Metasploit Framework Telephony
|
|
|
- Suzan Sheila Quinn
- 10 years ago
- Views:
Transcription
1 Metasploit Framework Telephony Black Hat Briefings USA 2009 July, 2009 I)ruid, C 2 ISSP <[email protected]>
2 Abstract An important attack vector missing in many penetration testing and attack tools available today is the tried-and-true telephony dialup. With the recent surge in popularity of VoIP connectivity, accessing such attack vectors has become both cheap and easy. Using the new Metasploit telephony components, users are now able to both scan for and dial up directly to telephony-accessible exploitation targets.
3 Contents 1 Metasploit Framework Telephony Telephony Library Dialup Exploitation Module UNIX TTY Interact Payload Applied Metasploit Telephony Interactive Dialup Scripted Interactive Dialup Exploit for System V Derived /bin/login The Metasploit Wardialer Target Detection Results Logging Configuration Use Deficiencies and Future Goals Direct VoIP Support More Exploits Non-Carrier Signal Processing i
4 Chapter 1 Metasploit Framework Telephony 1.1 Telephony Library The Metasploit Framework[1] Telephony Library is the core of telephony support within the Metasploit Framework. It is intended to provide support for targeting and interfacing with remote devices accessible via telephony such as dialup modems connected to remote systems or PBX and voic systems. This capability extends Metasploit s potential target pool to systems only accessible via dialup connection, vulnerabilities in software such as /bin/login, getty software, Pluggable Authentication Modules (PAM), and Bulletin Board System (BBS) software that are otherwise not accessible via a standard network connection or over the Internet. The source code for the Metasploit Framework Telephony Library can be found in your Metasploit Framework directory under the lib/telephony directory. Currently there is only one source file provided, modem.rb, which provides the Modem object. The Modem object exports a number of methods and accessors used to configure and interface with a local Serial Port Modem: Methods: Modem.put command(command, timeout) Flushes the Modem. Sends command to the Modem. Reads result of the command using Modem.get response(timeout). Returns result. Modem.get response(timeout) Reads characters from the Modem until the next newline (0x0a) character. Returns the characters read or TIMEOUT if no characters were read in the allotted time. Modem.commandstate Puts the Modem into command state. Modem.datastate Puts the Modem into data state. Modem.hangup Sends ATH0 to the Modem if the Modem is in command state. 1
5 Sets DTR to off if the underlying Serial Port responds to the command. Puts the modem into command state if it is in data state and the underlying Serial Port does not respond to DTR. Sends ATH0 to the Modem. Modem.flush Flushes all data from the read buffer of the Serial Port. Accessors: serialport String defining the Serial Port that the Modem is attached to, such as /dev/ttys0 or COM1. sp The SerialPort Object created from the serialport variable. sock baud data bits parity stop bits flowcontrol display A Socket abstraction of the sp SerialPort object. The Baud rate to set the Modem to, such as 9600 or The number of data bits per byte, usually 7 or 8. The parity to use, either NONE, EVEN, or ODD. The number of stop bits to use, usually 1. The type of flow control to use, either NONE, HARD, or SOFT. A Boolean indicating whether Modem commands and responses should be displayed to the Metasploit console. This output will be prefixed with the [m] identifier. commandstate A Boolean indicating whether the Modem is in command or data state. When set to true, the modem is in command state. When set to false, the modem is in data state. 1.2 Dialup Exploitation Module Dialup exploitation is accomplished in Metasploit by providing the Exploit::Remote::Dialup module. This module provides a number of useful dialup-related methods which in turn employ the underlying Modem methods. The code for these dialup-related methods can be found in your Metasploit Framework directory under the lib/msf/core/exploit directory in a file called dialup.rb. This code registers a bunch of new options related to the Modem and deregisters the RHOST option as the exploit target is connected to via the modem rather than over the network: 2
6 BAUDRATE DATABITS This is an Integer option which specifies the Baud Rate for the modem, defaulting to This is an Enum option which specifies the Data Bits to be used for the modem. Available values are 4, 5, 6, 7, and 8, defaulting to 8. DIALPREFIX This is a String option which specifies the Modem command prefix to use when dialing, defaulted to ATDT *67, *70,. DIALSUFFIX This is a String option which specifies the Modem command suffix to use when dialing, defaulted to unset. DIALTIMEOUT This is a Integer option which specifies the timeout in seconds for expecting a connection when dialing, defaulted to 60. DISPLAYMODEM This is a Boolean option which indicates whether or not to display Modem commands and responses on the Metasploit console. FLOWCONTROL This is a Enum option which specifies