The Pager Bomb Attack

The Pager Bomb Attack

Destroy your enemy by flooding them with calls from angry pager owners.

Here’s How!

1. The Enemy: Lets say your enemy has the phone number of 714-999-8888.  We are going to ‘pager bomb’ him.

2a. Obtain a Pager #: Since most people will only answer a page from the same area code, we need some local pager numbers (714 in this example).  Google search something like “714 pager number”

2b.  Refine a Pager #: I find that doctors are the only ones using pagers nowadays.  This is perfect because they usually really don’t like to be paged (especially while on the golf course right?).  Also, they are easier to find, because hospitals and office often list emergency pager numbers on their website.  PERFECT!.  So modify that Google search to something more like “714 emergency pager number” or “714 doctor pager”.  You get the idea.

Example: google search link http://www.alz.uci.edu/ucimind/contact-us/ lists

Primary Pager: 714-506-4004  Secondary Pager: 714-506-4005 These are doctors pager numbers.  They will not be happy to be paged unnecessarily.  Too bad for our enemy, he will have to deal with it.

2c. Expand and Find Pager Block:  Most pager #’s are sold in blocks.  Therefore if 714-506-4004 and 714-506-4005 are pagers, then yep you guessed it, 714-506-4006 thru 714-506-4100 are probably also pager numbers.  Call and confirm where the number suffix ends for the block.  Basically you have found 714-506-4004, and then discovered 100 more pager numbers by just incrementing the last four digits.  EASY.

You should now have at least 20 pager numbers.

Step 3. The Attack: Start dialing away, you know how a pager works.  Dial the pager, wait for the beep, then enter the Enemy’s phone number.  Repeat with the next pager number.

Note: use the memory recall button on your phone to store the enemy’s number so you don’t have to retype it over and over.

Suggestion:  Get an old PC with a fax modem, and a copy of FreeDOS, and your favorite wardialing program such as GunBelt (yes I am that old) and automate the whole attack.

Your victim should now receive many calls from pissed off people, wondering why he paged them.  After about the 40th call in 10 minutes, the attack can be considered ‘successful’.

See Also Conference Call Attack