Hotline Hacked Vol. 9
en
January 29, 2025
TLDR: Stories include pranking brothers via video, a DOS frat war, and an attempt to buy a building with a credit card. To share your own story: www.hotlinehacked.com

Hotline Hacked brings captivating tales from the tech world, and Episode 9 is no exception. Featuring outrageous stories like pranks between siblings, fraternity skirmishes, and unconventional financial maneuvers, this episode dives deep into the quirky side of technology’s intersection with daily life.
Key Themes and Takeaways
The Mischievous Adventures of College Life
The episode opens with a hilarious story from a university student who, while roaming the campus late at night, attempted to enter a locked building with nothing but his credit card. The caller recounted how he innocently tapped his card on RFID scanners, only to find one door unexpectedly unlocked. This encounter culminated in a bewildering confrontation with campus security, who arrested him for breaking and entering despite his humorous defense about merely utilizing a faulty door.
Key insights from this segment:
- Understanding RFID Technology: The discussion dives into how RFID systems work and the potential vulnerabilities. The call raises questions about how a credit card can interact with these locks and what might go wrong in the security infrastructure.
- Humor in Technology Misunderstandings: The caller's light-hearted tone amidst a serious encounter showcases how unexpected situations can lead to humorous and unforgettable stories.
A Brotherly Prank That Went Viral
Next, the podcast shares an elaborate prank pulled by an older sibling on his younger brother. The prank, dubbed the "Sound Bomb," involved locking down the brother's laptop remotely and blasting music at full volume. The older brother meticulously crafted this scheme using scripts and live-stream technology, aiming to surprise his unsuspecting sibling.
Highlights from this story include:
- Technical Craftsmanship: The older brother demonstrated his programming skills and creativity through a series of scripted commands. This reflects the potential of coding skills in executing practical jokes.
- Sibling Dynamics: This segment also humorously explores the complexities of sibling relationships, particularly how technology can create both fun and friction. The prank inadvertently strained their trust, showcasing the unpredictable outcomes of such tech-based jokes.
The Fraternity Wars
An intriguing addition to the episode includes a fraternity member sharing his retaliatory exploits against rival brothers who vandalized their house. He orchestrated a denial-of-service (DOS) attack on the opposing fraternity's Wi-Fi as an act of revenge, showcasing creativity amidst conflict.
Points to note:
- Learning Through Chaos: Despite the immature backdrop of a frat house feud, the speaker gained practical experience in networking and cybersecurity, turning their hack into a learning opportunity for academic projects.
- Ethical Implications of Tech: While funny, this story sets a tone for discussion about the ethics of using technology for revenge and the long-term implications of such actions.
The Retrospective of Old Hacking Tricks
A humorous confession came from an Australian listener recounting old payphone tricks from the late 80s and early 90s. This nostalgic tale detailed how specific methods allowed individuals to make free calls by overriding the payphone’s mechanics—a clever nod to the hackers of yesteryears.
Takeaways:
- Nostalgia and Innovation: The segment demonstrates how technology, in its evolving form, has always been the canvas for creative problem-solving and fun tricks.
- The Evolution of Technology: Reflecting on past hacks showcases the changes in technology and how old methods have become outdated but remain part of tech culture history.
Conclusion
Episode 9 of Hotline Hacked captures the essence of how technology impacts lives through unique and humorous experiences. Each story, whether about a prank gone wrong or tech-savvy revenge, provides listeners with insights into the human side of technology.
Through laughter and lessons, this episode emphasizes that even in a world increasingly dominated by tech, the most memorable stories often involve human connections and the ingenuity inspired by them.
Whether you relate to the awkwardness of campus life, the mischievousness of sibling relationships, or the humorous undertones of fraternity antics, there's something in this episode for everyone—a testament to the unpredictably entertaining world of tech-driven tales.
Was this summary helpful?
Thank you for calling Hotline Hacked. Share your strange tale of technology, true hack, or computer confession after the B.
Anyway, when I was still allowed at that university foreshadowing, I ended up in a building on campus at 2.30 am. As if that wasn't weird and concerning enough, the building was also supposed to be locked. This building, let's call it Building 1, was rectangular with eight entrances, two on each side. It's certainly possible that Building 1 continues to be rectangular to this day, but I digress.
Each entrance was locked to the public after 10 p.m., but remained accessible to certain students and faculty who could unlock the doors with RFID cards. One night, walking home from the bar after last call, I saw building one. And as most normal people would in such circumstances, I was immediately compelled to buy the building, which, as I'm sure you know, entails walking around to each entrance and sarcastically, tapping my credit card on each RFID transceiver.
As I walked around to each of the eight entrances, I conducted my NFC acquisition procedure, each time seeing the RFID scanner next to the door flash red and remained locked. After tapping my maxed out credit card at the first seven entrances, I did the same to the eighth. However, this time the light turned green and the door was unlocked. After aimlessly wandering around the hallways for about 20 minutes, I heard a door from the stairwell open and a team of police and campus security came speed walking toward me.
They positioned themselves in a circle around me, presumably to reassure me that I was safe and not in any sort of trouble. They asked for my ID, but I was so frazzled and nervous that I forgot which pocket my wallet was in and told them I left it at home. The four of them began to ask me a series of questions at the same time, and eventually the officer standing behind me said, all right, put your hands behind your back. While I continued to stand calmly with my arms at my side, I asked what I was being charged with, and he said, uh, break an enter.
At that point, I explained how I had not broken anything. He seemed skeptical and asked, well, how did you get in here then? So I calmly explained that the door was already unlocked when I pulled it open and suggested that they might want to have that particular door serviced if that's an issue for them.
After continuing to not handcuff me, we all walked outside and I received a lifetime ban from the institution and all of its jurisdiction. I'm curious if you guys have any insight as to how a credit card could theoretically bypass an RFID locked door. Something, something buffer overflow, something failed open, something or something. Really appreciate your podcast. Take care.
