[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    Re: [Full-disclosure] Polycom hacking
From:       Paul Schmehl <pauls () utdallas ! edu>
Date:       2007-06-29 14:25:21
Message-ID: 5A91B1235292B85CF08212FD () utd59514 ! utdallas ! edu
[Download RAW message or body]

[Attachment #2 (multipart/signed)]


--On Thursday, June 28, 2007 22:25:08 -0400 Peter Dawson 
<slash.pd@gmail.com> wrote:

> interesting concept.. harvesting a polycom device for  Botnet's.
>
> hmmmmmmmmm..  the key would be how the heck to get the stealthware on
> such a device ??
>
That's easy.

ftp target.domain.tld
user administrator
pass (blank)
mget *
alter files to suit
mput *

-- 
Paul Schmehl (pauls@utdallas.edu)
Senior Information Security Analyst
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/

[Attachment #5 (application/pkcs7-signature)]

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic