Never Ending Security

It starts all here

Tag Archives: Privacy

How To Spoof Caller ID


spoof caller ID


Quick guide to learn how to spoof caller ID:

Do you want to call your friend as someone else? If yes, you are at the right place.

Before going into the how to guide, let’s take a look at some of the reasons to spoof caller ID:

  • Prank calls.
  • Impress your friends by calling from unique numbers like 000-000-0000 or 123-456-7890.
  • Hide your real phone number.
  • Call someone from a number that you want them to call back.
Note: Most of the services described in this article are banned in India and some other countries, so….if you experience any trouble while accessing the services, use a proxy website.
 

Proxy website: www.proxysite.com

Let’s start caller ID spoofing!

  • Using Crazy Call:

First, go to www.crazycall.net, and then select your country from the drop down menu.

spoof caller id using crazy call
Then enter the number you want to appear on the victim’s phone when he/she receives the call. Also fill the second box with the number of the person (victim) you want to fool.
If you want to change your voice, you can change it to low pitch or high picth.
Then click on the ” GET ME A CODE” button.
The page will reload and display a unique code and phone numbers:
caller id spoofing
Make a call from your phone to one of those numbers and enter the code when asked.
As soon as you enter the correct code, CrazyCall will connect your call to the victim with the CallerID and voice you have selected.
There are many free (trial) caller id spoofing services available, some of them are given below:
how to spoof caller ID
SpoofCard is a very good service that allows users to call from any number. It also has some interesting features such as voice changer, sound mixer, call recorder and group spoof. You can try a live demo for free. If you want more minutes, you have to buy the credits.

caller id spoofing using bluff my call
BluffMyCall spoofing service offers new features such as “Straight To Voice Mail” and “Call Notes” along with the features offered by SpoofCard.

spoof caller id using caller id faker
Caller ID Faker is just like a normal spoofing service. It doesn’t have any new features. You can try the service for free, unlimited usage available for $29.95.

change my number to another spooftel

SpoofTel is a nice service with SMS spoofing feature. You can try the service for FREE, but if you want more minutes, you have to buy the credits.
Here are some apps to spoof caller ID using an Android device:
If you are using an android phone, you can use caller ID spoofing apps like Caller Id Changer, Spoof Card – Anonymous Calling and CallerIDFaker.
Here is an app to spoof caller ID on iPhone (Free iPhone App):
If you are using an iOS device, you can use the SpoofCard iOS app to spoof your phone number.

Create your very own perfectly configured VPS full automatically to encrypt and mask all internet connections for any connected device.


Streisand is an auto configuration program that runs various scripts to setup your own Virtual Private Server (VPS) with all the additional needed programs and configuration to bring encryption to all your internet connections for any device that connects with this server. Very handy and useful to protect your internet connection on a device with less security, like a mobile phone. Highly recommended for those that willing to run their own service, but don’t really have all that knowledge to set this up.

Streisand is compatible with newly registered servers from Amazon EC2, DigitalOcean, Linode and RackSpace (more providers will be added in the future)
It need to be setup from a machine running Linux, BSD or OS X that have installed Python 2.7.

Services that will be installed on the virtual private server (VPS) are:
-L2TP/IPsec with StrongSwan and Xl2tpd.
-OpenSSH with Sshuttle and Tinyproxy.
-OpenVPN with Dnsmasq.
-Shadowsocks with Dante.
-Sslh for Nginx, OpenSSH and OpenVPN.
-Stunnel for wrapping OpenVPN connections and connecting on Android with SSLDroid,
-Tor bridge relay and Obfsproxy with Obfs3 or ScrambleSuit.
-SSL certificates and SSL private keys.
-Creates zero log files.

After installing it creates custom configuration instructions for all the installed services, and makes an HTML file with instructions that can be shared with anyone who you want to connect it’s device with your server.

Click to see the latest prices to rent a sever from: Amazon EC2, DigitalOcean, Linode and RackSpace

Installation instructions for Streisand can be found down here:
https://github.com/jlund/streisand

Hardening Android devices for more & better privacy and stronger security.


Complete universal android guide from step to step, to setup and config your phone on the way as they should be. Very useful for anyone that looking for some better security and more privacy. It describes (almost) all possible security features there are out there for the android platform. Hardening from A to Z. And it even learns you how to make phone calls true the Tor network. Go check it out, right now:
https://blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy

For the one that have some spare time left, and are looking for mobile phone hacking projects like the one from above. There is some cool project going on for “Motorola Moto E” devices. These devices can newly be purchased for some price like 100 euro. In the link down here you will find out how to build your own external scanning device that runs SnoopSnitch and could be used in many different cases in real life.
You can find all info around this project right here:
https://people.torproject.org/~ioerror/skunkworks/moto_e
Another guide about how to install SnoopSnitch on a Motorola Moto E can be found here:
https://blog.cyberwar.nl/2015/01/rooting-a-moto-e-xt1021-phone-from-an-os-x-10-9-system-to-install-snoopsnitch

Here you will find some do it yourself guide, to make your own anti tracking case for your mobile phone.
http://killyourphone.com

Encrypt your DNS connections with DNSCrypt on all your machines


Stop your ISP from spying on you and all website’s you are visiting.
Protecting yourself with just only a VPN is in most cases not enough, because an ISP is still able to log all outgoing DNS requests that uses port 53 (default port for DNS)

Use DNSCrypt to encrypt your DNS requests, and it’s recommended to use a different port for it. Anything other then the default port 53 would be useful.

DNSCrypt works by running a proxy on your local machine or network. As long as the DNS settings are proper configured on the client machine, the web-browser will send all his DNS requests to the local (DNSCrypt) proxy first. From here the requests get encrypted and send out over the configured port to the configured DNS server. Soon as the requests reach the (DNS) server they will be decrypted and read out by the server. The answer from the server will get on his turn also first encrypted before it’s send back to your local proxy. Any received message from the DNS Server will be decrypted by your local proxy before it’s sending forwarded to the web-browser that started this (DNS) request.

Download the Mac OS X client for managing the DNSCrypt Proxy over here:
https://github.com/alterstep/dnscrypt-osxclient

A Windows client for DNSCrypt can be found here:
https://github.com/Noxwizard/dnscrypt-winclient

Of course there is also a Linux client available, this can be found here:
http://opendesktop.org/content/show.php/DNScrypt+Tools?content=164488

More additional information about DNSCrypt is available at:
http://dnscrypt.org