How to call someone from a different number

0 votes
I’m curious about the concept of spoofing phone numbers, where a call appears to originate from a different number. How is this technically achieved, and are there legitimate or ethical use cases for it?
Nov 15 in Cyber Security & Ethical Hacking by Anupam
• 5,390 points
65 views

1 answer to this question.

0 votes

I'll break down the technical aspects of calling from a different number, also known as "caller ID spoofing," and discuss both legitimate and illegitimate use cases.

Technical Achievement

Caller ID spoofing involves manipulating the Caller ID information, which is transmitted as part of the call setup process in the Signaling System No. 7 (SS7) protocol for landlines or the Session Initiation Protocol (SIP) for Voice over Internet Protocol (VoIP) calls. Here's a simplified overview of how it's technically achieved:

VoIP or Specialized Services

To spoof a number, you typically need to use a Voice over Internet Protocol (VoIP) service or a specialized calling platform that allows for custom Caller ID settings. Some VoIP providers, online calling services, or apps offer this feature, often for an additional fee.

Number Provisioning

The service or platform must have access to a pool of phone numbers or the ability to use a provided number (yours or a spoofed one). Legitimate services usually require verification of the number you wish to display to prevent abuse.

Call Setup Modification

When a call is initiated, the service modifies the call setup data to include the desired Caller ID (the spoofed number) instead of the actual originating number. For VoIP, this involves altering the SIP headers. For traditional landline calls, it would involve manipulating SS7 signals, which is more complex and typically not done by end-users.

answered Nov 21 by CaLLmeDaDDY
• 6,540 points

Related Questions In Cyber Security & Ethical Hacking

0 votes
1 answer

How to secure my phone number from hackers?

The actions listed below will assist you ...READ MORE

answered Nov 22 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 6,540 points
30 views
0 votes
0 answers

How can I pass user identity to a different REST service?

When one REST service needs to securely ...READ MORE

1 day ago in Cyber Security & Ethical Hacking by Anupam
• 5,390 points
13 views
0 votes
1 answer
0 votes
1 answer
+1 vote
1 answer

How do you decrypt a ROT13 encryption on the terminal itself?

Yes, it's possible to decrypt a ROT13 ...READ MORE

answered Oct 17 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 6,540 points
114 views
+1 vote
1 answer
+1 vote
1 answer
+1 vote
1 answer
0 votes
1 answer

How to get a JWT token from the browser?

In order to securely retrieve and store ...READ MORE

answered Nov 12 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 6,540 points
46 views
webinar REGISTER FOR FREE WEBINAR X
REGISTER NOW
webinar_success Thank you for registering Join Edureka Meetup community for 100+ Free Webinars each month JOIN MEETUP GROUP