Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

Encyclopedia /

What is War Dialing?

War dialing, which is also stated as “wardialing”, is a process that functions only when a modem is being used. The modem is then utilized in order to perform a mechanized scanning of a roll of telephone numbers. The procedure works in such a way that the modem dials each of the numbers in a specific local area code for the purpose of identifying communication devices such as bulletin board systems, computers, as well as fax machines.

Experts in War Dialing

Hackers and crackers make use of several methods in order to satisfy their motives and one of the known procedures used by these experts is war dialing. Hackers make use of the resulting list of the war dialing for a wide range of reasons. On the other hand, hobbyists use the list that they have made simply to gratify their curiosity and also to complete their investigation. However, the crackers apply war dialing in their evil schemes like guessing of passwords.

WarGames Movie

War dialing was coined from a movie that had become popular during the year 1983, which is known as WarGames. The story includes a scene in which the main character set his machine in a way that it would dial all the telephone numbers found in Sunnyvale, California. His purpose for doing this is to locate all of the existing computer systems in that area.

Modems used in war dialing

War dialing had been famous between the year 1980s and 1990s but this also became a motivation for the law enforcers in some of the states to ratify the law that will forbid individuals to use such kinds of modems employed in war dialing. This legislation had the main objective of preventing individuals from using tools for dialing telephone numbers when one actually has not a single intention of communicating with another person.
Based on the reports, a commonly used word in relation to war dialing is the “demon dialing”. This is associated with war dialing since it also includes the process of programming the modem of a computer so as to have it make recurring telephone calls.
 Vulnerability Scanner - Vulnerability Management 

➤ Related pages
All Modules Included at 1 Price
Attack on Exchange Server?
Cross-site Request Forgery
Encyclopedia Part 2
Encyclopedia Part 3
Encyclopedia Part 4
Encyclopedia Part 5
Encyclopedia Part 6
Encyclopedia Part 7
Hyper V Virtual UTM Appliance
Sec-Point
Security Point
VPN Firewall
What is a 2.4 GHz Wi-Fi?
What is a Script Kiddie?
What is a Web Application Firewall?
What is an Elite Hacker?
What is ComboFix?
What is Denial-of Service Attack?
What is Diffie-Hellman Encryption?
What is ISSAP?
What is ISSMP?
What is Penetration Test?
What is RC4 Encryption?
What is Spanning Tree Protocol?
What is the 5.8 GHz Wi-Fi?
What is Tunneling Protocol?
What is War Dialing?
WiFi Pen Test Appliance
Windows Operating System
WPA2 Encryption

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef