War dialing is a brute-force method of finding a back door into an organization's network. It is particularly effective against a perimeter defense. Most organizations have telephone numbers that are within a specified range and begin with the same prefix. For example, let's consider a fictitious company called Acme Networks. All of the company's telephone numbers begin with ; there are 4, extensions; and the first extension is The range of telephone numbers for Acme Networks begins at and ends at War dialing usually employs an automated dialing system a program to call every telephone number for the organization, searching for modem connections. The program logs a telephone number whenever it finds a modem.
‘War Dialing’ Tool Exposes Zoom’s Password Problems
In-depth security news and investigation
Toggle navigation Menu. Home Dictionary Tags Security. Definition - What does Wardialing mean? War dialing refers to the use of various kinds of technology to automatically dial many phone numbers, usually in order to find weak spots in an IT security architecture.
War Dialing/Telephony Penetration Testing (aka Phone Hacking)
Wardialing or war dialing is a technique to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for modems, computers, bulletin board systems computer servers and fax machines. Hackers use the resulting lists for various purposes: hobbyists for exploration, and crackers —malicious hackers who specialize in breaching computer security—for guessing user accounts by capturing voicemail greetings , or locating modems that might provide an entry-point into computer or other electronic systems. It may also be used by security personnel, for example, to detect unauthorized devices, such as modems or faxes, on a company's telephone network.
As the Coronavirus pandemic continues to force people to work from home, countless companies are now holding daily meetings using videoconferencing services from Zoom. According to its makers, zWarDial can find on average meetings per hour, and has a success rate of around 14 percent. Each Zoom conference call is assigned a Meeting ID that consists of 9 to 11 digits. Naturally, hackers have figured out they can simply guess or automate the guessing of random IDs within that space of digits. Security experts at Check Point Research did exactly that last summer , and found they were able to predict approximately four percent of randomly generated Meeting IDs. The Check Point researchers said enabling passwords on each meeting was the only thing that prevented them from randomly finding a meeting.