what type of flow control to use with the Modem. Options are None, Hardware, Software, and Both, defaulted to None. INITSTRING This is a String option which specifies the Modem initialization string to use, defaulted to AT X6 S11=80. NUMBER PARITY This is the number that the Modem will dial, defaulted to unset. This is an Enum option which specifies the parity to use with the Modem. Options are None, Even, Odd, Mark, and Space, defaulted to None. SERIALPORT This is a String option which specifies the Serial Port that the Modem is attached to, defaulted to /dev/ttys0. STOPBITS This is an Enum option which specifies the stop bits to use with the Modem. Options are 1 and 2, defaulted to 1. The Exploit::Remote::Dialup module provides the following methods: connect dialup Creates a Modem object attached to the Serial Port specified by the SERIALPORT option. Configures the Modem with the supplied parameter options. Initializes the Modem. Dials the number provided in the NUMBER option. Checks the Modem response to determine if a connection has been established or not. 3
7 disconnect dialup dialup getc dialup gets Calls Modem.flush to flush the Modem buffer. Calls Modem.hangup to hang up the line. Calls Modem.close to destroy the Modem object. Reads and returns a single character from the Modem read buffer. Reads and returns a newline-terminated string of characters up to and including the terminating newline character (0x0a) from the Modem read buffer. dialup expect(regexp, timeout) Reads and stores in a buffer characters from the Modem read buffer until either the provided regular expression matches the buffer or the timeout value (in seconds) is reached. Returns a hash with :match set to true or false depending on whether the regexp matched or not and with :buffer set to the stored character buffer. dialup putc(c) Sends a single character to the Modem write buffer. dialup puts(string) handler Sends a string of characters to the Modem write buffer. Calls the handler specified by the selected payload. 1.3 UNIX TTY Interact Payload When using Metasploit, systems are traditionally targeted by address across an IP network. When successfully exploited, a shell session is established via a payload such as a reverse shell which connects back to Metasploit, by attaching a shell to a listening port on the target system, which is then connected to via a new socket connection across the network, or in some cases a shell is attained over the existing network socket that was used to attack the system. When exploiting a system over a dialup connection, a traditional network socket is not being employed. Instead, a local file descriptor attached to a serial device is being used, so a new Payload type that is able to handle this type of interface in the same manner that sessions attached to network sockets are was required. To fill this need, a new payload for TTYs called UNIX TTY Interact was created which allows the user to interact directly with a target system s TTY over an established connection attached to a file descriptor. When an exploit s platform is set to unix and it s architecture is set to ARCH TTY, the tty/unix/interact payload becomes available. When the payload s handler is called from an exploit, it connects a Metasploit session to the active file descriptor for the Modem, allowing the user to interact directly with the target system. This session can then be managed with the Metasploit session manager. 4
8 Chapter 2 Applied Metasploit Telephony The following sections will outline ways in which the Metasploit Framework Telephony Library and the Dialup Exploitation Module have been applied to various tasks such as interacting with a dialup system, exploitation of a dialup system, and scanning number ranges for dialup systems, or wardialing Interactive Dialup Within the Metasploit Framework a test exploit has been provided for use in testing Metasploit s basic telephony capability, verifying that your Modem configuration options are correct, and that your target system receives calls and will establish a connection. It s source code can be found in the modules/exploits/test/dialup.rb file. It is expected to be used with the UNIX TTY Interact payload and as such is set to platform unix and architecture ARCH TTY. In all, it is about the most basic exploit you could possibly write using the Dialup Exploitation Module, as seen below: def exploit connect_dialup handler disconnect_dialup end In practice, it would be used in the following manner: > use exploit/test/dialup > setg NUMBER > setg BAUDRATE > setg SERIALPORT /dev/ttys0... set other relevant options... > set PAYLOAD tty/unix/interact > exploit 1 Wardialing is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, BBS systems and fax machines. 5