Welcome back to Holland Hack. Welcome to Holland Hack. It's the Collin Show where you can share your strange tale of technology, true hack, or computer confession, such as trying to purchase a building that is still rectangular to this day with your credit card.
Hotline Hatch is brought to you by DeleteMe, something that we'll get to later, join deleteme.com slash hack. Something something buffer overflow. Okay, so we've got a caller, they're wandering around on campus, it's the dead of night, and they do a lap around a building tapping their credit card. Weirdly, this is not, I think, the first time we've had someone call in with a tail of buying a building by tapping a credit card on RFID on campus,
Are you familiar with this? Because the first time we got it, I thought it was an anomaly and now I'm realizing it's a thing. That's the thing that lands for me here is like, am I just culturally out of it? Is it like we're Canadian? Like maybe this is an American or British or German. We used AI to give this person a voice. This was a tech submission. We have no idea what culture they are. What culture is like, let's buy buildings. I'm just going to tap my credit card on RFID pads and like I take possession of it.
It's mine now. It's mine now. My credit limit is way too low to buy a building. I know that. So technically I have no idea what's going on here. I'm curious for your take on this. I do like the interaction with the cops. They swarm in, they put you in handcuffs, hands behind your back. It's an alarming experience if you've ever been through that. One of my being charged with breaking and entering didn't really break anything.
So, if he didn't break anything, do you have a sense of what he did do? Well, aside from what he's telling us, he did. Sure. Like, I'm sure we could sit here and theorize. Maybe there was an issue with the door. Maybe the RFID pad was, you know, having some form of problem, but like tapping your credit card.
which has an RFID chip in it, right? That's the thing. You're actually triggering the RFID handshake between your credit card and the pad, but it's then validating that against a database of authorized RFID IDs to see whether it will open the door for you or not. Chances are his credit cards are a FID ID.
is not going to be in that list. And if it wasn't in the list for the first seven pads, it would definitely not have been in the list for the eighth pad because they all probably look at the same database. So in reality, he probably was right. There probably was something kind of issue or he's lying and he broke into the building. Sure.
It is a pretty good thing to riff off the top of your head if you're standing there in handcuffs and the cop says, we're charging you with breaking and entering and you say I didn't break and enter. I tapped my credit card on the door and it let me in and I'm picturing like you've got a little bit of beer on your breath as you're saying this and none of them are quite tech letter enough to know if that's how any of this works. I feel like you would probably have more than a little bit of beer on his breath.
at three o'clock in the morning trying to buy a building with your max out credit card. I only ever do that drunk. I'll be honest with you. I've only ever tried to buy buildings. I'm going to start doing this. If I'm ever drunk again, I will immediately pull my credit card out and try every RFID pad I see.
Scotch is wandering around on campus, trying to charge a building to a visa. But here's the thing, the thing that I'm most surprised about is the response, because if lots of students and staff have RFID cards that do give them access to this building 24-7, then just seeing a student wandering through the halls of the building shouldn't have been that alarming.
Yeah, for sure. I mean, I guess was the building closed down for the night at that point, presumably? And how uncommon is it further to just have been a student who was left over? Like, I fell asleep at little cubicles inside of library buildings and stuff on campus.
more than once, and just snuck my way out. I'm assuming there's more to it than that. I'm assuming there's a security camera feed of a guy wandering, stumbling, let's just call it, around a building tapping a card against the thing. I'm guessing they had a little more evidence than just he was physically inside the building.
The thing for me is I had an RFID card, and I had 24-7 access to buildings on campus when I was in grad school to certain buildings, computer science faculty. And there were students in there all the time, especially that faculty. There's a lot of night owls in computing science. A lot of people that do some of their best work, and I am one of them in the middle of the night.
uh... yeah so to me it was just like having a student be present inside of a building that has twenty four seven access to students that have access to it seems seems like a
a large response for that, unless there was some other trigger for it. Yeah, I mean, this is probably unsatisfying for the caller who was genuinely asking if there's a technical explanation for how a credit card could open a door and we're just immediately jumping to assumptions that that's not maybe what happened. I just, I simply don't know technically how that could occur. And I'm going to make it worse right now because I'm also aware of the fact that there is a great way to open a locked door with a credit card.
Mmm, definitely done it many times. Done it many many times. The latch is inside of a thin little gap of a door that is a little bit thicker than a credit card, and you can just pop one of those bad boys in there. A fine butter knife works better than a credit card. Okay, yeah. That makes sense. And you're in an Airbnb in the little lock closet where they keep all the extra coffee and toilet paper.
Oh, just a little bit. That's a good one. Yeah, yeah. I've had to do that many times in every piece. You're, they put out one roll of toilet paper for like a week's day and you're like, come on, come on guys. And then you have to like break in and get more toilet paper. That's true. There is always the one little locked area. And normally I would just try and respect that boundary, but sometimes there's like a suggestion of a town on me. There's like a half of a towel when you get there and you're like, this is not, I can't abide this. Time to start tapping credit cards and buying cupboards.
So to loop back into a satisfying technical explanation, something buffer over what I already said is that given that you failed on seven things, there's no way that it was a random coincidence that your RFID handshake from your credit card was in the database of authorized RFID things.
So no, there's no technical explanation besides faulty, faulty infrastructure. Maybe there was, I have no idea, honestly, it could be. There is a, I think faulty infrastructure could express itself in a couple of different ways. One of which is that door was just open. Like I tap a thing on the door and it makes a beep noise and I go to open it.
And my brain makes the connection that I unlocked the door. And it was like, I wonder what would have happened if you would just turn to that doorknob prior to tapping the credit card. And the cops are already on their way because they saw a guy doing laps trying to buy a building. Thank you for reintroducing that concept to us because I might start doing it too. Yeah. So no, no satisfying technical response. I do think the Jordan's probably
suggestion is probably the most likely, which was that the door was actually just open. And happen, stance, matter of chance, tap your credit card on it, pull the door handle in the door. You convince yourself that you're tapping over the credit card, open the door. Which would inadvertently make your legal defense ironclad.
