Professional Documents
Culture Documents
Phreaking Pharming
Phreaking Pharming
&
PHARMING
Sibug, Mark Emerald
Montoya, Mark James
Reyes, Jimmuel Cyrous
PHREAKING
What is phreaking?
Phreaking represents a subculture of hacking,
primarily focused on manipulating and exploiting
telephone networks. The term “phreaking” itself is a
blend of the words “phone” and “freaking”,
illustrating its connection to telecommunication
systems.
A brief history of phreaking
The birth of phreaking can be traced back to the 1970s when a group of
enthusiasts discovered they could manipulate the signals used in
telephone networks. One of the pioneers of phreaking was a man known
as John Draper, also known as “Captain Crunch.” He earned his
nickname after discovering that a toy whistle found in a Cap’n Crunch
cereal box could emit a tone at 2600 hertz – the same frequency that
controlled long-distance dialing in AT&T’s telephone network.
Throughout the 1980s and 1990s, phreaking continued to evolve with the
development of technology.
How phreaking works
Understanding how phreaking works requires a basic
understanding of how telephone networks operate.
Traditional telephone networks use specific signal
tones to initiate different actions, such as connecting
or disconnecting a call.
How phreaking works
In the modern era, phreaking has become more
complex. With the advent of Voice over Internet
Protocol (VoIP) technologies, phreakers now have a
new playground.
Conclusion
Phreaking, while an obscure and often overlooked
aspect of hacker culture, has played a significant role
in the evolution of telecommunications and
cybersecurity.
PHARMING
What is pharming?
Pharming is a scamming practice in which
malicious code is installed on a personal computer
(PC) or server, misdirecting users to fraudulent
websites without their knowledge or consent. The
aim is for users to input their personal information.
How does pharming
work?
Pharming uses the domain name system (DNS) to
redirect users from the intended domain to another
website. This can be done by exploiting vulnerabilities
in the DNS protocol or by compromising insecure
DNS servers and adding entries that redirect traffic.
Signs of pharming
WHILE THERE ARE STEPS TO TAKE TO PROTECT A
SYSTEM AGAINST PHARMING, THERE ARE TWO
SIGNIFICANT SIGNS THAT PHARMING MAY BE TAKING
PLACE:
against pharming Keeping a computer's operating system (OS) and other software updated
against pharming HTTPS is the secure communication protocol of the internet. It encrypts
data so that it cannot be read by anyone but the intended receivers.