mailing list archives
Re: Polycom hacking
From: Paul Schmehl <pauls () utdallas edu>
Date: Tue, 26 Jun 2007 13:37:02 -0500
--On Tuesday, June 26, 2007 14:15:51 -0400 "J. Oquendo"
<sil () infiltrated net> wrote:
Paul Schmehl wrote:
Is anyone aware of any work done in the field of hacking Polycom
video-conferencing devices? Or any known hacks for Polycom devices?
I have a modified version of Asteroid lying on one of my
servers that affected Polycoms, Snoms, Hitachi WiFi's,
and possibly a few others.
Offhand you could with high probability generate a hangup
DoS if you know enough about the network topology. E.g.:
BYE sip:victim.phone.com SIP/2.0
Via: SIP/2.0/TCP spoofed.pbx.server.com:5060
From: Spoofed <sip:spoofed.pbx.server.com>
To: VICTIM <sip:victim () victim phone com>
Call-ID: $GENERATE_CID_NUMBER () victim phone com
CSeq: 1 BYE
You could take a look at Asteroid and target a Polycom
with it. I haven't bothered much with them. Cisco's
aren't vuln to much I've thrown at them yet.
(greetings Dario () ^C*).
As for video (H323) check out voippong: You may be able
to intercept the audio streams out of the conference
depending on the setup. (Asterisk doesn't do H323)...
Maybe a combination of Yates, VoIPPong and others. HTH
Thanks. I'm not that interested in DoSes, but I'm thinking that you could
mget the entire contents, alter them to your satisfaction and then mput
them. Don't know how much memory these things have yet, but you ought to
be able to iframe silent installs of malware, script the capture of all
audio and video traffic from/to the device, etc. Could be quite
Paul Schmehl (pauls () utdallas edu)
Senior Information Security Analyst
The University of Texas at Dallas
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/