9 Launching this exploit results in output such as: msf exploit(dialup) > exploit [*] Initializing Modem [*] Dialing: ###.###.#### (60 sec. timeout) [*] Carrier: CONNECT 14400/ARQ/V32/LAPM/V42BIS [*] Trying to use connection... [*] Interactive TTY session 1 opened (Local Pipe -> Remote Pipe) Login: druid Password: Last login: Mon Jun 27 07:20:30 on term/a Sun Microsystems Inc. SunOS 5.6 Generic August 1997 $ 2.2 Scripted Interactive Dialup As an extension to the Interactive Dialup scenario outlined in Section 2.1, the dialup puts and dialup expect methods can be used to script an initial portion of the session prior to handing the connection off to the handler. The authentication portion of the example in Section 2.1 could be scripted as shown below, using authentication credentials from the exploit s options datastore: def exploit connect_dialup dialup_expect(/ogin: /i, 4) dialup_puts(datastore[ USERNAME ]) dialup_expect(/assword: /i, 4) dialup_puts(datastore[ PASSWORD ]) dialup_expect(/[$#] /, 4) handler disconnect_dialup end In this manner you can script execution of local exploits on systems that you have unprivileged access to. Simply script an interactive dialup to connect, log in, write out an exploit to file, run the exploit, and (hopefully) elevate privileges. 2.3 Exploit for System V Derived /bin/login A more realistic example can be found in the exploit provided for CVE [2, 3] which is included with the Metasploit Framework. This vulnerability exists in /bin/login implementations which were derived from System V s /bin/login. When a large number of environment variables are passed to it via the login: prompt, an overflow condition is triggered. Due to the input vector, exploitation of this vulnerability can be accomplished entirely through direct interaction with /bin/login over any method of invoking it, network, dialup, or otherwise, and the resultant shell access is provided over the same connection as is used for exploitation. The code for this exploit can be found in modules/exploits/dialup/multi/login/manyargs.rb, and is used as follows: 6
10 > use exploit/dialup/multi/login/manyargs > setg NUMBER > setg BAUDRATE > setg SERIALPORT /dev/ttys0... set other relevant options... > set PAYLOAD tty/unix/interact > exploit Successful exploitation of a vulnerable system using this exploit yields the following results: msf exploit(manyargs) > exploit [*] Targeting: Solaris (SPARC) [*] Dialing Target [*] Initializing Modem [*] Dialing: ###.###.#### (60 sec. timeout) [*] Carrier: CONNECT 19200/ARQ/V32/LAPM/V42BIS [*] Waiting for login prompt [*] Sending evil buffer... [*] Waiting for password prompt [*] Password prompt received, waiting for shell [*] Success!!! [*] Trying to use connection... [*] Interactive TTY session 1 opened (Local Pipe -> Remote Pipe) # 2.4 The Metasploit Wardialer What use are dialup exploitation methods and weaponized exploits if you don t have suitable targets to attack? Using the Metasploit Wardialer, such systems can be found whether they be soft targets in Eastern Europe or that dialup access to the file server that the absent-minded IT Administrator left answering calls on a spare phone line belonging to the subject of your current penetration testing engagement Target Detection The Metasploit Wardialer will detect and log all standard, and many nonstandard, modem word responses such as CONNECT, +FCO, BUSY, NO DIALTONE, and so forth. As do most wardialers (WarVOX notably excluded), the Metasploit Wardialer relies upon the underlying Modem s detection capability to identify systems. By setting your modem to data, fax, or even voice mode, various types of systems can be scanned for and identified, however this entirely depends on the types of systems that your Modem can detect, and usually what mode you have your modem set to. Obviously a more versatile modem used for scanning will yield better results. 7
11 2.4.2 Results Logging Output is stored in the user s Metasploit working directory under the logs/wardial sub-directories in two types of files, the global found.log file and the individual scan s.dat files. Each scan range database for all numbers within that range are stored in a.dat file of the range s name which contains a gzipped, Marshaled Ruby object. Using this database file, the Metasploit Wardialer is able to stop and resume scanning of any given range of numbers individually. 3rd party applications may also use these files to attain scan data as well as glean real-time updates from the Metasploit Wardialer as the files on disc are written after each completed dial. Interesting detections such as data carriers, faxes, and tones are logged to the text log file found.log, as well as to the Metasploit database abstraction layer, if the user has one configured. Notes are logged to the database using the dialed number as the host identifier with a note type of wardial result and the connection string with any banner information as the data. In an upcoming version, the Metasploit Wardialer will also be capable of logging interesting detections to a centralized database called TIDbITS, or The Internet Database of Information Telephony Systems[4] Configuration The Metasploit Wardialer provides many of the familiar options and settings that you would expect (slightly edited due to formatting constraints): Module options: Current Setting Description DIALMASK XXXX Dial Mask (e.g X.99XX, (202) 358-XXXX, 358.####, etc.) DIALPREFIX ATDT Dial Prefix INITSTRING AT X6 S11=80 Initialization String SERIALPORT /dev/ttys0 Serial Port (e.g. 0 (COM1), 1 (COM2), /dev/ttys0, etc.) THREADS 1 The number of concurrent threads Module advanced options: : BaudRate Current Setting: Description : Baud Rate : ConnTimeout Current Setting: 45 Description : Timeout per data connection in seconds : DataBits Current Setting: 8 Description : Data Bits (4 is Windows Only) (accepted: 4, 5, 6, 7, 8) : DialDelay Current Setting: 1 Description : Time to wait between dials in seconds (rec. min. 1) : DialSuffix 8
