How to call someone from a different number

0 votes
I’m curious about the concept of spoofing phone numbers, where a call appears to originate from a different number. How is this technically achieved, and are there legitimate or ethical use cases for it?
Nov 15, 2024 in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
109 views

1 answer to this question.

0 votes

I'll break down the technical aspects of calling from a different number, also known as "caller ID spoofing," and discuss both legitimate and illegitimate use cases.

Technical Achievement

Caller ID spoofing involves manipulating the Caller ID information, which is transmitted as part of the call setup process in the Signaling System No. 7 (SS7) protocol for landlines or the Session Initiation Protocol (SIP) for Voice over Internet Protocol (VoIP) calls. Here's a simplified overview of how it's technically achieved:

VoIP or Specialized Services

To spoof a number, you typically need to use a Voice over Internet Protocol (VoIP) service or a specialized calling platform that allows for custom Caller ID settings. Some VoIP providers, online calling services, or apps offer this feature, often for an additional fee.

Number Provisioning

The service or platform must have access to a pool of phone numbers or the ability to use a provided number (yours or a spoofed one). Legitimate services usually require verification of the number you wish to display to prevent abuse.

Call Setup Modification

When a call is initiated, the service modifies the call setup data to include the desired Caller ID (the spoofed number) instead of the actual originating number. For VoIP, this involves altering the SIP headers. For traditional landline calls, it would involve manipulating SS7 signals, which is more complex and typically not done by end-users.

answered Nov 21, 2024 by CaLLmeDaDDY
• 13,760 points

Related Questions In Cyber Security & Ethical Hacking

0 votes
1 answer

How to secure my phone number from hackers?

The actions listed below will assist you ...READ MORE

answered Nov 22, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
59 views
0 votes
1 answer

How can I pass user identity to a different REST service?

To securely pass user identity between REST ...READ MORE

answered Dec 4, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
58 views
0 votes
1 answer
0 votes
1 answer
+1 vote
1 answer

How do you decrypt a ROT13 encryption on the terminal itself?

Yes, it's possible to decrypt a ROT13 ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
181 views
+1 vote
1 answer

How does the LIMIT clause in SQL queries lead to injection attacks?

The LIMIT clause in SQL can indeed ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
344 views
+1 vote
1 answer

Is it safe to use string concatenation for dynamic SQL queries in Python with psycopg2?

The use of string concatenation while building ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
188 views
+1 vote
1 answer
0 votes
1 answer

How to get a JWT token from the browser?

In order to securely retrieve and store ...READ MORE

answered Nov 12, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
100 views
webinar REGISTER FOR FREE WEBINAR X
REGISTER NOW
webinar_success Thank you for registering Join Edureka Meetup community for 100+ Free Webinars each month JOIN MEETUP GROUP