Yeah, opening a already unlocked door is even less breaking and entering. I'm not sure it's necessarily legal, but depending on what the signage things work, yes, that's a publicly accessible space, but that the access is limited to within time, whatever, we don't have to get into the legalese of.
of whether you broke the law or not. I'm glad that you didn't get charged, but it did sound like it might have had an impact on your educational pursuits as you got banned from the premises. Well, I'm glad you recovered from fourth-year engineering, which I also liked that opening line. And I hope you're doing well, Collar. I hope you've bought plenty of buildings in the interim. We appreciate the fact that you reached out. We wish you the best of luck on your cybersecurity, educational adventures, and thanks for your submission.
The Jordan, do you ever wonder how much of your personal data is out there on the internet just for anyone to see? I mean, you're talking about like my name, my contact info, my social security number, my home address, even information about my family members. Yeah, yeah, yeah. All of that stuff is being compiled by data brokers and then sold online. Anybody on the web can buy your private details. This facilitates identity theft, phishing attempts, harassment, unwanted spam,
You name it. I mean, that sucks. I hate that. But now you can protect yourself and protect your privacy. How? With Delete Me. Oh, heck yeah. I mean, it's people that exist publicly, especially people that share opinions online about buying buildings. I'm thinking about my safety and insecurity. It's easier than ever to find personal information about people on the internet. All this data just hanging out, being harvested and collected and resold by data brokers, it sucks and it can have real consequences.
And that's why we personally recommend to leave me. We do leave me as a subscription service that removes your personal information from hundreds of data brokers. They don't just do it once it's an ongoing service that constantly is monitoring data brokers information pools for things that you specify and removing it from those pools. And they'll let you know what they remove.
They do the hard work of wiping you and your family's personal information from data broker websites. So if you want to take control of your data and keep your private life private, you can sign up for delete me now to special discount for our listeners. Scott, how do they get a discount?
Today, and most of the days, you get 20% off your Delete Me plan when you go to joindeleteme.com slash hacked and use promo code hacked at checkout. That's the only way to get 20% off is to go to joindeleteme.com slash hacked, enter code word hacked at checkout. That's joindeleteme.com slash hacked, code word hacked. Sponsor of hotline hacked, highly recommend them, love them for being a supporter of the show, check them out.
Hey, Gordon. Hey, Scott. A fan of the podcast. Not a big fan, but a fan. Anyways, I think I have a pretty good story you guys like. Not a big fan, but a fan. A fan is just a big fan you haven't met yet. That's what people say. I'm a fan, but not a fan. Oh, yeah, there it is. There it is. So this caller brought us a lot of really great information, but a very funny story. We're going to summarize the first little chunk of it for you here.
They basically tell a story about their relationship with their little brother, who they code named Timmy. Let's just call him Timmy. Little Timmy was in a grade eight, and school had given him a lot of Chromebooks. Timmy! And it covers a long arc of starting when his little brother was in elementary school. He gets a Chromebook. It's a little bit locked down, so the brother helps him crack it so that his little brother can watch the YouTube on it.
A little brother gets older and older, some years past. He gets to junior high or high school and he gets a fancier laptop, a fancy little Lenovo with a touchscreen. And this time he wants to, I think it was play the frickin' Wii. You know what I really want to do? I want to play Wii. I want to play the
if we can we on this thing. Yeah. We emulate some classic titles, get some Twilight Princess going. Can we just stop for a second and say, what school is this kid going to where they are? Like every year he's getting like a fancier computer from the school. Next, he needs them to crack the VR, the Apple reality pro or Vision Pro or whatever it's called.
So the little brother gets a new computer, comes back to his older brother, he says, I want help being able to play. Play my Mario Kart, and the brother helps him out. Takes us through the details of how he cracked this computer. And we start to get a sense that this is sort of just a little recurring thing in the relationship, the tech-literate older brother helping out Timmy.
And it brings us to... I can't not do anything. It's very hard not to. Which brings us to the start of the story proper, which is where we're going to jump in, where this call or the older brother has an idea for a little prank. Fast forward, probably until, I don't know, April, May, the end of the year. I don't know how I came up with this idea. I just had this random-ass idea one day.
And I thought, you know, I'm just going to do a little prank on my brother since, you know, I helped him out with this esports thing and getting unlocking the entire laptop or whatever. So I'm just going to do a little prank, just a little prank. And so my idea was to create something I called the sound bomb. Basically what it was was a script that locked down the entire laptop and just blasted music at full volume. So to execute this though, I had to do a ton of testing on my own laptop.
The first issue, how to set the volume to 100% at all times. I found this command line utility called Sitvall, which allowed me to set the volume through the command line. And so I just set a badge script that looped every second and set the volume to 100%. And then another very important factor was choosing what music to blast. And I eventually decided on this piano man parody, which we planned. Sure.
I don't think I've actually listened to this yet. No, I didn't listen to it yet. You didn't listen to it? I listened to it. It's nine o'clock, four each other day, a regular crash. Okay. That's enough of that. That was $444,000. Oh, Christ. All right, Andy Salad. Okay, so he's decided on the piece of music he wants to play for this sound bomb.
Crank in the volume, looping the set vowel command to make sure that the volume stays max, even if you turn it down. And it sounds like he's going to hammer you with that beautiful, beautiful tune. Another thing I need to do, I need to disable the mouse and keyboard. You know, this is before the days of Jet Jippity. So I had to find somewhere. Okay. Pause it. Pause it. Jet Jippity. Sorry. Love that.
That was like a bolt of lightning, like we're cancel everything. Chachippity. Chachippity. Oh my god. Resume, but oh, keeping that one in my pocket. Chachippity. And stack of frozen scripts that actually worked.
And another thing I want to do was, I wanted this to be livestream. That's rude. Sound bombing somebody, locking their laptop, playing Maxwell, this insane cover of Piano Man. Funny.
