users. The only striking difference from the App Store version of iSpoofCard is that the function of Address Book integration is not present in the version of the web application. However, users SpoofCard now are 100% legitimate in a way to install SpoofCard applications on each iPhone and iPod Touch, without interference from Apple. 

At the end of February / early March 2010 SpoofCard and SpoofApp released a mobile application for Palm WebOS. This is a mobile application SpoofCards 5, clearly shows that companies do not take lightly such a mobile application that now has all major smartphone platforms covered (iPhone, Android, BlackBerry, Palm and Windows Mobile). 

SpoofCard recently introduce their "lite" version of iSpoofCard into iTunes App Store at the same time as the April Fools' Day 2010 under the name "Phone Gangster." The new "Phone Gangster" includes many features such as voice changing, call, straight-to-voice mail, address book integration and record sharing which are same feature on iSpoofCard but with the exception of Caller ID spoofing. Apple will not approve the application with Caller ID spoofing on, until the app is using the number of mobile phone users to call out.

Wednesday, October 27, 2010

SMS Spoofing - A potential hacker attack

Other potential attack vector: a text message on the smartphone. Hackers can use spoof sms to contact employees of a company in a direct effort to get help easily to divulge sensitive information such as network log-in credentials and business intelligence. among others, they can also use text messages to install malware on a smartphone.
"In our proof-of-concept work, we show how to turn on the microphone, rootkits can phone without the owner knowing it happened," said Schwartau. "An attacker can send a text message will not be visible to the infected phone to make calls and talk about the microphone switch." That would be an effective tactic if, for example, the owner of the phone is close and the attacker would like to eavesdrop, he noted.
Schwartau said that there is no way to filter out SMS activity, but it is usually done through the operator, because SMS is not based on IP and is therefore usually not controlled by the admin. The best option to block the attack to work with suppliers to ensure that they are using software restriction malware, filter SMS, and divert those types of attacks.
And again, creating policies that encourage the use of smartphone or require the use of only a sentence or a company-company-provided phone and service plan to reduce that risk.
Of course, companies can not thwart any possible security attacks with current technology, and hackers continue to switch tactics. You should try to install six security breaches and to work to ensure that they are installed - but you should also go out to new forms of malicious activity.

Wednesday, October 20, 2010

Fake SMS - It can be done

Most of  people didn't  know that sms in the inbox can be made by the owner of the mobile phone, devoid of any interference of others. It is easily seen from the number of people who believe that the contents of the inbox are strong and authentic evidence that others have sent sms to him.

What if your friend says that the X has been sending text messages on her insolent tone? Maybe you do not believe it? What if you find "proof" sms from X whose contents are insolent tone? For the layman this sms is a very strong proof, indisputable that X actually has sent a sms tone of disrespectful, and therefore X should be taught a lesson.

Mobile phone is no different with computers, there is a processor, memory, storage and of course the operating system. Mobile phone operating system that mostly known are the Windows Mobile and Symbian. Inbox, sent, draft etc. are also more or less like a folder. Regular practice in mobile phone is copying / moving messages from one folder to another as from the draft sent to or from the inbox to the saved messages. There is no menu to create and store sms in the inbox. But that does not mean impossible, because the actual function or the fire in the operating system already available. Living alone made the program to do it.

Another scenario is very much social engineering, depending on each person's imagination. This is dangerous because so many people who strongly believe that the text in your INBOX is really sent by people who look at the “from” field, so easily provoked and trusting.

It should be understood that the sms can be spoofed so it is not necessarily a sms in the inbox hp really sent by people listed in the field From / Sender.

Monday, October 18, 2010

Summary of SMS history

In1990 the European Telecommunication Standards Institute public specifications of the then new GSM system. In this specification was introduced to a sub-protocol, initially little known because little publicized.


None of the experts, in the early '90s, he never imagined that a service for sending short text messages (Short Message Service, SMS precisely) would have been so successful in the future.
Designed initially as a service for the distribution of broadcast information, it also had the ability to send short messages between terminals: no one believed it, because it seemed too complicated and exhausting Write a message using only the buttons on a phone and T9 was not even on the horizon.


What then is an SMS? This is a simple text message of up to 160 characters, 7 bit format.
Are exchanged between mobile phone and SMSC (Short Message Service Center) and between SMSC, are delivered using the signaling channel, thus allowing reception even when the channel voice / data are already committed.


SMS are received from the terminal with a set of data 'accessories': well (of course) to the text of the message, the SMSC sends the mobile phone among other things, the number of the sender and the number of the gateway used. In the Protocol, however, not enter any authentication system, so you can be sure that the number of the sender is really the one received, the sender is in fact sent by the terminal itself all SMSC, and there actually a way to change it.

Wednesday, October 13, 2010

SMS Spoofing - falsified the sender's SMS

Several years ago, everybody amused themselves by sending e-mails as bill.gates @ microsoft.com. Today, the majority of the society quick exchange of messages is associated rather with SMS, not e-mail. Unfortunately, the new communication protocols used in GSM networks are just as vulnerable as the old and worn-out SMTP. Today we look at the falsification of the sender field in SMS messages and threats that this brings. We will learn also how to recognize fake SMS messages.

How to fake a sender field in the SMS?

The easiest way is to use one of the sites goals. Virtually none of them is now available free services, but they are not especially expensive.

Attacks (smashing and threats)

Please note that by sending SMS with a false sender does not have a return channel (any attempt to answer the sacrifice of our SMS will be forwarded to the original owner of the number, and not to us). Thus, all attacks consist mainly was to get the victim to perform some action (phishing, threats).

Doubling as the number of technical director can instruct the employee such as the IT department to open port on your company's firewall. Pretending to be a person close to the victim can ask to transfer money to the specified in the SMS account number ... Finally, you can send yourself a text message with the number of the boss (wife), containing information on the increase (an invitation to dinner), and strongly demand the promise.

ID theft websites

another group of attack is the possibility of identity theft and publishing content on behalf of another user on one of the websites where the attacked user has an account (if the service allows you to add content via SMS / MMS). In Poland, it can be: Our-Class, Blip and Flakers (and probably many others). If you have a website associated with that phone number to sending fake SMS to a service access number will update the content in the profile of the victim. Service thought that the author of SMS is its user (and not the gateway).

Monday, October 11, 2010

IP and Email Spoofing - easy to understand

Many email users are not adept at using e-mail received junk mail in the office or personal email as a result of misuse of IP spoofing. This causes all email users are uncomfortable and cause dissatisfaction when their email account is filled with junk mail.

The spread of junk mail has increased the awareness of the email server administrator to install anti-spam software. There are a lot of software on the Internet from either a paid or open source. However, junk mail senders are always looking for new techniques or weaknesses that exist in an anti-spam software.

IP Spoofing: I sent an e-mailed to you. In this case, the correct IP address can be easily seen by the recipient. You can keep track of me very easily based on the ip address. So if I want to hide my identity I will spoof the IP address first and then send an e-mailed to you. IP spoofing is to hide your real IP address and show a fake IP address to the sender's Internet Protocol.


Email Spoofing: Email Spoofing is a method where we can send e-mail to anyone with an e-mail address to display other people. I want to make an impression on my friend. I sent an e-mail from another account using the email address spoofing, and display billing gateway into my account. My friends will be shocked to see this email.

Saturday, February 27, 2010

Fake SMS

Send SMS messages from your PC with free nice interface everywhere you want. Send fake sms sender software: Software for sending SMS from your PC, Fake Mailer is a anonymous email sender, Send 2-way SMS from Outlook or Express and more. FoxPlayer is a very compact, light and handy audio player with a smart interface intended for playing audio files and streaming media. Software for sending SMS for any destination with a personalized sender name. Best free send fake sms sender downloads. Posted June 28, 2005 by Casey Bisson Categories: Technology. About the picture: there are a number of entertaining sms-tagged photos on Flickr.

Is there another network agnostic gateway besides the AIM service identified above. Will these web and email to SMS gateways work for off-network numbers. In these days of number portability, how can a person identify the carrier for a particular phone number based on the number alone. This leads to a few questions. Slipstick lists the email addresses for various networks email to SMS gateways. But there are other solutions. Really.My friend Will was in meetings all day Friday, and there are few better times to have SMS messaging than in meetings. People post pictures of their SMS messages on Flickr. The complete solution for mobile messaging.

Receive replies in your Inbox or on your mobile. Creative Commons Attribution 3.0 All Identi.ca content and data are available under the Creative Commons Attribution 3.0 license. It runs the StatusNet microblogging software, version 0.9.0beta6, available under the GNU Affero General Public License. Identi.ca is a microblogging service brought to you by Status.net.
Always scheduling your payments till the last day. It keeps the creditors updated through SMS. Mobile Creditor Alert is an utility which manages Creditors and has the ability to maintain the account of Creditors. Note that there are multiple sheets on the excel for different applications. A Signed version is available at the available at the.

Tool for sending fake sms: SpoofCard

Sunday, January 24, 2010

Fact about sms spoofing - must read

 By virtue of this fact, a miscreant is able to direct attacks on subscribers inside a network from the Internet, disrupting the mobile experience of the user, as well as incurring non-recoverable charges for the mobile operator. SMS spoofing is achievable because almost all phones today have access to, and are accessible from, the Internet. However, the ability to do SMS spoofing has also led hackers to explore new ways to compromise mobile phones. When you consider how a company would successfully launch mobile advertising, for example, it is easy to understand the need for such capabilities.

One of the main problems with identifying and dealing with SMS spoofing is that there are a number of legitimate uses for this technology, including corporate branding of a message, setting a mobile number for return phone calls and identifying the text with products or services from the vendor. You may have seen this on your own phones when you receive a text message that comes from an apparently random alphanumeric string. Essentially, the SMS message is reset to alter who the sender appears to be. SMS spoofing is a recent development quickly evolving with the growth of cellular networks worldwide.

It is the last type of attack, SMS spoofing, which is undoubtedly one of the fastest growing methods to penetrate mobile operators. There is also SMS Faking, where a hacker simulates the behavior of an SMS switch to send messages. There is SMS flooding, where the content provider "floods" a foreign SMS center with numerous messages. First, there is classic "mobile content spam," where the content provider has a service agreement with the operator and sends questionable content. While the levels of threats vary from Asia to Europe to North America, today there are four identifiable types of SMS mobile spam messages with which operators have to contend. You hear a lot of talk about mobile content security nowadays, particularly as a threat to the long-awaited emergence of mobile advertising. Click here to get the Mobile Marketer newsletters. Receive the latest articles for free. Type D0 hex addresses might be a different matter, but the GSM 03.40 length restriction on these would prevent forging the above address by such means. I would be very surprised if any SMSC would permit lodgement of messages with user-editable type 91 hexadecimal "type of number" originators' addresses.

This device has been powered up with good signal for the past 24 hours. After the target replies, the tracker can then request their position online and receive a street address, post code, and map of their location with an accuracy of around 250 meters. The target then receives an SMS message asking them to confirm they consent to the tracking. To use their services you purchase a monthly subscription or set number of credits, and enter in the targets phone number. Over the past year a number sites have popped up offering web based mobile phone tracking services.

All that is required is their mobile phone number, and carrier.