Brute Forcing VM Pin Codes


er, [-] sent in this little project. War-dialing is classic. The Scanit is designed for VM wardialing from a cell phone. The interface is a simple sound card to cell phone device made from a cheap car kit.. A laptop does the rest of the work. Apparently the nokia they used responds to sound based send/end commands. (DTMF is easy) I’d like to see a schematic and some source code, but nothing in the project is too terribly difficult.

9 thoughts on “Brute Forcing VM Pin Codes

  1. The major US carriers do some data mining to look for fraud, but none of them do it very well or in real time. The switches that might notice this kind of attack as it is occuring are generally not configured or able (depending on how old the switch is, model, etc) to see that kind of activity, so it is done after the fact from the billing database.
    If it were me, I’d assume that eventually the activity will be spotted and the PIN changed (even eve/weekend minutes are detailed in the bill, just not charged). But if you just want existing VMs or want access for a few days and don’t mind leaving a footprint, there you go!

Leave a Reply to Captin ShmitCancel reply

Please be kind and respectful to help make the comments section excellent. (Comment Policy)

This site uses Akismet to reduce spam. Learn how your comment data is processed.