Then also broadcasting it live. Oh, that's really true. That's pretty funny. I mean, once you get the shape of a joke in your head, it becomes like a checklist where you're like, and it would be funnier if the mouse didn't work and it would be funnier if the webcam turned on and it would be funnier if it's like a snowball rolling downhill. If it was broadcasting live and saving itself on exactly which he did send links to. And we're going to get to them.
So I got OBS installed and I managed to start it through the command line and also in the background and live stream to my own YouTube channel. I went like all out on this. I went as far as to disable the audio port. Soon if you plug something in, it would still play from the speakers. And then I also remember I tried my best to disable like the power button. Basically, I made it.
where somewhere in the control panel settings, power settings in there, instead of just tapping power button, you have to hold it down for a good five seconds. I just wanted to make this as annoying as possible.
I like these covering his bases, making sure that no matter what you try and do, he's still gonna bombard you with the sound bomb. I like that just the metric of success is just annoyance. That's like, yeah, that's, that's right. You're going down that road. This part of this old room was getting it on my brother's laptop. Um, since I was the one who unenrolled the laptop, I had set up a lookalike account for my brother. Um, so I knew the password is counting everything.
At the time, I wasn't like great at using the command line. So instead of connecting remotely with like SSH or DP, I decided to do this physically on the laptop. So so that meant like I had to find opportunity times where my brother would not see me on his laptop.
I just remember the best time for the setup and everything was when my brother would go to like a friend's house for a weekend. I just remember I had to sneak on his laptop a lot and there was a couple of close calls where he'd like go use the restroom and then I'd sneak on his laptop real quick and mess with some settings or whatever mess with the scripts and then I'd have to like right when I heard hear the door creak I just run off
What eventually came up with the trigger, the script was a scheduled task that would trigger in the morning on a school day whenever you logged into his account. I couldn't have tried to pray that he actually went to school on the day of the triggering. I remember I want to set up where it only triggered at the lap of connected the schools as this ID.
That's so that's so thoughtful too. Like it's so elaborate. I got to also say like there's so much attention went into this plan. It is it's such a good prank and it is the worst crime. It's like it's a suspect pool of one. He immediately knows who was responsible. Yeah, totally. I also love it. Like he just said that there that didn't know command line like very well back then. Clearly developing those through this praying. Yes.
And it's like, you know, he's talking about how he didn't use like a remote shell to connect into the computer and do it remotely, which he probably would now. So obviously he's been growing since this prank, which is good. And to set up and check to make sure that the computer is on the Wi-Fi before you execute the prank to make sure the live stream goes. Italian chef's kiss. Yeah, chef's kiss for sure.
But when I tested that on my own laptop and my own Wi-Fi, I just could not get that setting to work, which really frustrated me. So yeah, anyways, I had the test scheduled to trigger on a random day in May, and I was freaking hyped. The day of the prank literally felt like Christmas warning to me. It sounds like so much buildup that the payoff.
I can understand, like it sounds like you spend months planning and executing this. I would fine tuning the details, getting it ready. Yeah, sound bomb. I'd be freaking hyped too. It was the closest I've ever felt that 10 year old be waking up in the morning for presents. I was glued to my computer screen the entire morning, watching my YouTube account, waiting for my live stream to appear. Then at like around 9.30 AM, my YouTube stream appears with a very confused Timmy on the screen.
Unfortunately, the stream only lasted like six seconds. What I later realized was I totally forgot to disable the touch sensor, so my brother was able to exit out of the all of the scripts, just tapping the screen. I should have had all the scripts run in the background, but at the time I was just too lazy and incompetent. How's it?
It does not sound like he was too lazy, but it sounds like he spent a lot of time. I don't know, in confidence, the right word, I would say, maybe just... Learning, learning. I appreciate that he is relatively to his current knowledge. New less back then, but lazy. No one could accuse you of being lazy, sir. Yeah, yeah. So I just want to provide a little clarity for anyone listening to this, is that this caller, and boy, do I appreciate this, brought receipts.
So while we're not gonna share the video, and there's not really much audio in this first one, we do have YouTube videos of these live stream events. The first of which, labeled a failure, is a brief clip from the perspective of a webcam of a student opening a laptop with what looks like school windows behind them with a scowl on their face because a heinous version of Billy Joel's piano man is playing. And it lasts for about five seconds and then the video is done.
So this is the audio from that video. There you have it. You cannot hear the piano man though, which is the thing that I find surprising. So that could just be the noise cancellation from the built-in microphone, because it would be coming out the speakers. I wanted it scheduled for the next day, but had it scheduled the trigger on the same exact day. So my brother went to log into his account. It instantly triggered.
And yeah, I didn't know this at the time. I took it here. The music blasting in the background with rolls in my room, looking back at the live streaming reporting for whatever reason my brother started hiding in the basement in the inner closet. Apparently had suspicions it was me and didn't want me to know about it and just wanted to fix it himself. Of course, he eventually went to me once he realized he couldn't do anything. And so I first turned off the computer and turned it back on.
through like the accessibility button. But when I clicked on the ease of access button, it was not showing command prompt. You know, it was showing the normal accessibility settings. And so I thought, all right, I'll just put in a Windows install, you know, and access command prompt from there. But to my four, the tribe was freaking encrypted. BitLocker, somehow got installed. And to this day, I have no clue how I actually got on there without it, with it being unenrolled in the domain and everything.
But I think happened with some kind of MDM was on there and deployed some fixes or something. Like when I unenrolled the laptop, I didn't remove third-party remote tools I had, just because I didn't want to like raise any suspicions or whatever. So anyways, as a last-ditch effort, I tried using the stylist exit out of the scripts after logging in into my surprise that actually worked. Apparently, the touch sensor and stylist sensor are two different things.
And yeah, from that point forward, my brother watched over his laptop like a hawk. He would not be anywhere near it, breaking many, many years of trust we had. I feel, I feel like this person breaking many years of trust we have, having done a reparable harm to my relationship with my brother.
