Results 1 to 3 of 3
  1. #1
    ARTFUL DOGGER
    Guest
    how do i hack another cell phone





    See More: smurfing




  2. #2
    michael turner
    Guest

    Re: smurfing

    On Sun, 21 Nov 2004 09:20:27 -0400, ARTFUL DOGGER wrote:

    > how do i hack another cell phone


    http://searchsecurity.techtarget.com...213013,00.html
    -------------
    Smurfing is the attacking of a network by exploiting Internet Protocol
    (IP) broadcast addressing and certain other aspects of Internet operation.
    Smurfing uses a program called Smurf and similar programs to cause the
    attacked part of a network to become inoperable. The exploit of smurfing,
    as it has come to be known, takes advantage of certain known
    characteristics of the Internet Protocol (IP) and the Internet Control
    Message Protocol (ICMP). The ICMP is used by network nodes and their
    administrators to exchange information about the state of the network.
    ICMP can be used to ping other nodes to see if they are operational. An
    operational node returns an echo message in response to a ping message.
    --------------

    .... I cant see how could you could hack a mobile-phone by smurfing.

    --
    Michael Turner
    Now playing 'Smurfs - Christmas In Smurfland'
    Email (ROT13)
    [email protected]



  3. #3
    ChrisM
    Guest

    Re: smurfing

    Maybe... no, bear with me here...

    Smurfs were blue... (did they wear little blue coats?)

    P'raps he meant Blue Jacking...?

    --
    Please remove shoes to reply

    But what ... is it good for?
    - Engineer at the Advanced Computing Systems Division of IBM, 1968,
    commenting on the microchip.
    "michael turner" <[email protected]> wrote in message
    news[email protected]...
    > On Sun, 21 Nov 2004 09:20:27 -0400, ARTFUL DOGGER wrote:
    >
    > > how do i hack another cell phone

    >
    >

    http://searchsecurity.techtarget.com...213013,00.html
    > -------------
    > Smurfing is the attacking of a network by exploiting Internet Protocol
    > (IP) broadcast addressing and certain other aspects of Internet operation.
    > Smurfing uses a program called Smurf and similar programs to cause the
    > attacked part of a network to become inoperable. The exploit of smurfing,
    > as it has come to be known, takes advantage of certain known
    > characteristics of the Internet Protocol (IP) and the Internet Control
    > Message Protocol (ICMP). The ICMP is used by network nodes and their
    > administrators to exchange information about the state of the network.
    > ICMP can be used to ping other nodes to see if they are operational. An
    > operational node returns an echo message in response to a ping message.
    > --------------
    >
    > ... I cant see how could you could hack a mobile-phone by smurfing.
    >
    > --
    > Michael Turner
    > Now playing 'Smurfs - Christmas In Smurfland'
    > Email (ROT13)
    > [email protected]