Slash Boxes
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
More | Login | Reply
Loading... please wait.
  • I wrote IVR code to do precisely this.. authenticate and login to an account using caller-id (they call it ANI, authorized number identification).

    It was even easier in my case.. Large companies basically give you a list of numbers and say "look, if anyone calls come from these numbers, let them through without authentication" (I asked everyone several variants of 'are you REALLY sure you want to do this'? but they still wanted it).. Find out the director's office number, change your caller-ID to respond with that particular number on request and you're able to do VOIP calls to anywhere on the planet. And it would certainly take a while before you get detected.