This may be of interest -- as a tool we can use to test our systems and as a weapon that may be used against us :) http://warvox.org/ A brief read-over looks like it uses iaxclient and ruby to war dial a range of numbers and record audio samples to be analyzed to identify if the call was answered by a modem, fax machine, human, etc. The calls are placed through a PSTN termination provider. I didn't see anything about IAX brute forcing. SIP was mentioned, but the primary focus appears to be IAX providers. Thanks in advance, ------------------------------------------------------------------------ Steve Edwards sedwards at sedwards.com Voice: +1-760-468-3867 PST Newline Fax: +1-760-731-3000
Last thing we need is more war. -- Sent from mobile device On Mar 6, 2009, at 2:29 PM, Steve Edwards <asterisk.org at sedwards.com> wrote:> This may be of interest -- as a tool we can use to test our systems > and as > a weapon that may be used against us :) > > http://warvox.org/ > > A brief read-over looks like it uses iaxclient and ruby to war dial a > range of numbers and record audio samples to be analyzed to identify > if > the call was answered by a modem, fax machine, human, etc. > > The calls are placed through a PSTN termination provider. I didn't see > anything about IAX brute forcing. > > SIP was mentioned, but the primary focus appears to be IAX providers. > > Thanks in advance, > --- > --------------------------------------------------------------------- > Steve Edwards sedwards at sedwards.com Voice: +1-760-468-3867 > PST > Newline Fax: +1-760-731-3000 > > _______________________________________________ > -- Bandwidth and Colocation Provided by http://www.api-digital.com -- > > asterisk-users mailing list > To UNSUBSCRIBE or update options visit: > http://lists.digium.com/mailman/listinfo/asterisk-users
Another war dialer with IAX capabilities: http://www.softwink.com/iwar/ Tim Nelson Systems/Network Support Rockbochs Inc. (218)727-4332 x105 ----- "Steve Edwards" <asterisk.org at sedwards.com> wrote:> This may be of interest -- as a tool we can use to test our systems > and as > a weapon that may be used against us :) > > http://warvox.org/ >
----- "Jon Pounder" <jonp at inline.net> wrote:> Tim Nelson wrote: >Now you're making others think I wrote this tirade of crap.> The fact that this would be even being discussed on this list is an > embarrassment to the asterisk community. >Isn't this the *perfect* place to be discussing this type of software? You're making the assumption that all use of the software is for malicious purposes. The Asterisk/VoIP community should be made aware of this and it should be used to secure and otherwise audit our own installations. Just think, if everyone audited their systems, it may be harder for people to exploit them and use them as launchpads to do exactly what you talk about below.> I am constantly being pestered by cold callers with fake caller ids, > probe calls such as this, etc. I think for once CRTC/FCC need to step > up > to the plate and take some useful measures : > > - make knowingly presenting forged caller id a federal crime (its > fraud > and harassment already) > - block caller id spoofing at the telco boundaries (we all do this now > > for ip addresses, so why not caller id ?) > - ban offenders from having telecommunications service of any sort > nationally once convicted. > > If the telcos can't adapt to providing service and accountablity this > > way and actually serving the customers who pay them, > telecommunications > with just evolve without them. Much the way the post office is being > left behind since they can not compete with the speed of fax and email > > for documents or couriers for packages.... anyways. Happy Friday. Tim Nelson Systems/Network Support Rockbochs Inc. (218)727-4332 x105