I love how he'd lock the computer up so well that he almost couldn't get access back to disable it all. And this person clearly has gone into a career in IT, like just his use of acronyms, like MDM, like mobile device management software, so like an enterprise or school district would have like an MDM running to deploy remote patches and fixes and changes to the thing.
So it's like, yeah, like this person's skills definitely developed on, and you can tell that they've gone on to a probably a successful career in IT, which is always a positive output of these names. But their relationship with their brother has never been the same. Yeah, he was non-vided to the woman. And so, yeah, that's my un-little story.
until fast forward to my brother's senior year of high school. He's in 12th grade now. The trust is just starting to be rebuilt. Yeah, we're slowly rebuilding the relationship. Trust is coming back. And then what happened? He asked me to unenroll it and put games on it again, even after what had all just happened before. He just, I don't know, he didn't care.
Yeah, I guess my brother has, like, the memory of a goldfish or something. All I could think about was finishing what I had started. All I could think about was finishing what I started. My grand vision was not fully executed, and I needed to embrace it and adapt it. You liken the first version of this to Christmas morning for a 10-year-old, and I'm just, it's like, yeah, it's Christmas in June kind of situation. Someone walks into your room with a big old present.
This time around was much better with the inline and I had backdoor counts and hope it necessary. RDP installed and set up 99% of the scripts remotely. There's a couple things I'd go on the laptop for. I think OBS was hard to set up remotely. Some of the task scheduling, even after triple-checking all the scripts and settings and the task trigger conditions, my script refused to go off. It was not triggering.
The task was all screwed up or something. So I started doing some troubleshooting in the next morning and accidentally set out the script. Basically one of my trigger conditions was for any user to log in when it should have just been Timmy's account login that triggered the task. And so the whole thing went off again at home at like six in the morning and it was triggered when I like RDP'd into one of the backdoor accounts.
RDP remote desktop, so he like remote desktoped into this thing to see now. And yeah, my brother was really pissed off and he didn't say much. Just kept telling me to fix it so we could go back to sleep. And so yeah, I failed twice. He never got a chance to pull off the sound bomb, unfortunately.
Surprisingly though, my brother still asked me for help with his laptop. I have not firmly broken his trust yet. Anyways, wait till he finds out you told this story to like a hundred thousand people on the internet. Yeah, that's my story. Thanks for listening. You better put this on the next hotline hack or I'm going to cancel my monthly donation of two dollars USD. I know that's a lot of money in Canadian dollars. Thanks.
See, he said he wasn't a big fan, but he's a patron. And it means the world to us. I also just like, and I haven't broken his trust yet, which brings us to the final video of the scholar's submission, which is
I mean, it's a video of what he described at about it. It's a black screen because the laptop was closed for about the first minute and a half at which point a webcam opens. And there's, yeah, what looks like a high school senior lit by the eerie glow of a lap of a Lenovo laptop screen frantically trying to get a heinous version of piano man to stop playing. This is this is an achievement. I got to say this one's this one made me really happy.
See, but he says he failed. I, yes. But he did not. I feel like he succeeded. He did not fail. But here's the other thing that I find funny about this. It's just how calm Timmy looks in this video. Like Timmy, Timmy knows what's going on. He's not like shocked by it. He's like, like fucking asshole. Like that's the look on his face. But this is, this is a portrait of a man on the brick. I'm really sure.
It's like a creepy fast stuff
It's really good. And I know this is unsatisfying to listen to people laugh at a video that we for ethical reasons cannot share. Breath gorgeous. It's probably shouldn't even be watching. It's really funny though. And in a second you get... Oh my god. Click forward. I just want you to see this even if we don't include this audio. Is it click forward in the video? Because I think you see his brother come in. If I'm reading this right.
Yeah, so part way through the video the lights of the bedroom crash on and what I think is a second person who I'm assuming as the caller comes in with a look on their face.
that reminds me of when I saw someone get arrested on an airplane, like a person being caught. Because he ostensibly was in the other room remote accessing in, and then here's the music start blaring through the thin walls of their house, and comes rushing in with this really intense look on his face, trying to shut it down. The brother's not confused about who's responsible for this, just looks angry. It's really good. Kudos to you, Collar. Yeah. Kudos to you. You did it.
If you haven't broken his trust yet, that, I mean, I don't know what will, but that's pretty fun. You clearly learned a lot doing this project and you've clearly come a long way since, so. It was a learning opportunity, really. Yes, I love that you collected the receipts that you streamed to Tierra YouTube and kept those videos unlisted. The fact that you took a trophy from it is
is, well, criminal-esque, but still very good. Yeah, appreciate you. Appreciate calling in. Appreciate you being a patron. Appreciate you sharing the YouTube links, which brings me to the fact that we now have a YouTube. We do. YouTube.com slash at symbol.
Hacked podcast. It's been up for about two weeks. I think there's 20, some hundred of you have managed to find it, follow it, some new people, bunch of new viewers and content. So we're putting up an episode from our back catalog every day.
I think we're on episode 14 right now up on recording. So by the time this comes out, it might be a few more. Go check them out. It's been actually really fun to listen to the old episodes. We've had some comments and feedback from a lot of listeners that say, hey, you know, I completely forgot about the old episodes. They're great. I love them. So please go check it out. Like and subscribe. That means a lot. Like and subscribe. Smash that like button. Why don't you? Smash the like button. Hit the sub in the notebell.
Yeah, we're trying to get to partner. We've got a bunch of plans for YouTube this year and next year, all of which require us to be partners to add us. So we're healthily past the subscriber requirement and now we're grinding our way through the hours watch requirement. So hopefully we hit those both sooner than later and we can really get to work on our YouTube channel.
And long kind of archivit is going to be there's content going up there that is different from the podcast eventually. It's a point eventually eventually. And that's something that we're really excited to be building just so we can bring more different types of hack to feel like the show has changed shape and tried different things over the years and adding a visual channel to it on Spotify YouTube wherever you watch video is going to be a lot of fun.
Yeah, we've all the back episodes. We've kind of done this really cool ASCII art rendering. So Nick, a friend of the pod and colleague of ours did the animation and rendering for them. So they all have this like hacked visualizer for each episode of the back catalog.
We brought it on front of the pod Matthew who's gonna be helping out with some of the original content pieces that we're gonna be working on so we're Planning to do great things on YouTube to be part of the YouTube Generation one foot in in the audio one foot in the video So and you know just as like another thing is cat meowing we have been video recording us making these podcasts for a few months and
Whether that means that the more recent episodes once we get to them are actually us. Could be a thing. We'll see. We'll see. We're playing around with templates, concepts, formats for how to do it, given the fact that Jordan is in another part of the country. We do record them online.
So we're not sitting in the same room as much as we'd love to be so maybe we need to do some in the same room episodes So if you have any if you have any ideas for really cool guests that it would be worth us all Convening together to talk to get at us at get at hacked podcast. We'd love to hear about them Hey guys Big fan here Enjoy the work you guys do So listen to you guys
because I was looking for something similar to dark antirees, which I know you both really enjoy as well. But probably don't need to obfuscate my voice for this one, something super serious. But I'm a college student in the States, and I'm in a fraternity at my school. So I live at this fraternity house, and to give you as little context about the whole situation.
We have two houses, we'll call them Main House and then Second House. We have one driveway that right across the driveway from each other. But, you know, as the fraternities get up to, like, we can range. Shocker. First, I'm hearing about it. And there's usually drunk people around our house, which is not really a surprise. Most of them are just like the brothers that actually live there. But the Second House,
They have this ritual you could call it of getting drunk and basically trashing the main house, which is where I live.
Well, you've clearly oppressed them and kept them in the second house. This is a revolt against the ruling class. This is kind of a snow piercer situation, the back of the train raiding the front. Also, the most creative use of the word ritual I've ever heard. I was on the third floor, and we have a shared bathroom for the third floor. One day, that is a very repeat offender from the second house that was drunk.
or intoxicated and, uh, he decided to trash. I like the clarification there and drunk or intoxicated. He may not be drunk. He may not have drank something, but he's definitely not sober right of mine. He's not sober. Main house. They're pulled bathroom at like four in the morning when no one was awake and I had my toiletries back in there that he just chucked out the window. He was on the roof. It was gone.
Um, that kind of gives the context of why I decided to do what I did. Um, is this like the prank and get back episode? Yeah. It's, it's always funny when someone's halfway through a call and they do that moment. They're like, so anyway, that's why I did what I'm about to tell you about that inspired this. So obviously I was mad. Um, I had, I think like a couple of expensive colons in there.
That my brother and my mom had gotten me by birthday, so I was pretty pissed and I was like how do I? Remedy this situation because obviously the person who did it didn't own up to it and like you can go through like you know like I don't know If you guys can relate to this at all the like fraternities you they have like a judicial board system Which is like a within the house like I guess court system. It's really stupid It might work for someone ever turn he's but it's just
a joke, really. So like the person did not up to it. He wasn't going to get J boarded. So I mean the rest of the main house. We all band together. We're like, like, let's take action. So it like we're Canadian. Canada doesn't have nearly the fraternity and sorority system that is so popular in the States. We have them, but they're like a pale limitation of the American system, which is quite robust from what we understand.
So yeah, well, we've never been a part of them. The one thing I will say that I did not know is that they have their own Judge jury and what sounds like executioner inside of them. Yeah, like you mess around inside the frat and the frat like
has its own tribunal system. I mean, I did not know that. I mean, given that the story starts with the framing of there's two houses, one of which has a ritual of getting drunk and trashing the main house, I'm going to go ahead and say this is a little bit of a kangaroo court situation. Given the extra judicial vigilante justice, I smell coming around the corner. I'm a computer science student, so I know my way around a computer. And first thing I popped into my head,
was uh hey uh let's uh let's doff them i'll i will doff them uh which is a stupid thing to do or even think of but you know um denial of service knock them off the internet i'm sure everybody listening knows but just so you know it is what it is that's my point of action so i googled
How to commit a DOS attack? This is going bad places, I feel like. Go listen to DDoS for hire. I'm sure we're about to get there. I had knowledge of what a DDoS attack was, but a simple DDoS attack I wasn't really too sure about. So I literally found a tutorial about how to do it. And I went through the whole process of
watching the video, reading the tutorial, uh, setting up like the virtual machines and stuff like that. And then I realized, uh, I needed like an external Wi-Fi adapter and those things are, uh, they're not too sure. They're like 20 bucks. And I was like, am I really going to spend 20 bucks? So I'm trying to like, dawth second house and being the immature college crack guy that I am. I was like, absolutely. Yeah. I'm spending the $20. So I spent the $20 and I'm probably trying to lend the attack.
I realized that the Wi-Fi adapter I got doesn't even support monitor mode, which if you know what that means, it's like some technical thing where you can inject packets to a router, some of them. So I had to spend $20 more. I returned the other one. And I got a compatible Wi-Fi adapter, and it was working. And then I got just so involved in it that I realized that it was only working for certain
gigahertz network. So the second half had their Wi-Fi. So Wi-Fi networks, depending on the version, there's 2.4 gigahertz, 5 gigahertz, and now 6 gigahertz with Wi-Fi 7. So what I think he's running into is that he was capable of dossing out maybe the 2.4 or the 5 gigahertz channel, but the failovers that all the devices would just knock themselves to a different channel. I think that's what he's explaining. So right now. So the talk was ready. So I literally like sat in
one of my friends' room who was a, he was, I guess like a neutral party in the second house versus main house complex. I sat in his room on like the entirety of Sunday and I was running this entire attack and everyone was in their rooms like watching football and they're all complaining because like a standard, the authentication attack is just like it disconnects your device from the Wi-Fi. The funny thing is really like iPhone devices
is that when people would get disconnected, it would prompt on my phone, like, do you want to share the Wi-Fi password with this person? And I was getting that the entire day. Eventually, it turned off like Wi-Fi. And I thought it was pretty funny, because the wall was super thin. It's an old house. It's a frat house, not super well kept. And I could just hear them complaining, like, yo, what is wrong with the Wi-Fi? It was really funny. Unfortunately, the cable locks still work, so they're still able to watch football in some of the rooms. The streaming TVs weren't able to.