12 Current Setting: Description : Dial Suffix : DialTimeout Current Setting: 40 Description : Timeout per dialed number in seconds : DisplayModem Current Setting: false Description : Displays modem commands and responses on the console : FlowControl Current Setting: None Description : Flow Control (accepted: None, Hardware, Software, Both) : InitInterval Current Setting: 30 Description : Number of dials before reinitializing modem : LogMethod Current Setting: File Description : Log Method (accepted: File) : NudgeString Current Setting: \x1b\x1b\r\n\r\n Description : Nudge String : Parity Current Setting: None Description : Parity (Mark & Space are Windows Only) (accepted: None, Even, Odd, Mark, Space) : RedialBusy Current Setting: false Description : Redials numbers found to be busy : StopBits Current Setting: 1 Description : Stop Bits (accepted: 1, 2) Use Given the configuration options outlined in Section 2.4.3, the Metasploit Wardialer is fairly simple to use: > use auxiliary/scanner/telephony/wardial > set DIALMASK XXXX > set DIALPREFIX ATDT *67... set other relevant options... > run 9
13 [*] No previous scan data found (/home/druid/.msf3/logs/wardial/ xxxx.dat) [*] Detected 4 masked digits in DIALMASK ( XXXX) [*] Generating storage for numbers to dial [*] Initializing Modem [*] of numbers unidentified, 0 carriers found, 0 faxes found, 0 busy [*] Dialing: #### (45 sec. timeout, previously undialed) [*] Timeout [*] 9999 of numbers unidentified, 0 carriers found, 0 faxes found, 0 busy [*] Dialing: #### (45 sec. timeout, previously undialed) [*] Fax: +FCO [*] Initializing Modem [*] 9998 of numbers unidentified, 0 carriers found, 1 faxes found, 0 busy [*] Dialing: #### (45 sec. timeout, previously undialed)... In the above example, the Modem was set to Fax mode and was therefore scanning for fax machines. In the output above, a Fax machine was detected on the second dial. The modem s output is displayed following the Fax: identifier and the identified Fax machine is then represented in the following status lines preceding each subsequent dial. 10
14 Chapter 3 Deficiencies and Future Goals As with any young project, there are a number of deficiencies in the current implementation with many opportunities for future development paths and goals. The following key areas have been identified and may garner future development effort. 3.1 Direct VoIP Support While Voice-over-IP (VoIP) technologies can be used with the Metasploit Framework, it is currently relegated to being used externally to a physical Serial Port and attached Modem. The physical Modem may be attached to a VoIP Analog Telephone Adapter (ATA) as you would any other analog telephony device, which in turn uses VoIP protocols to interface with your VoIP service provider. This limitation primarily restricts the number of simultaneous calls that could be made down to a single call at a time. While this limitation is fairly insignificant for dialup exploitation, it severely limits the capability of the Metasploit Wardialer, which could greatly increase efficiency with the ability to dial more than a single number at a time. This limitation currently exists due to lack of adequate VoIP Digital Signal Processing (DSP) software. There are a few key projects that exist and show promise, however none of them are currently usable out of the box or easily integrated. IAXModem[5] is one of the more promising VoIP-enabled software modems, however the underlying DSP that it uses currently only supports Fax signal processing and not Data. Other DSPs exist but are not easily coupled with VoIP software. Notably, this limitation in available DSP software is the primary reason that the WarVOX Project[6] approached target detection by performing audio signal analysis. While this proved to be a benefit to the WarVOX project as it enabled the tool to detect many more disparate systems than just data or fax carriers, as well as group and associate like-sounding systems, it also obviously introduced limitations in the area of data system identification of not actually connecting to a target to determine such parameters as a carrier negotiation speed or reading a system s login banner to help identify the type of system. 3.2 More Exploits Due to the age of this project, much more work has been allocated to development of the core software and the wardialer than to pre-packaged exploits. Some additional vulnerabilities have been initially identified which may be applicable to exploitation over a dialup connection: 11
