ABSTRACT

Given all the movement toward packet-based data communications, one would think that modems and

dial-up communications would wither like the communist state. Clearly, that is not the case. There are

many reasons. Sometimes, “rogue” employees want to communicate outside of corporate guidelines;

servers, power reset devices, HVAC, fire alarms, certain medical equipment, and many other devices may

still need to be accessed via dial-up. Some routers and DSU/CSUs are out-of-band addressable (i.e.,

maintenance via dial-up can be performed when the primary link is down). All these points of contact

through the PSTN (public switched telephone network) represent an open target for war-dialing. The

dialers have gotten sophisticated, using massive hacker dictionaries that often crack applications quickly.

Modems are often left in auto-answer mode, so the war dialer is able to collect active numbers during the

night. The hacker has his “cup of joe” and a “hit list” the next morning. The bottom line is that any

organization without strong controls over dial-up lines and the voice network has a serious back-door

exposure. Further compounding the remote access problem is unauthorized use of pc anywhere and

similar products. Remote access products can be set up with little or no security. With thousands of

employees, many of whom may want to access personal files on their workstation from home, it is likely

that unauthorized modems/software will exist somewhere inside the network.