Orange box: Difference between revisions

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
imported>Christian75
It could probably be merged
 
imported>Yiosie2356
#JUN25 added some citations
 
Line 1: Line 1:
{{About|the tool used to spoof caller ID|the video game compilation|The Orange Box|}}
{{About|the tool used to spoof caller ID|the video game compilation|The Orange Box|}}
{{unreferenced|date=November 2014}}


An '''orange box''' is a piece of hardware or [[software]] that generates [[caller ID]] [[frequency-shift keying]] (FSK) signals to [[Caller ID spoofing|spoof caller ID information]] on the target's caller ID terminal.
An '''orange box''' is a piece of hardware or [[software]] that generates [[caller ID]] [[frequency-shift keying]] (FSK) signals to [[Caller ID spoofing|spoof caller ID information]] on the target's caller ID terminal.<ref>{{cite conference |last1=Tu |first1=Huahong |last2=Doupé |first2=Adam |last3=Zhao |first3=Ziming |last4=Ahn |first4=Gail-Joon |display-authors=1 |url=https://adamdoupe.com/publications/toward-authenticated-caller-id-transmission-itu2016.pdf |title=Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q. 731.3 calling line identification presentation. |conference=2016 ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT) |publisher=[[IEEE]] |page=7 |date=14–16 November 2016 |access-date=16 June 2025}}</ref> [[Phreaker]]s typically use them and other [[phreaking box]]es to perform their attacks.<ref>{{cite book |last=Gregg |first=Michael |url=https://www.google.com/books/edition/The_Network_Security_Test_Lab/pEVICgAAQBAJ?hl=en&gbpv=1&pg=PA17 |title=The Network Security Test Lab: A Step-by-Step Guide |publisher=[[Wiley (publisher)|Wiley]] |pages=17–18 |date=2015 |access-date=16 June 2025 |isbn=978-1118987131}}</ref>


==See also==
==See also==

Latest revision as of 07:57, 16 June 2025

Script error: No such module "about".

An orange box is a piece of hardware or software that generates caller ID frequency-shift keying (FSK) signals to spoof caller ID information on the target's caller ID terminal.[1] Phreakers typically use them and other phreaking boxes to perform their attacks.[2]

See also

References

Template:Reflist

Template:Phreaking Boxes


Template:Asbox Template:Telephony-stub

  1. Script error: No such module "citation/CS1".
  2. Script error: No such module "citation/CS1".