Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
38
hpr_transcripts/hpr0426.txt
Normal file
38
hpr_transcripts/hpr0426.txt
Normal file
@@ -0,0 +1,38 @@
|
||||
Episode: 426
|
||||
Title: HPR0426: Hacking Sprint Voicemail
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0426/hpr0426.mp3
|
||||
Transcribed: 2025-10-07 20:16:46
|
||||
|
||||
---
|
||||
|
||||
music
|
||||
music
|
||||
Hello, thanks for listening to Hacker Public Radio. I am your host today, Will Jason.
|
||||
That is J-A-S-E-N. Everybody always confuses. What I'm going to talk about today is how
|
||||
to access Sprint User's Voiceman. Now, when I say Sprint Users, it doesn't
|
||||
necessarily mean that you have to be on the Sprint Network. You just have to know, I
|
||||
guess, your target within the Sprint Network. Their phone number really is all you need.
|
||||
I came across this because I was talking to a former English professor on my cell phone,
|
||||
but my battery kept on, so I told her, hey, I will set up my IP phone, and I will call
|
||||
you back. Unfortunately, the server I have, Astros on, I have had done some reconfigurations,
|
||||
so Astros wasn't working functionally as far as getting my phone to work. Within 15 minutes,
|
||||
I was able to get my phone up, and I was going to call her. But before I did that, I wanted
|
||||
to set my own caller ID, because she is very picky about if she doesn't know the number
|
||||
that is calling, she won't pick up. I called, but she didn't answer. So, just to be
|
||||
sure that my caller ID was being set correctly, I called my own cell phone, or I attempted
|
||||
to anyway. Instead of calling my cell phone, it actually went straight into the voicemail
|
||||
of my account. At first, I didn't really realize the severity of this, but it quickly
|
||||
slipped into my mind. I can probably do this to someone else's, so a friend, I also entered
|
||||
his number as the outgoing caller ID, and I called his number, and sure enough, it went
|
||||
straight into his voicemail. Now granted, I didn't listen to his voicemail, I just made
|
||||
sure that it would come up. I also tried a couple of other friends numbers on different
|
||||
networks, but those networks, they seemed to block it. In fact, I tried all-tell, and
|
||||
I tried Virgin, and instead of going into voicemail, instead of ringing the phone, it actually
|
||||
appears to just ring infinitely, or a really long time until somebody hangs up. This is
|
||||
a perfect example of security through obscurity, and it demonstrates why it does not work well.
|
||||
One is assuming that nobody is changing their caller IDs, and calling their own number.
|
||||
However, in this case, I stumbled across it, and luckily, I'm not a very malicious person,
|
||||
but as I think we all believe here at HPR knowledge is power, and knowledge should be free.
|
||||
But that's it. This concludes another hacker-public radio. Remember that HPR is community driven,
|
||||
so that means that anyone could submit an episode. I'm Old Jason, and I remind you, complete
|
||||
the pattern, solve the puzzle, turn the key.
|
||||
Reference in New Issue
Block a user