15 1, CVE [7, 8] mgetty CallerID Excessive Length cnd-program() Argument Buffer Overflow This vulnerability should be supportable once direct VoIP support is added and the CallerID value able to be controlled. 2, CVE [9, 10] SGI IRIX Scheme Login Privilege Escalation 3, CVE [11, 12] PAM SMB module (pam smb) = /bin/login Buffer Overflow 3.3 Non-Carrier Signal Processing It is intended that the Metasploit Wardialer will be used as the primary distributed wardialer for the TIDbITS database. As such, there will eventually be a need for analysis of non-data carrier targets such as PBXs and Voic systems which will require some other form of signal analysis. The WarVOX Project has made significant advances in this area specifically tied to analysis of information systems. As a sister project to the Metasploit Framework, it is hopeful that some of the WarVOX code may be integrated back into the Metasploit Wardialer. 12
16 Bibliography [1] The Metasploit Project. The metasploit framework. May [2] System v derived /bin/login many arguments buffer overflow. CVE , Mitre, June [3] Mark Dowd. Multiple vendor system v derived login buffer overflow vulnerability. BID 3681, ISS X-Force, December [4] I)ruid. Tidbits. July [5] faxguy. Iaxmodem. June [6] HD Moore. Warvox. May [7] mgetty < callerid excessive name length cnd-program() argument buffer overflow. CVE , Mitre, September [8] Mgetty caller id excessive name length buffer overrun vulnerability. BID 7303, mgetty, November [9] Sgi irix scheme login privilege escalation. CVE , Mitre, July [10] Sgi irix scheme login privilege escalation vulnerability. BID 8212, SGI, July [11] Pam smb module <= /bin/login buffer overflow. CVE , Mitre, August [12] Craig Miskell. Pam smb remote buffer overflow vulnerability. BID 8491, August
RMCS Installation Guide
RESTRICTED RIGHTS Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (C)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
Exploiting Transparent User Identification Systems
Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background
BreakingPoint Systems
Warvox H D Moore metasploit Project lead BreakingPoint Systems Director of Security Research Telephone Fun Time Way back when... Modems were how you got access to things Modems
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Cisco Configuring Secure Shell (SSH) on Cisco IOS Router
Cisco Configuring Secure Shell (SSH) on Cisco IOS Router Table of Contents Configuring Secure Shell (SSH) on Cisco IOS Routers...1 Contents...1 Introduction...1 Hardware and Software Versions...1 SSHv1
PATROL Console Server and RTserver Getting Started
PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
Remote Administration
Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over
Metasploit Beginners
Metasploit Beginners #.. # # _/ \ _ \ _/ # # / \ \\ \ / // \/ /_\ \ / / \ # # / /_/ / \ \/ \ /\ \ \ # # \/ \/ \/ # # # # _/ \ \_/ \ \/ \/ / # # \ \ \/\ /\ / # # \
InSciTek Microsystems 635 Cross Keys Park Fairport, NY 14450 585-421-3850. Setting up Your Phones
InSciTek Microsystems 635 Cross Keys Park Fairport, NY 14450 585-421-3850 Setting up Your Phones Table of Contents Setting up Your Phones... 1 How to Add an Analog Handset... 2 How to Add a SIP Handset...
Feature Reference. Features: Call Forwarding Call Waiting Conference Calling Outbound Caller ID Block Last Call Return VoiceMail
Feature Reference This document will provide you with information on and how to use the following features of your phone service with Standard Broadband. Features: Call Forwarding Call Waiting Conference
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
How to hack a website with Metasploit
How to hack a website with Metasploit By Sumedt Jitpukdebodin Normally, Penetration Tester or a Hacker use Metasploit to exploit vulnerability services in the target server or to create a payload to make
Running a Default Vulnerability Scan SAINTcorporation.com
SAINT Running a Default Vulnerability Scan A Step-by-Step Guide www.saintcorporation.com Examine. Expose. Exploit. Install SAINT Welcome to SAINT! Congratulations on a smart choice by selecting SAINT s
isco Connecting Routers Back to Back Through the AUX P
isco Connecting Routers Back to Back Through the AUX P Table of Contents Connecting Routers Back to Back Through the AUX Ports...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Chapter 46 Terminal Server
Chapter 46 Terminal Server Introduction... 46-2 TTY Devices... 46-2 Multiple Sessions... 46-4 Accessing Telnet Hosts... 46-5 Command Reference... 46-7 connect... 46-7 disable telnet server... 46-7 disconnect...
Tera Term Telnet. Introduction
Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start
Discovering passwords in the memory
Discovering passwords in the memory Abhishek Kumar ([email protected]) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability
Voice Over Internet Protocol (VoIP) Configuration
(VoIP) Configuration ENGINEERING REPORT No: 02-003 Introduction This report describes interfacing the IPCS VoIP Gateway Model EGW-902 to an ESTeem Model 192E Wireless Ethernet radio modem in a demonstration
F2103 GPRS DTU USER MANUAL
F2103 GPRS DTU USER MANUAL Add:J1-J2,3rd Floor,No.44,GuanRi Road,SoftWare Park,XiaMen,China 1 Zip Code:361008 Contents Chapter 1 Brief Introduction of Product... 3 1.1 General... 3 1.2 Product Features...
