Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Evan Doorbell's Classic Phreaking Tapes (evan-doorbell.com)
93 points by fapjacks on Sept 7, 2017 | hide | past | favorite | 21 comments


On the topic of phreaking, does anyone know if modern condo entryphone systems are vulnerable? The fact that pressing a button on my phone unlocks the front door to the building makes me wonder how it could possibly not be vulnerable to having the right pitches played, but I would hope that the dangers of in-band signalling have been widely understood for long enough that systems would be protected...


I realise the thread is phone phreaking related and that was kind of the point of your post; but in the spirit of the talk below to think more outside the box...

There's a pretty good chance in many cases you can just open the external box with some easy to get (and relatively standard) key. And hit a button. Related: https://twitter.com/MalwareTechBlog/status/90382347816752742...

This is a good related talk - goes outside the box on all the ways you can often get into commercial buildings without picking (or even in many cases, interacting with) the lock "The Search for the Perfect Door" by Deviant Ollam https://www.youtube.com/watch?v=4YYvBLAF4T8

Also good: https://www.youtube.com/watch?v=a9b9IYqsb_U [Howard Payne & Deviant Ollam - This Key is Your Key, This Key is My Key] https://www.youtube.com/watch?v=oHf1vD5_b5I [DEF CON 22 - Deviant Ollam & Howard Payne - Elevator Hacking - From the Pit to the Penthouse]


I would be shocked if there are not vulnerabilities in the form of default codes and factory resets. As far as phreaking there's probably something to it. The fact that my building's call box picks up when I dial the front door number seems like a bad sign.

The building next to mine has what appears to be an Android tablet as the keypad, I can only imagine the vulnerabilities there.


I assume this is one of those systems where a potential entrant types a code, and the systems calls a pre-provided number for the occupant of the unit who provided the code to the entrant?

The common denominator on the PSTN is listening for inband DTMF within a G.711 "encoded" stream.

The "security" in this system is the condo entry phone device dialing out to the PSTN (via some mechanism) to the destination number, which is routed via SS7 to the proper owner.

This security mechanism is somewhat similar to those used by two-factor systems that send SMS via SS7 to destination numbers. It's not without fault, there have been many demonstrated attacks against the SS7 network.


Sorry, I should have specified more. This is a "potential entrant selects the person they're trying to visit; system phones the pre-programmed number for that occupant; occupant talks to the visitor and presses a button to let them in". In my building, I have to press 6 to make the door unlock.

Could a vistor play a very loud "touchtone phone 6" into the microphone and make the system think that the occupant pressed that number?


That would require the audio signal to be a single channel right? That or the residents phone would have to be very loud. I'm not sure but I think phones operate on a dual channel (tx/rx) setup which is what allows all participants to talk simultaneously.


I was thinking echoing. I don't know how loud a button tone needs to be for the entryphone system to accept it as an instruction to unlock the door.


To be clear, it uses a similar mechanism to 2FA messages to place the call but there is only one authentication factor in this case.

My question is what kind of trouble can I cause by calling the inbound number from my call box? It picks up so presumably it is listening to something.

Also, how is the physical security of these devices? Are they managed from the keypad or is the control inside the building in a secure area? How does the FD get in?


This sounds interesting but he's using so much phone jargon it's hard for me to follow. Is there some good intro to this stuff somewhere?


Sure, one is 'Exploding the Phone', 2013, by Phil Lapsley. http://explodingthephone.com

Great book.


This is essentially trainspotting for telephony nerds. Most of this hobby is exploring and mapping telephone exchanges just by dialing random numbers and listening, and sometimes discovering interesting unlisted phone numbers. The jargon is mostly referring to identifying telephony switching equipment based on dialing a lot of phone numbers in a given area code then listening for the subtle audio clues that hint at the type of switching used by that exchange. Lookup Step by Step switches on YouTube for to see what old timey telephone exchange equipment was like.


I very much enjoy the "Dom Tuffy" series (though I highly recommend all of Mr. Doorbell's recordings-- his voice is pleasing and hearing how it has changed over his life is amusing, if nothing else).

The August, 2001 tapes in Nantes, Quebec are especially poignant to me. I grew up in a rural small town that had the analog phone switch replaced with a digital switch (a DMS-10) in the late 1980's. A couple of other little towns around still had analog switches into the early 90's. I "played around" with them a little bit but really didn't understand the technology. Now I wish I'd had more time with them.


This is awesome:

http://www.evan-doorbell.com/production/PanPulsLovers.mp3

It covers the exchanges talking to each other.


In particular, the "How Evan Doorbell became a Phone Phreak" series is excellent storytelling with plenty of detail to keep hackers entertained.


Link the Soundcloud version, which might be easier for mobile listeners - https://soundcloud.com/evan-doorbell/sets/group-1


This is really well produced, and he's a great narrator! Loving both the hacker spirit and the contemporary music with DTMF mashups.

NPR or someone should pick this up and give it a broader audience.


Radiolab did a piece on Joybubbles - http://www.radiolab.org/story/187724-long-distance/


What exactly is this about?


Phreakers were/are telephone system hackers. Back in the day it was possible to hack telephone systems using simple electronics and some technical knowledge. The page being linked to seems to go into some of the history of phone phreaking.

Incidentally, the following clip contains the most impressive demonstration of phreaking I've ever seen, showing a blind phreaker with perfect pitch called Joe Engressia who was able to hack the phone system just by whistling:

https://www.youtube.com/watch?v=vVZm7I1CTBs

A fair amount of the hacker culture of the 80s and early 90s (hacker in terms of what the common perception of a hacker is) seems to owe its debt to the trail blazed by phreakers.


My understanding is that this guy was a telephone "phreaker" (hacker enthusiast) and I gather he traveled a lot and would use pay phones and record them as he did.

The "tapes" are him narrating over these old tapes many years later explaining what he was doing. Much of it is him dialing various numbers and listening to the beeps/boops/kachunks and explaining exactly what is happening technically to route the call.


The "Sounds of Long Distance" series does a pretty good job of explaining how the phone network was laid out in the waning years of the Bell System.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: