• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

PAW/PAWS – Python Advanced Wardialing System

July 1, 2008

Views: 26,861

[ad]

Now this is an oldskool topic, wardialling! Some people still ask me about wardialling tools though, so here’s one I found recently written in Python.

PAW / PAWS is a wardialing software in python. It is designed to scan for ISDN (PAWS only) and “modern” analog modems (running at 9.6kbit/s or higher). Wardialing tools are – despite their martialic naming – used to find nonauthorized modems so one can disable those and as result make access to the internal network harder.

For PAW list all numbers you want to be dialed into the (text) file “dial.lst”, one in each line – numbers only, no spaces, plus signs, dashes or slashes please.

For PAWS the numbers are accompanied by the ISDN modes to be tested in the (text) file “dial.lst” in the exact format you find in the example file (you can delete individual ISDN types, though), one in each line – numbers only, no spaces, plus signs, dashes or slashes please. A syntax check of any kind is effectively non-existant, so be careful.

Make sure the device your modem is attached to is set correctly in paw.py in the variable “tty” at the top of the file.

Then simply call “./paw.py” or “./paws.py” and watch – a verbatim full log will be written into paw_dialing.log where CR, LF and TAB will be translated into readable equivalents. For PAW an additional summary will be written as CSV file in paw_dialing.csv

You can download PAW/PAWS here:

paw.tar.gz (analog wardialer only)

paws.tar.gz (ISDN & analog wardialing)

Or read more here.

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Hacking Tools, Hardware Hacking, Networking Hacking Tools Tagged With: hacking-software, wardialing



Reader Interactions

Comments

  1. razta says

    July 1, 2008 at 10:23 am

    I’ll give this a go when I get back from work. I found some old war dialing software over at http://www.portwolf.com, aswell as loads of other old school progs.

  2. grav says

    July 1, 2008 at 6:14 pm

    One of the best places to learn stuff is from instructables.com their tutorials range from building a bird house to setting up a php based proxy.

  3. zupakomputer says

    July 1, 2008 at 10:44 pm

    I’m looking for some decent, free, not bug-laden proxy ware; but the kind of thing I found looking at instructables is indecipherable.

    I can’t make head nor tail of what this is saying (and I sure never heard of any free webspace that lets you use php, I think they just make that up cause it doesn’t exist…):

    http://www.instructables.com/id/SASVX89F1B3RAF1/

    is there another proxy guide there that makes sense? What I’m interested in is a streamlining proxy (apparently makes surfing faster; not sure how that’s physically possible with a proxy, but I’m interested), and firewall proxies that mask IPs.

    I don’t have a connection nor a machine I can leave on for this; it’d have to be something set-up elsewhere online, or a virtual proxy if those exist (ie – routes back to me after going through my ISP, and then somehow goes back out online again and does not broadcast my ISPs given IP but some other IP for a LAN that I made up; or like if you ran a server from home but didn’t want your real IP known, so you only let people connect to it using a made up (v)LAN-based IP address – maybe using a remote domain registration & redirect). I know how to use virtual machines to surf behind, but that’s different. I’d like a cgi script like what’d run on a physical LAN-based server, that a bunch of people use as a proxy-gateway. And then I’m going to daisy chain a whole bunch of them, and use them along with virtualisation.

    Also these claims of being able to get around firewalls and internet censor apps – I’m not buying that one; you would need to be able to access your education / works internet Preferences and make changes (or even use the command line) so that any proxy address is accepted; and if they have security features then they won’t have left those parts open for that. There are other ways yes. But put it this way – I’ve yet to find even a free proxy (not the software, the free sites) that you can use to surf through because evil stuff like websense automatically blocks every webpage that is a proxy and every webpage that has proxy ware on it. You’d need a really obscure list of proxies that doesn’t show up on search engines.

    First I thought they were blocking sites using the sites own keywords – but They are actually adding the addresses manually to lists of websites that are then blocked. Websense has a block list called ‘freeware and software downloads’: yes you read that correctly. They are the enemy and they must be stopped.
    Face facts – it’s things like stopping people downloading free distros they are most interested in, and not their claims of say, stopping malware getting in through pornospam.

  4. grav says

    July 2, 2008 at 12:49 am

    Have you tried sourceforge.net? They have a huge collection of open source tools and most of them are continuously updated.

    About websense. It’s true how “personal pages” are blocked when some well known porn sites are not. A while back at our school, the Web Master had blocked off the word “proxy”

    It was impossible to do a google search for proxies at school and any page that had the word “proxy” on it was blocked. The filter would not let us access any image sites either. A couple of the smart kids started using the command prompt to ping the sites, copy down the numerical address and then just input that into the address bar. That worked for about a week. Then, people started going home and finding huge proxy lists, printing them out and just manually trying them at school. The ones that worked were the ones that had no mention of the word “proxy” in them. However, like you said, the WM soon started manually adding them to the global block list.

    What this has to do with the above question… I really do not know
    : )

    About the streamlined proxy, I don’t know if it is physically possible. Wouldn’t it involve streaming the packets to you faster than if you were getting them yourself? With a middleman like a proxy, I don’t know… I might (probably) be wrong. : )

    Here’s a clip of an article about a patent on a streamlining proxy:

    “The Santa Clara, Calif.-based company said U.S. Patent number 6,510,448 entitled “System, Method And Computer Program Product For Increasing The Performance Of A Proxy Server,” covers both proxies and context switching. The patent covers multiple systems and methods, but the technology centers on using a virtual machine or other mechanism or module that runs separately from the operating system.