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Running a Default Vulnerability Scan
Running a Default Vulnerability Scan A Step-by-Step Guide www.saintcorporation.com Examine. Expose. Exploit. Welcome to SAINT! Congratulations on a smart choice by selecting SAINT s integrated vulnerability
Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Prestige 2002 Series. VoIP Analog Telephone Adaptor. Quick Start Guide
VoIP Analog Telephone Adaptor Quick Start Guide Version 3.60 5/2005 Overview The Prestige allows you to use an analog telephone to make phone calls over the Internet (Voice over IP or VoIP). It uses SIP
IVR Security:- Internal A3acks Via Phone Line
IVR Security:- Internal A3acks Via Phone Line Who am I? Rahul Sasi Security Researcher @ isight Partners. Member Garage4Hackers. Garage 4 Hackers InformaGon Security professionals from Fortune 500, Security
Enghouse Interactive. Vision 80/20 Avaya IP Office. Installation manual - Avaya IP Office. Version 3.0
Enghouse Interactive Installation manual - Avaya IP Office Vision 80/20 Avaya IP Office Version 3.0 All material is copyright protected and belongs to Visionutveckling. The material may not be sold, distributed
SCS3205/4805 Quick Start Guide
Secure Console Server Quick Start Guide 2003 Copyright Lantronix is a trademark of Lantronix. All rights reserved. 900-287 Rev. B 8/03 QUICK START CONTENTS System Overview.......................................................2
Metasploit Lab: Attacking Windows XP and Linux Targets
Cyber Forensics Laboratory 1 Metasploit Lab: Attacking Windows XP and Linux Targets Copyright c 2012 Michael McGinty and Xinwen Fu, University of Massachusetts Lowell Permission is granted to copy, distribute
VoIPon www.voipon.co.uk [email protected] Tel: +44 (0)1245 808195 Fax: +44 (0)1245 808299
VoiceGear/3CX Integration Guide Ver.0.1 Page 2 1. OVERVIEW... 3 1.1 SETTING UP 3CX PBX...4 1.2 SETTING UP VOICEGEAR GATEWAY...5 2. VOICEGEAR-3CX SIP INTEGRATION... 6 2.1 3CX CONFIGURATION...7 2.2 VOICEGEAR
Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing 2001 - An Update
Pension Benefit Guaranty Corporation Office of Inspector General Evaluation Report Penetration Testing 2001 - An Update August 28, 2001 2001-18/23148-2 Penetration Testing 2001 An Update Evaluation Report
Application Notes for Configuring Microsoft Office Communications Server 2007 R2 and Avaya IP Office PSTN Call Routing - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Microsoft Office Communications Server 2007 R2 and Avaya IP Office PSTN Call Routing - Issue 1.0 Abstract These Application
Configuring NET SatisFAXtion with Avaya IP Office
Configuring NET SatisFAXtion with Avaya IP Office Documentation provided by Kristian Guntzelman - G&C Interconnects - 3-15-2010 Summary: This document will provide an example of how to connect the FaxBack
Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures
Palomar College Dial-up Remote Access
Palomar College Dial-up Remote Access Instructions for Windows 95/98 and Windows 2000 Following are instructions to implement dialup access to the Palomar College network, email and Internet. The minimum
Author: Sumedt Jitpukdebodin. Organization: ACIS i-secure. Email ID: [email protected]. My Blog: http://r00tsec.blogspot.com
Author: Sumedt Jitpukdebodin Organization: ACIS i-secure Email ID: [email protected] My Blog: http://r00tsec.blogspot.com Penetration Testing Linux with brute force Tool. Sometimes I have the job to penetration
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main
AUTHOR CONTACT DETAILS
AUTHOR CONTACT DETAILS Name Dinesh Shetty Organization Paladion Networks Email ID [email protected] Penetration Testing with Metasploit Framework When i say "Penetration Testing tool" the first
DS License Server V6R2013x
DS License Server V6R2013x DS License Server V6R2013x Installation and Configuration Guide Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology
Eliac Call Recording - Configurator Guide. Eliac. Call Recording System Ver. 2.x. www.smartsoft-eg.com
Eliac Call Recording System Ver. 2.x 1 System Overview Eliac Call Recording is a complete system that records both incoming and outgoing calls for any analog telephone lines, and can record either internal
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
FortiVoice. Version 7.00 User Guide
FortiVoice Version 7.00 User Guide FortiVoice Version 7.00 User Guide Revision 2 28 October 2011 Copyright 2011 Fortinet, Inc. All rights reserved. Contents and terms are subject to change by Fortinet
DSA-1000 / PRT-1000 Device Server / Thermal Printer
LevelOne DSA-1000 / PRT-1000 Device Server / Thermal Printer User Manual V2.0 TABLE OF CONTENTS 1. INTRODUCTION...- 3-2. DEVICE OVERVIEW...- 7-3. HARDWARE SETUP...- 10-4. SYSTEM CONFIGURATION...- 12 -,
Connecting and Setting Up Your Laptop Computer
CHAPTER 3 Connecting and Setting Up Your Laptop Computer This chapter explains how to connect your laptop to the Cisco Unified MeetingPlace system and how to set up your laptop so that you can use HyperTerminal.
Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office 7.0 - Issue 1.0 Abstract These Application Notes describe the procedures for configuring
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
Backing Up and Restoring Data
Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application
SITRANS RD500 Configuring the RD500 with PSTN or GSM modems and Windows-based servers and clients for communication Objective:
AG041410 SITRANS RD500 Configuring the RD500 with PSTN or GSM modems and Windows-based servers and clients for communication Objective: Determine how to configure the RD500 and your PSTN or GSM modem APPLICATION
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Command Line Interface User Guide for Intel Server Management Software
Command Line Interface User Guide for Intel Server Management Software Legal Information Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Hosted PBX End User Training Guide For the Polycom Soundpoint IP 321, 331 and 335 Phone
Hosted PBX End User Training Guide For the Polycom Soundpoint IP 321, 331 and 335 Phone HOSTED PBX END USER TRAINING GUIDE ACCESSING VOICEMAIL To retrieve your voicemail, press the Menu button, button
Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012
Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012 Proprietary 2012 Media5 Corporation Scope of this Document This Technical Bulletin aims to inform the reader on the troubleshooting
NGT Hosted Digital Voice. User Guide
NGT Hosted Digital Voice User Guide December 2009 Getting Started Making Calls Using Your NGT Hosted Digital Voice service Domestic Dial as you normally would. You can also reference your local telephone
Apache Thrift and Ruby
Apache Thrift and Ruby By Randy Abernethy In this article, excerpted from The Programmer s Guide to Apache Thrift, we will install Apache Thrift support for Ruby and build a simple Ruby RPC client and
CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks
CIT 480: Securing Computer Systems Vulnerability Scanning and Exploitation Frameworks Vulnerability Scanners Vulnerability scanners are automated tools that scan hosts and networks for potential vulnerabilities,
Citrix ICA UNIX Client Quick Reference Card
Citrix ICA UNIX Client Quick Reference Card. Introduction to the ICA UNIX Client The ICA UNIX Client supports the following systems and versions. Features may vary among the supported platforms. Instructions
Shellshock Security Patch for X86
Shellshock Security Patch for X86 Guide for Using the FFPS Update Manager October 2014 Version 1.0. Page 1 Page 2 This page is intentionally blank Table of Contents 1.0 OVERVIEW - SHELLSHOCK/BASH SHELL
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
This document explains how to configure and use the IOPRINT+ Print Server in the Unix TCP/IP environment.
Unix - TCP/IP This document explains how to configure and use the IOPRINT+ Print Server in the Unix TCP/IP environment. Software Requirements TCP/IP protocol, FTP (Optional: - BOOTP, Rarp, Telnet) LPD
Configuration of Applied VoIP Sip Trunks with the Toshiba CIX40, 100, 200 and 670
Configuration of Applied VoIP Sip Trunks with the Toshiba CIX40, 100, 200 and 670 Businesses Save Money with Toshiba s New SIP Trunking Feature Unlike gateway based solutions, Toshiba s MIPU/ GIPU8 card
Automation of Post-Exploitation
Automation of Post-Exploitation (Focused on MS-Windows Targets) Mohammad Tabatabai Irani and Edgar R. Weippl Secure Business Austria, Favoritenstr. 16, A-1040 Vienna, Austria {mtabatabai,eweippl}@securityresearch.at
White Paper Integration of TTY Calls into a Call Center Using the Placeholder Call Technique Updated: February 2007
Overview of Call Centers White Paper Integration of TTY Calls into a Call Center Using the Placeholder Call Technique Updated: February 2007 All organizations have a phone system, but a call center has
IP PBX. SD Card Slot. FXO Ports. PBX WAN port. FXO Ports LED, RED means online
1 IP PBX SD Card Slot FXO Ports PBX LAN port PBX WAN port FXO Ports LED, RED means online 2 Connect the IP PBX to Your LAN Internet PSTN Router Ethernet Switch FXO Ports 3 Access the PBX s WEB GUI The
Kaseya 2. Quick Start Guide. for Network Monitor 4.1
Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private
Wave SIP Trunk Configuration Guide FOR BROADVOX
Wave SIP Trunk Configuration Guide FOR BROADVOX Last updated 1/7/2014 Contents Overview... 1 Special Notes... 1 Before you begin... 1 Required SIP trunk provisioning and configuration information... 1
Integrating VoltDB with Hadoop
The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.
Grandstream Networks, Inc.
Grandstream Networks, Inc. UCM6100 Basic Configuration Guide Grandstream Networks, Inc. www.grandstream.com TABLE OF CONTENTS OVERIEW... 4 SETUP GUIDE SCENARIO... 4 QUICK INSTALLATION... 5 Connecting the
VoIP 110R/200R/422R/404R/440R. User s Guide
VoIP 110R/200R/422R/404R/440R User s Guide Trademarks Contents are subject to revise without prior notice. All trademarks belong to their respective owners. FCC Warning This equipment has been tested and
Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0 Abstract These Application Notes describe the procedures for configuring
Welcome to ScopServ. ScopTEL ACD Module
Welcome to ScopServ ScopTEL ACD Module Table of contents 1. Introduction... 2 2. ACD manager... 3 2.1. Queues... 3 2.1.1. General parameters... 3 2.1.2. Managing notifications (queue)... 3 2.1.3. Managing
Data sheet Wireless UART firmware version 4.02
Data sheet Wireless UART firmware version 4.02 BLUETOOTH is a trademark owned by Bluetooth SIG, Inc., U.S.A. and licensed to Free2move Rev: 22 December 2008 Table of contents 1 GENERAL INFORMATION...4
MAX T1/E1. Quick Start Guide. VoIP Gateway. Version 1.0
MAX T1/E1 TM VoIP Gateway Quick Start Guide Version 1.0 Contents INTRODUCTION 1 Hardware Needed Software Needed 1 1 NET2PHONE MAX SET UP Hardware Set Up Software Set Up Set Up Internet Protocol (IP) Address
Hosted VoIP Phone System. Desktop Toolbar User Guide
Hosted VoIP Phone System Desktop Toolbar User Guide Contents 1 Introduction... 3 1.1 System Requirements... 3 2 Installing the Telesystem Hosted VoIP Toolbar... 4 3 Accessing the Hosted VoIP Toolbar...
