PAW/PAWS – Python Advanced Wardialing System

Now this is an oldskool topic, wardialling! Some people still ask me about wardialling tools though, so here’s one I found recently written in Python.

PAW / PAWS is a wardialing software in python. It is designed to scan for ISDN (PAWS only) and “modern” analog modems (running at 9.6kbit/s or higher). Wardialing tools are – despite their martialic naming – used to find nonauthorized modems so one can disable those and as result make access to the internal network harder.

For PAW list all numbers you want to be dialed into the (text) file “dial.lst”, one in each line – numbers only, no spaces, plus signs, dashes or slashes please.

For PAWS the numbers are accompanied by the ISDN modes to be tested in the (text) file “dial.lst” in the exact format you find in the example file (you can delete individual ISDN types, though), one in each line – numbers only, no spaces, plus signs, dashes or slashes please. A syntax check of any kind is effectively non-existant, so be careful.

Make sure the device your modem is attached to is set correctly in in the variable “tty” at the top of the file.

Then simply call “./” or “./” and watch – a verbatim full log will be written into paw_dialing.log where CR, LF and TAB will be translated into readable equivalents. For PAW an additional summary will be written as CSV file in paw_dialing.csv

You can download PAW/PAWS here:

paw.tar.gz (analog wardialer only)

paws.tar.gz (ISDN & analog wardialing)

Or read more here.

Posted in: Hacking Tools, Hardware Hacking, Networking Hacking Tools


Latest Posts:

Socialscan - Command-Line Tool To Check For Email And Social Media Username Usage Socialscan – Command-Line Tool To Check For Email And Social Media Username Usage
socialscan is an accurate command-line tool to check For email and social media username usage on online platforms, given an email address or username,
CFRipper - CloudFormation Security Scanning & Audit Tool CFRipper – CloudFormation Security Scanning & Audit Tool
CFRipper is a Python-based Library and CLI security analyzer that functions as an AWS CloudFormation security scanning and audit tool
CredNinja - Test Credential Validity of Dumped Credentials or Hashes CredNinja – Test Credential Validity of Dumped Credentials or Hashes
CredNinja is a tool to quickly test credential validity of dumped credentials (or hashes) across an entire network or domain very efficiently.
assetfinder - Find Related Domains and Subdomains assetfinder – Find Related Domains and Subdomains
assetfinder is a Go-based tool to find related domains and subdomains that are related to a given domain from a variety of sources including Facebook and more.
Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.

13 Responses to PAW/PAWS – Python Advanced Wardialing System

  1. razta July 1, 2008 at 10:23 am #

    I’ll give this a go when I get back from work. I found some old war dialing software over at, aswell as loads of other old school progs.

  2. grav July 1, 2008 at 6:14 pm #

    One of the best places to learn stuff is from their tutorials range from building a bird house to setting up a php based proxy.

  3. zupakomputer July 1, 2008 at 10:44 pm #

    I’m looking for some decent, free, not bug-laden proxy ware; but the kind of thing I found looking at instructables is indecipherable.

    I can’t make head nor tail of what this is saying (and I sure never heard of any free webspace that lets you use php, I think they just make that up cause it doesn’t exist…):

    is there another proxy guide there that makes sense? What I’m interested in is a streamlining proxy (apparently makes surfing faster; not sure how that’s physically possible with a proxy, but I’m interested), and firewall proxies that mask IPs.

    I don’t have a connection nor a machine I can leave on for this; it’d have to be something set-up elsewhere online, or a virtual proxy if those exist (ie – routes back to me after going through my ISP, and then somehow goes back out online again and does not broadcast my ISPs given IP but some other IP for a LAN that I made up; or like if you ran a server from home but didn’t want your real IP known, so you only let people connect to it using a made up (v)LAN-based IP address – maybe using a remote domain registration & redirect). I know how to use virtual machines to surf behind, but that’s different. I’d like a cgi script like what’d run on a physical LAN-based server, that a bunch of people use as a proxy-gateway. And then I’m going to daisy chain a whole bunch of them, and use them along with virtualisation.

    Also these claims of being able to get around firewalls and internet censor apps – I’m not buying that one; you would need to be able to access your education / works internet Preferences and make changes (or even use the command line) so that any proxy address is accepted; and if they have security features then they won’t have left those parts open for that. There are other ways yes. But put it this way – I’ve yet to find even a free proxy (not the software, the free sites) that you can use to surf through because evil stuff like websense automatically blocks every webpage that is a proxy and every webpage that has proxy ware on it. You’d need a really obscure list of proxies that doesn’t show up on search engines.

    First I thought they were blocking sites using the sites own keywords – but They are actually adding the addresses manually to lists of websites that are then blocked. Websense has a block list called ‘freeware and software downloads’: yes you read that correctly. They are the enemy and they must be stopped.
    Face facts – it’s things like stopping people downloading free distros they are most interested in, and not their claims of say, stopping malware getting in through pornospam.

  4. grav July 2, 2008 at 12:49 am #

    Have you tried They have a huge collection of open source tools and most of them are continuously updated.

    About websense. It’s true how “personal pages” are blocked when some well known porn sites are not. A while back at our school, the Web Master had blocked off the word “proxy”

    It was impossible to do a google search for proxies at school and any page that had the word “proxy” on it was blocked. The filter would not let us access any image sites either. A couple of the smart kids started using the command prompt to ping the sites, copy down the numerical address and then just input that into the address bar. That worked for about a week. Then, people started going home and finding huge proxy lists, printing them out and just manually trying them at school. The ones that worked were the ones that had no mention of the word “proxy” in them. However, like you said, the WM soon started manually adding them to the global block list.

    What this has to do with the above question… I really do not know
    : )

    About the streamlined proxy, I don’t know if it is physically possible. Wouldn’t it involve streaming the packets to you faster than if you were getting them yourself? With a middleman like a proxy, I don’t know… I might (probably) be wrong. : )

    Here’s a clip of an article about a patent on a streamlining proxy:

    “The Santa Clara, Calif.-based company said U.S. Patent number 6,510,448 entitled “System, Method And Computer Program Product For Increasing The Performance Of A Proxy Server,” covers both proxies and context switching. The patent covers multiple systems and methods, but the technology centers on using a virtual machine or other mechanism or module that runs separately from the operating system.

    For example, when a process or thread is blocked, the proxy server can switch to a different process or thread, also known as a context switch. NAI says the frequent blocking of network read/write operations can result in frequent context switching, which ultimately reduces the input/output that occurs on a network. The patent points to a software virtual machine or other mechanism or module to speed up that context switching. NAI says in an application to a networking environment, such a system could improve the efficiency of handling input/output operations through improved control of switching between contexts.

    The company said the advantage is its software virtual machine method can support restartable instructions on the proxy server to ensure that, when resumed, a previously blocked context will continue with the instruction that had previously been blocked or suspended. ”

    The full article can be found at :

    Hope this helps even a little bit


  5. Navin July 2, 2008 at 9:04 am #

    wow thanks a million grav….a long but highly useful post!! cheers :)

  6. zupakomputer July 2, 2008 at 1:05 pm #

    Uh-huh, why did you pick a url that mentioned that particular place?

    What the other question has to do with anything is that a proxy has to be a useful thing, otherwise there is no point using it as then you’ll only draw attention to yourself because you are trying to hide.

    For example, I’ve just been checking some freebie ones online – they aren’t any use, because they are still broadcasting what ISP you are registered to – it’s just your initial IP that is altered to the proxy sites IP(s), the other one (I don’t know the correct term for it) that details where you are connecting out from – that is your ISPs usual kicking off IP address.

    I don’t think it’s possible to be online anonymously, unless you are using a connection that does not come from your own phone, landline or cell. All the talk about being able to hide anything is nonsense, because the first place any spying will happen is going to be monitoring things like proxy sites.

    If you had untraceable mobile phones, and were able to use their roaming accounts by hacking them (so none of your details are associated to the account), then that would actually be anonymous – except you’d have to disable the tracking chips / RF in the actual phone itself as that’d be broadcasting your location the whole time.

    Other than that, maybe masquerades and IP spoofers will work -long enough to conceal where-who you actually are; they wouldn’t be much use for live use in realtime other than to provide a delay in id-ing you, because it’s easy to get software that see’s when spoofing and masks are in use.

  7. grav July 2, 2008 at 6:40 pm #

    I thought by when you meant anonymously, you meant concealing your IP address. Concealing your ISP??? Hmmmm… I suppose if you want to do something like that, suppose you are using your computer for nefarious purposes and do not want to be caught… the answer would be war driving. I know this isn’t exactly what you were looking for… or anything close to it… but it does conceal your identity pretty much fully. The only way you could be found out is if you were spied by other neighbors or such, but this could easily be avoided by operating through a public place like a park. All you would have to do is get within a certain amount of feet of a house, which really isn’t that hard, because many houses have their backs to parks. I hope nobody tries this on me… my house has a park facing back : )

    Another thing you could look into would be getting your own internet connection. If you don’t go through an ISP, there would be no ISP info. Only thing is, this way, you are almost sure to be caught. All the licenses and stuff would point anyone looking at your IP directly to your address….


    @ Navin

    Thank You
    I highly enjoy your posts as well
    They are of a consistently high caliber

    You too zupakomputer
    Thank you for all the discussion

  8. Navin July 3, 2008 at 8:31 am #

    thanks a lot grav

    seriously Im learnin a lot frm guys like U, Pantagruel, eM3rc, and most recently zupakomputer

    hope this continues….darknet is certainly maintaining itself with a good group of serious computer specialists who actually know about hacking (ethical and non-ethical)

  9. grav July 3, 2008 at 8:06 pm #

    In all respect Navin, you probably know more about hacking than I do. More than you learning from me, I feel I am learning from everybody else. I really enjoy talking to all of you and just soaking up everything you have to say. It’s a lot of fun learning new stuff and not meeting people who have that ridiculous snotty attitude about helping others.

  10. Navin July 5, 2008 at 11:48 am #

    I’m honoured…seriously!! But tht’s the advantage when U’re on a site like darknet….there’s no teacher or student….all of us are learning from each other

    I appreciate the fact tht i can share my viewpoint from an indian/south east perspective with someone from the UK/US/Australia!! after all most problems are perspective related aren’t they??

    The glass can be half full or half empty!! what say??

  11. razta July 6, 2008 at 9:55 am #

    You need an analog modem to run the software sucsesfully, does this mean that you would also need to register for a Dial Up account with an ISP? Or can you use an analog modem over broadband?

  12. Darknet July 7, 2008 at 6:12 am #

    razta you need an analogue modem and a phone line to war-dial, it’s not through the Internet…so no you don’t need an ISP account and no you can’t do it over broadband.

  13. razta July 7, 2008 at 9:28 am #

    Thanks for the response. Makes sense now. :-)