I didn't want to go for the cable box because I didn't want to get like our internet service provider involved. But yeah, that's basically like my putty come back to them throwing my stuff out the window. It's pretty nerdy. No, I guess not what you expect from that guy, but I do go to like a tech school. I guess the funniest part about it all is that I ended up using those Wi-Fi adapters for
my senior project that I needed to graduate. And I was doing some stuff with like, bro, Wi-Fi networks. So, ultimately, it gave me good experience for what I needed to graduate. But yeah, I really love the show. Thanks again.
There's always that payoff, you know? It seems like so many of these end up with like, yeah, you know, I wanted to do this thing, and I did this thing, and maybe it wasn't so good, but I learned all about the Wi-Fi protocol, and then I did my senior project on it and graduated, and now I'm a computer scientist. Yeah, sure, how to make it to the C-suite, some silly shit I did in college.
I love his apologizing for being the frat guy, too. It's like, come on. There's a lot of frat guys out there. Don't worry about it. Yeah. A lot of frat guys even in computer science. I would say that the frat and column site circles overlap. It's not quite one circle then diagram situation, but there's some overlap between those, between those. Not a ton, but a bit. I remember when I was in competing science school. Very male dominated academic program.
So a lot of frat dudes, even in a country that had no frats really, then frat membership was non-existent. There was still a decent amount of frat dudes in my computer science class. Yeah, there was one major frat on the campus of the school we both went to, and it was like a little baby version of a big frat.
Like it was sort of the one that sat in for the entire Greek culture of fraternities on our campus. And it kind of had the same vibe of this, a bunch of people sort of both really close to one another, but also shit talking and pranking each other with just like a deluge of liquor kind of constantly sloshing around inside of it. I like the mention of the repeat offender from house two who was drunk and came in and
It just tossed a bag of toiletries out the window. The level of chaos that this is a repeat offensive, just like this guy like Tasmanian devils his way into your goddamn house, starts throwing shit out the window. It's like, this is not sophisticated. Destroyed valuable things. No, this is not like the animal house elaborate pranks. Yours was way more elaborate than Guy just came in and threw thing out window. People way more thought into it than he did. I do like that it seemed like he'd spent
A bunch of time prepping for this attack. Figured out how to do a bunch of de-aughts and knock people off Wi-Fi. Waited for the big game, you know? Went and bought a bunch of accessories that he needed to execute it, set it all up, and then was successful in his like afternoon attack, except for that it did nothing because everybody still watched the football game on the TVs. Bingo. Just people were complaining that they couldn't like scroll Instagram or like TikTok or Snapchat while they were watching the game.
But you know, I'm happy you learned something from it. I'm happy you learned something from it. It's a good goof. It's an elevated goof. It's pretty innocent. It's pretty innocent compared to a guy destroying property. I think that's a good thing. I think that a level head and not too much of a temper would serve you well across the rest of your life. In your future, she used to be positioned. Precisely.
Hi, Jordan and Scott. Firstly, I just wanted to let you know that your podcast is one of the best I've ever heard, and I always make sure I tell my friends about how good it is and how interesting they find the topics you guys discuss. Secondly, I just want to put it out there that I
Never did any of the hacks I'm about to discuss. I'm not technically confessing anything. I'm just sharing some stories. Of course. Yeah, this is all hypothetical. Hypothetically, yeah, hypothetically. Didn't do anything. Donnie Dobbs gave my voice because I'm just recounting tales I heard in the pub. It's sort of an improv exercise we do here at Hotline Hacked.
So my confession is, I'm from Australia. This is not a confession. This is just you telling us a story, remember? Yeah, you were so close. You were so, so close to get away with that scot-free. And back in the late 80s, early 90s, there were these little orange payphones that were all around.
the country in small businesses mostly and it had a little hack where if you lift the receiver and you push the follow-on button down and then push the receiver down again the
Phone would use audio commands to say when it had hung up and you could trick the phone into keeping the dialer active. Classic phishing. He provided us with links to the images for what these phones looked like. They are hilarious looking. The industrial design of this is great. It's like a big old like stick of butter. Gold phone. Gold phone. They are honestly, I can see them making a comeback is like a retro device.
Did I get a new home phone? Get a gold phone. They'd blow up in Australia, I'm sure. You'd lift the receiver, hit the follow on and then push down the receiver and then you'd still have the dial tone available to make a call after that free phone call. You know, like this, the
the timing i used to get that to happen is catching so back in the day it wasn't trademarked as a name for any particular companies that might sponsor certain shows are you could just. He's talking about sharpified to see nothing that would be the.
that would be the timing, catching to get that to work. Now these phones started getting phased out and the major telco in here started installing a new model of payphone. So just to hang on that for a second, this was very similar to how
like old pay phones in Canada and the United States used to work. So like you'd pick up the receiver and actually putting a coin in caused an audio signal to go over the line back to the control, like back to the telephone switching, which actually activated a real line. So you'd put a coin in, the internals of the phone would send an audio signal across the phone line, which would then tell the control center that the phone line was active or needed to be active.
So the microphone on the handheld devices was often still live. So you could just play that audio signal into the phone, which would then essentially tell the control center to activate the line. As though a coin had been put into the phone. As though a coin had been put into the phone.