Iridium Extreme TM Satellite Phone. Data Services Manual
Iridium Extreme TM Satellite Phone Data Services Manual Table of Contents 1 OVERVIEW... 1 2 HOW IT WORKS... 1 3 BEFORE INSTALLING... 2 4 USB DRIVER INSTALLATION... 3 5 MODEM INSTALLATION AND CONFIGURATION...
Job Aid: Creating Additional Remote Access Logins
This job aid describes the steps required to add an additional remote access login to the Avaya S8300, S8500, and S8700 Series Media Servers. These logins may be used to establish a Point to Point Protocol
McAfee Vulnerability Manager 7.0.2
McAfee Vulnerability Manager 7.0.2 The McAfee Vulnerability Manager 7.0.2 quarterly release adds features to the product without having to wait for the next major release. This technical note contains
IP- PBX. Functionality Options
IP- PBX Functionality Options With the powerful features integrated in the AtomOS system from AtomAmpd, installing & configuring a cost- effective and extensible VoIP solution is easily possible. 4/26/10
BRI to PRI Connection Using Data Over Voice
BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot
Avaya IP Office 8.1 Configuration Guide
Avaya IP Office 8.1 Configuration Guide Performed By tekvizion PVS, Inc. Contact: 214-242-5900 www.tekvizion.com Revision: 1.1 Date: 10/14/2013 Copyright 2013 by tekvizion PVS, Inc. All Rights Reserved.
BrightStor ARCserve Backup for Linux
BrightStor ARCserve Backup for Linux Agent for MySQL Guide r11.5 D01213-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's
Global Monitoring + Support
Use HyperTerminal to access your Global Monitoring Units View and edit configuration settings View live data Download recorded data for use in Excel and other applications HyperTerminal is one of many
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
Quick Start Guide CREATING A NEW SITE
IVY is our complete control panel for managing you or your customers SIP trunks and hosted PBX settings. This guide will help you get up and running with IVY as quickly as possible. First thing we need
Enterprise Toolbar User s Guide. Revised March 2015
Revised March 2015 Copyright Notice Trademarks Copyright 2007 DSCI, LLC All rights reserved. Any technical documentation that is made available by DSCI, LLC is proprietary and confidential and is considered
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Implementation notes on Integration of Avaya Aura Application Enablement Services with Microsoft Lync 2010 Server.
Implementation notes on Integration of Avaya Aura Application Enablement Services with Microsoft Lync 2010 Server. Introduction The Avaya Aura Application Enablement Services Integration for Microsoft
Configuring and Monitoring Hitachi SAN Servers
Configuring and Monitoring Hitachi SAN Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
Quick Start Guide v1.0
Quick Start Guide v1.0 Table of contents : 01. Quick Start Guide...03 O2. Configuring your VoIPOffice appliance...14 03. Adding a VoIPtalk trunk...21 04. Configuring UADs for use with VoIPOffice...25 05.
H.323 / SIP VoIP Gateway VIP GW. Quick Installation Guide
H.323 / SIP VoIP Gateway VIP GW Quick Installation Guide Overview This quick installation guide describes the objectives; organization and basic installation of the PLANET VIP-281/VIP-480/VIP-880/VIP-1680/VIP-2480
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Hosted PBX Phone Setup & End User Training Guide
Hosted PBX Phone Setup & End User Training Guide HOSTED PBX PHONE SETUP GUIDE REQUIRED FOR INSTALL Modem / Router Ethernet Power Supply or Switch (CAT5, CAT5e, CAT6) (if required) POLYCOM SOUNDPOINT IP
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password
Grandstream Networks, Inc. UCM6510 Basic Configuration Guide
Grandstream Networks, Inc. UCM6510 Basic Configuration Guide Index Table of Contents OVERVIEW... 4 SETUP ENVIRONMENT... 5 QUICK INSTALLATION... 6 CONNECT UCM6510... 6 ACCESS UCM6510 WEB INTERFACE... 6
DSX Master Communications
DSX Access Systems, Inc. PC to Master Controller - Direct Connect Communications DSX Master Communications Communications between the Comm Server PC and the Master Controller can take several forms which
