Release Notes: This release adds a new SIP Scanner (UDP or TCP) module with administration services detection and information gathering on SIP UA or server. Threads have been implemented in the launcher. Several tools can now be used at the same time.
Release Notes: For the scanner, this release adds VxWorks debug mode detection.
Release Notes: This release fixes an exploit related to the Aastra IP Phone hardcode telnet login/password.
Release Notes: An incorrect name in a file blocked the launch of the main script on some systems. This has been corrected.
Release Notes: This release adds code for a polycom HDX telnet authorization bypass exploit and a "having fun with SSH on Cisco IP" phone tool.
Release Notes: This release adds a user interface update, vulnerability detection, and Cisco phone SSH server detection. It fixes exploits related to Alcatel OXO FTP Denial of service, Mitel IP phone information disclosure, and Mitel IP phone XSS. A new Perl library is in use, Net::SSH.
Release Notes: This release adds Cisco phone logout mobility feature abuse, a module to detect the use of the default Login/password on the embedded Web interface from Mitel phones, Aastra IP phone information disclosure (OSVDB-ID: 72941/EDB-ID 17376), Avaya Ip Office Linux voicemail password file data disclosure, a script providing phone call and remote taping on SNOM phones, and Mitel AWC unauthenticated command execution (OSVDB-ID: 69934/EDB-ID 15807).
Release Notes: This release implements code to exploit Polycom vulnerabilities OSVDB-ID: 73117 and OSVDB-ID: 70697. It implements a module to detect Polycom IP Phone's use of default login/password and unprotected Web interface. It adds the capacity to scan a full subnet for Aastra and SNOM default login/password search. The capacity to save results in text files has been added. An integrated GUI for Protos SIP in ISME. Due to some problems met by users during installation, this release has finally come back to an install process mainly based on CPAN.
Release Notes: This release adds TCP Starvation attack (Skinny and SIP ports), SIP flooding attacks (Invite, Register, and Options), and an installer update. Perl must authorize threads to work for these new attacks. New Perl modules are required.
Release Notes: This release adds Cisco phone attacks (ringer and forwarder – skinny). It adds LAN and server attacks (DHCP starvation and DNS subnet resolver).