So, so payphones have always been a point of less obviously now that everybody has phones everywhere. Sure. But back in the day figuring out like the old fishing club and crew spent a lot of time figuring out and hacking with payphones. So it was a pretty interesting thing back then. So I'm excited to hear the next bit of the story. Now the new model obviously you couldn't do the coaching on it anymore. But what you could do is if you had a straw, you simply flattened it.
and then you could slide it into the refund slot just above where it enters and knock out your coin and the phone wouldn't know. So you could make free phone calls. So that was, yeah, my two little hacks back in the 90s. If you went to any payphone in Australia and you reached behind the phone, you would pretty much be guaranteed to find a straw in there. Anyway, the telco.
picked up on it and um had to change the the way it was manufactured and it got fixed um and now all calls are free on payphones so there you go it's uh moving with the times have changed anyway i love the show and that's why confession
Well, thank you for calling in. Love you too. Glad you're a fan. I like that this episode so far we've had what can really only be described as campaigns of terror.
a sound bomb, a DOS attack between these two frat houses. I figured out how to make a quarter's worth of phone call for free. The campaign part of it sounds like the fact that everybody knew how to do it, which is why there was always a straw wedge behind the phone.
Yeah, that's true. I feel like at a certain point, you just leave the straw inside the booth for the next person. You just pay it forward. So it also does sound, and we obviously don't live in Australia, but it sounds like, and I've done a bit of reading, and this is that the payphones are still existent in Australia.
And they are free because they're considered like essentially an emergency service device. Oh, yeah. So they're not really there to, I don't think, you know, be used for the way they were used in the 80s and 90s, but they are still there just in case people need to make a call and don't have access to a phone. Yeah, which is interesting because that is not the case in North America.
No, I was going to ask, do they only contact emergency services or do they just have the good sense of saying like, you know what, maybe you desperately need to make a phone call. There can be free phones for people. Yeah. Yeah. And it's a great idea. Yeah, exactly. So the something that we should adopt here, and I would say when he said he reached behind them,
You used to on certain models of them actually be able to reach behind them and find the actual RJ cable, like the actual phone line. So back in the old days, when you actually had dial up modems and laptops that had modems built into them, you could actually go into some phone booths and unplug the pay phone and just have a raw phone line. Oh, cool. Yeah, yeah. So yeah, pay phones. Always been a hacker's plaything, I think, as long as I can remember.
Yeah, I've always loved the idea of that kind of signal jamming where you play a piece of audio that reproduces the audio signal that is sent, I guess, through the phone company to make stuff happen. I always thought that was so cool. It's just very intuitive. I think in some of the earliest episodes we talked about that concept, it was one of the first things that maybe grasp this larger world we were diving into.
was that you could just make a thing do a thing it wasn't designed to do. By mimicking the thing that it was expecting. Yeah, totally. Exactly. That's really cool. The gold phone. And again, give this, give these things at Google. I don't know what comes up when you Google gold phone Australia, but if you see a big old, big old yellow rectangle, you found the right thing and they're pretty fantastically.
Okay, well, I think that is another episode of hacked Hotline hacked brought to you by delete me brought to you by delete me go to join delete me comm slash Hacked code we want to get your discount And then if you want to shoot code word code word hack code word hacked yeah, yeah my bad code word hacked
uh check out our youtube ad hacked podcast check out our patreon uh patreon.com slash hacked podcast you can find all this hot at a hacked podcast dot com and again if you want to share your story we have a we're developing a little bit of a back catalog so if you've submitted stories there's a few folks that have submitted multiple
It's not going unread. We've got a lot of these things. It's pretty exciting for us. And if you want to share yours, do go to HotlineHack.com. There's a phone number. There's an email submission. You can send in text. You can send in AI audio. You can call in.
If that's your vibe, we'd just love to hear from you. Because for... It's our vibe. It's our vibe too. We love weird tales of tech. And there's something I particularly love about this, like the Hotline hacked episodes, like just hearing from people in the creative things that they do. It's like so satisfying. And especially like, this is just as I'm getting older and more sentimental. It's always lovely to hear like,
Yeah, when I was younger, I did this crazy shit. And now I'm the Chief Technology Officer for Bank of Zealand, and it's like sweet. We contain multitudes. Yeah, yeah. It's a lot of fun. Just getting to listen to these calls and meet here and from folks that listen. It's great. We really appreciate it. Totally. Keep them common. Thank you for listening. We'll catch you in the next one. Take care.
Was this transcript helpful?
Recent Episodes
The Year of Quantum

Hacked
Quantum computing raises big questions—about security, power, and who benefits as the technology advances. To kick off 2025, the International Year of Quantum, I sat down with Joan Etude Arrow—Founder and CEO of the Quantum Ethics Project and a Womanium Quantum Solutions Launchpad Fellow—to talk about what’s real, what’s next, and why it matters. This is our chat with Joan Etude Arrow, here on Hacked. 🔗 More from Joan: quantumjustice.bsky.social Learn more about your ad choices. Visit podcastchoices.com/adchoices
February 02, 2025
US Soldier Arrested for Hacking + Honey Plugin Scandal + Listener Creates Bitcoin Pizza Website

Hacked
New Youtube channel announced for 2025 ("hackedpodcast"), with reference to a devoted site based on an expensive pizza delivery tale.
January 16, 2025
Throwback: The Phantom Orchestra

Hacked
Interview with music professor Meryl Goldberg about Cold War intrigue, hidden codes, and Klezmer music, first aired in June 2022.
January 01, 2025
Hotline Hacked Vol. 8

Hacked
Discussing grocery points systems and Australian internet providers with caller stories (Hotline Hacked). 20% discount offer for DeleteMe service through joindeleteme.com/HACKED with promo code HACKED.
December 23, 2024

Ask this episodeAI Anything

Hi! You're chatting with Hacked AI.
I can answer your questions from this episode and play episode clips relevant to your question.
You can ask a direct question or get started with below questions -
What was the main topic of the podcast episode?
Summarise the key points discussed in the episode?
Were there any notable quotes or insights from the speakers?
Which popular books were mentioned in this episode?
Were there any points particularly controversial or thought-provoking discussed in the episode?
Were any current events or trending topics addressed in the episode?
Sign In to save message history