    For example, when a process or thread is blocked, the proxy server can switch to a different process or thread, also known as a context switch. NAI says the frequent blocking of network read/write operations can result in frequent context switching, which ultimately reduces the input/output that occurs on a network. The patent points to a software virtual machine or other mechanism or module to speed up that context switching. NAI says in an application to a networking environment, such a system could improve the efficiency of handling input/output operations through improved control of switching between contexts.

    The company said the advantage is its software virtual machine method can support restartable instructions on the proxy server to ensure that, when resumed, a previously blocked context will continue with the instruction that had previously been blocked or suspended. ”

    The full article can be found at : http://www.internetnews.com/infra/article.php/1583921/NAI+Nabs+Patent+for+Helping+Proxy+Servers.htm

    Hope this helps even a little bit

    Grav

  5. Navin says

    July 2, 2008 at 9:04 am

    wow thanks a million grav….a long but highly useful post!! cheers :)

  6. zupakomputer says

    July 2, 2008 at 1:05 pm

    Uh-huh, why did you pick a url that mentioned that particular place?

    What the other question has to do with anything is that a proxy has to be a useful thing, otherwise there is no point using it as then you’ll only draw attention to yourself because you are trying to hide.

    For example, I’ve just been checking some freebie ones online – they aren’t any use, because they are still broadcasting what ISP you are registered to – it’s just your initial IP that is altered to the proxy sites IP(s), the other one (I don’t know the correct term for it) that details where you are connecting out from – that is your ISPs usual kicking off IP address.

    I don’t think it’s possible to be online anonymously, unless you are using a connection that does not come from your own phone, landline or cell. All the talk about being able to hide anything is nonsense, because the first place any spying will happen is going to be monitoring things like proxy sites.

    If you had untraceable mobile phones, and were able to use their roaming accounts by hacking them (so none of your details are associated to the account), then that would actually be anonymous – except you’d have to disable the tracking chips / RF in the actual phone itself as that’d be broadcasting your location the whole time.

    Other than that, maybe masquerades and IP spoofers will work -long enough to conceal where-who you actually are; they wouldn’t be much use for live use in realtime other than to provide a delay in id-ing you, because it’s easy to get software that see’s when spoofing and masks are in use.

  7. grav says

    July 2, 2008 at 6:40 pm

    O!!!
    I thought by when you meant anonymously, you meant concealing your IP address. Concealing your ISP??? Hmmmm… I suppose if you want to do something like that, suppose you are using your computer for nefarious purposes and do not want to be caught… the answer would be war driving. I know this isn’t exactly what you were looking for… or anything close to it… but it does conceal your identity pretty much fully. The only way you could be found out is if you were spied by other neighbors or such, but this could easily be avoided by operating through a public place like a park. All you would have to do is get within a certain amount of feet of a house, which really isn’t that hard, because many houses have their backs to parks. I hope nobody tries this on me… my house has a park facing back : )

    Another thing you could look into would be getting your own internet connection. If you don’t go through an ISP, there would be no ISP info. Only thing is, this way, you are almost sure to be caught. All the licenses and stuff would point anyone looking at your IP directly to your address….

    Grav

    @ Navin

    Thank You
    I highly enjoy your posts as well
    They are of a consistently high caliber

    You too zupakomputer
    Thank you for all the discussion

  8. Navin says

    July 3, 2008 at 8:31 am

    thanks a lot grav

    seriously Im learnin a lot frm guys like U, Pantagruel, eM3rc, and most recently zupakomputer

    hope this continues….darknet is certainly maintaining itself with a good group of serious computer specialists who actually know about hacking (ethical and non-ethical)

  9. grav says

    July 3, 2008 at 8:06 pm

    In all respect Navin, you probably know more about hacking than I do. More than you learning from me, I feel I am learning from everybody else. I really enjoy talking to all of you and just soaking up everything you have to say. It’s a lot of fun learning new stuff and not meeting people who have that ridiculous snotty attitude about helping others.

  10. Navin says

    July 5, 2008 at 11:48 am

    I’m honoured…seriously!! But tht’s the advantage when U’re on a site like darknet….there’s no teacher or student….all of us are learning from each other

    I appreciate the fact tht i can share my viewpoint from an indian/south east perspective with someone from the UK/US/Australia!! after all most problems are perspective related aren’t they??

    The glass can be half full or half empty!! what say??

  11. razta says

    July 6, 2008 at 9:55 am

    You need an analog modem to run the software sucsesfully, does this mean that you would also need to register for a Dial Up account with an ISP? Or can you use an analog modem over broadband?

  12. Darknet says

    July 7, 2008 at 6:12 am

    razta you need an analogue modem and a phone line to war-dial, it’s not through the Internet…so no you don’t need an ISP account and no you can’t do it over broadband.

  13. razta says

    July 7, 2008 at 9:28 am

    @Darknet
    Thanks for the response. Makes sense now. :-)

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Falco - Real-Time Threat Detection for Linux and Containers

Falco – Real-Time Threat Detection for Linux and Containers

Views: 298

Security visibility inside containers, Kubernetes, and cloud workloads remains among the hardest … ...More about Falco – Real-Time Threat Detection for Linux and Containers

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Views: 591

As threat surfaces grow and attack sophistication increases, many security teams face the same … ...More about Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

Views: 556

With more businesses running Linux in production—whether in bare metal, VMs, or containers—the need … ...More about Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 594

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 451

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 676

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (228)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,297,562)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,103)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,638)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,691)
  • Password List Download Best Word List – Most Common Passwords (933,521)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,170)
  • Hack Tools/Exploits (673,298)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,183)

Search

Recent Posts

  • Falco – Real-Time Threat Detection for Linux and Containers May 19, 2025
  • Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance May 16, 2025
  • Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked) May 14, 2025
  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy