exploit the possibilities
Showing 51 - 75 of 239 RSS Feed

Telephony Files

GNU SIP Witch Telephony Server
Posted Jul 22, 2008
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Introduction of cgi control interface, server state support and use of state.xml config to set state properties, and more.
tags | telephony, protocol
MD5 | e9f61984910512e70c5c4f354ebefb9f
iphonedbg-toolkit-1.01.tgz
Posted Jun 17, 2008
Authored by Nicolas A. Economou | Site oss.coresecurity.com

The iPhoneDbg Toolkit is a set of tools that will enable you to delve into iPhone binary reversing. The iPhone Debugger allows you to debug running or newly-created native processes inside iPhone. The Library Loader Patcher will allow to debug iPhone libraries. You can also build a tunnel from your PC to your iPhone through USB.

tags | telephony
systems | apple, iphone
MD5 | 9ae4ad8c0a267d937a21a3a771c0ccdf
teldir-sqlxss.txt
Posted Jun 9, 2008
Authored by CWH Underground | Site citecclub.org

Telephone Directory 2008 suffers from SQL injection and cross site scripting vulnerabilities.

tags | exploit, telephony, vulnerability, xss, sql injection
MD5 | 7188819e68d52eff45ed162ab1c21c1a
GNU SIP Witch Telephony Server
Posted Jun 6, 2008
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Added plugin support, zeroconf, and scripting plugins.
tags | telephony, protocol
MD5 | 44647e3d57e7a5ed4125d2edd6e44d7c
sipvicious-0.2.3.tar.gz
Posted Jun 4, 2008
Authored by Sandro Gauci | Site sipvicious.org

SIPVicious tools address the need for traditional security tools to be ported to SIP. This package consists of a SIP scanner, a SIP wardialer, and a SIP PBX cracker. Written in Python.

Changes: Multiple features added including fingerprinting support for svmap. Included fphelper.py and 3 databases used for fingerprinting.
tags | telephony, python
MD5 | 4665134f2d6bd0595e771b4f1af7adcf
GNU SIP Witch Telephony Server
Posted Apr 24, 2008
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Introduction of system and anon user identifiers. Support for SMS message generation. Various other additions.
tags | telephony, protocol
MD5 | caf97dbd9cac8e46eef2f74db456a3de
GNU SIP Witch Telephony Server
Posted Apr 18, 2008
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

tags | telephony, protocol
MD5 | 51e2a2968890a6ce438751e372e434bc
sipvicious-0.2.1.tar.gz
Posted Nov 7, 2007
Authored by Sandro Gauci | Site sipvicious.org

SIPVicious tools address the need for traditional security tools to be ported to SIP. This package consists of a SIP scanner, a SIP wardialer, and a SIP PBX cracker. Written in Python.

Changes: Session state is now saved and svmap supports sending INVITE to particular extensions. The rest are mostly bug fixes and stability.
tags | telephony, python
MD5 | a41df16fef97293f0623b1c59390b545
sipvicious-0.2.tar.gz
Posted Oct 10, 2007
Authored by Sandro Gauci | Site sipvicious.org

SIPVicious tools address the need for traditional security tools to be ported to SIP. This package consists of a SIP scanner, a SIP wardialer, and a SIP PBX cracker. Written in Python.

Changes: Multiple features have been added and tweaked.
tags | telephony, python
MD5 | 44fbe866d585c9cf0bab8da89a7f5173
alltypes.txt
Posted Aug 24, 2007
Authored by Laurent, Stephane

Text file discussing electronic telecards and GSM.

tags | telephony
MD5 | 23d7b899453ef201cd0da6b5e9493688
sipvicious-0.1.tar.gz
Posted Aug 1, 2007
Authored by Sandro Gauci | Site sipvicious.org

SIPVicious tools address the need for traditional security tools to be ported to SIP. This package consists of a SIP scanner, a SIP wardialer, and a SIP PBX cracker. Written in Python.

tags | telephony, python
MD5 | b2036174fbd7c6630f557f801df6560e
rus-cert-2007-0601.txt
Posted Jun 10, 2007
Authored by Oliver Goebel

The built-in Mini Switch in Alcatel-Lucent's IP-Touch Telephones under OmniPCX Enterprise 7.0 and later allows unauthenticated access to the voice VLAN in IEEE 802.1x-authenticated environments.

tags | advisory, telephony
advisories | CVE-2007-2512
MD5 | 0e6296f88ddd0c7fc892c59a7eaf8680
vonage-default.txt
Posted Jun 6, 2007
Authored by John Martinelli | Site redlevel.org

It appears that the Vonage VoIP telephone adapter comes with an embedded login of user with a password of user.

tags | exploit, telephony
MD5 | 287152eb5053927b6c94ea0ba0415035
Debian Linux Security Advisory 1229-1
Posted Dec 7, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1229-1 - Adam Boileau discovered an integer overflow in the Skinny channel driver in Asterisk, an Open Source Private Branch Exchange or telephone system, as used by Cisco SCCP phones, which allows remote attackers to execute arbitrary code.

tags | advisory, remote, overflow, arbitrary, telephony
systems | cisco, linux, debian
advisories | CVE-2006-5444
MD5 | 97d9169c0e99839747e13c57e0ae6877
Debian Linux Security Advisory 1048-1
Posted May 1, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1048-1 - Several problems have been discovered in Asterisk, an Open Source Private Branch Exchange (telephone control center). Adam Pointon discovered that due to missing input sanitizing it is possible to retrieve recorded phone messages for a different extension. Emmanouel Kellinis discovered an integer signedness error that could trigger a buffer overflow and hence allow the execution of arbitrary code.

tags | advisory, overflow, arbitrary, telephony
systems | linux, debian
advisories | CVE-2005-3559, CVE-2006-1827
MD5 | 76727097288d6e1012caa084e65f4920
vomit-0.2c.tar.gz
Posted Jan 5, 2004
Authored by Niels Provos | Site vomit.xtdnet.nl

Vomit, or voice over misconfigured internet telephones, is a utility that converts a Cisco IP phone conversation into a wave file that can be played with ordinary sound players. Vomit requires a tcpdump output file.

Changes: Requires libdnet.
tags | telephony
systems | cisco
MD5 | c36f9da7a72aa84712f2d17b8021da2e
tonengenerator.txt
Posted Sep 29, 2003
Authored by ThEcYnicaLonE

Simple tone generator script that will play the 2600Hz blue box tone on an HP39G graphical calculator.

tags | telephony
MD5 | d228321d2321dc6a43c908c8c454b154
vomit-0.2.tar.gz
Posted Sep 25, 2003
Authored by Niels Provos | Site vomit.xtdnet.nl

Vomit, or voice over misconfigured internet telephones, is a utility that converts a Cisco IP phone conversation into a wave file that can be played with ordinary sound players. Vomit requires a tcpdump output file.

tags | telephony
systems | cisco
MD5 | c81cd977ade651d9050f98326879dea0
cuts-0.01.tar.gz
Posted Oct 30, 2002
Site codewar.net

CUTs (cellphone unix terminal) is a procmail hack that allows you to use a normal cellphone's messaging capability as a Unix/Linux terminal from anywhere.

tags | telephony
systems | linux, unix
MD5 | 4c30b3b77376b70b194f019b71a53df2
samsung.t300.txt
Posted Sep 25, 2002

How to unlock a Samsung T300 cellphone

tags | telephony
MD5 | 84ce827766ef65737d494e25fe3689f2
pla011.zip
Posted Aug 26, 2002

------Phone Losers Of America: Issue #011------ Telephone Prank Call Transcripts.

tags | telephony, bbs
MD5 | 6447d092130f66516ab8f229fcbc48fa
pla028.zip
Posted Aug 26, 2002

------Phone Losers Of America: Issue #028------ Ordering Telephone Calling Cards. Yes, believe it or not, it's still the easiest thing in the world to order personalized pin numbers...

tags | telephony, bbs
MD5 | f15602b5df464ea375eb3fbbf8ac23b3
edp-freq.zip
Posted Aug 26, 2002

Frequencies for listening to telephone calls.

tags | telephony, bbs
MD5 | 4315e8865b88309fd2956d96b13d4876
foneint.zip
Posted Aug 26, 2002

How to cure Radio - Telephone interference.

tags | telephony, bbs
MD5 | 847fcc6f53307d4fae7996c6a3376460
nia-33.zip
Posted Aug 26, 2002

UK Telephone System

tags | telephony, bbs
MD5 | 4024a1f0f42a2dfde0b7deb1fde449a3
Page 3 of 10
Back12345Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    11 Files
  • 21
    May 21st
    21 Files
  • 22
    May 22nd
    20 Files
  • 23
    May 23rd
    36 Files
  • 24
    May 24th
    2 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close