HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Shell over DTMF
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Shell over DTMF  
> Access to the content HTML Beginning of the presentation
PDF PDF version [155 KB]
AdobeFlash Adobe Flash version  
> Description This presentation introduces Alambix, a backdoor for Asterisk IPBX. It may be used to run commands on the IPBX by calling a phone number and encoding the command line with DTMF. Commands results are read with Text-to-Speech.
Lien Vidéo : demo authentication and command whoami - 42 Mo
Lien Vidéo : demo command ls - 40 Mo  
> Context & Dates Talk presented during SSTIC 2009, on 4 June 2009.
 
> Author Nicolas Collignon (Nicolas.Collignon@hsc.fr) 
> Type [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Alambix
Specifications
Asterisk side
Overview
Menu / Keymap  
> Related documents
themeVoice over IP
[Article]  Le protocole ZRTP [27 May 2008 - French]
[Presentation]  VoIP and security : experiences of security audits [6 April 2006 - French]
[Presentation]  Managing insecurity of spontaneous infrastructures [3 April 2006 - French]
[Presentation]  Spontaneous infrastructures : witch security ? [19 October 2005 - French]
[Presentation]  VoIP Security [16 June 2005 - French]
[Presentation]  Firewalls are not dead [10 May 2005 - French]
[Presentation]  Stakes of network security [31 March 2005 - French]
[Presentation]  Voice over IP [10 October 1997 - French]
[Article]  Voice over IP [September 1997 - French]
themeVoice over IP / Phone over IP
[Presentation]  Security and industrial computing [16 April 2010 - French]
[Presentation]  Panorama de la Cybercriminalité 2010 (CLUSIF) : Sécurité des services généraux sur IP [13 January 2010 - French]
[Presentation]  VoIP and security : revolution or devolution ? [2 November 2007 - French]
[Presentation]  VoIP and security : return of experience of security audits [14 March 2007 - French]
[Presentation]  VoIP networks intrusion examples [29 November 2006 - French]
[Presentation]  VoIP and security : experiences of security audits [7 July 2006 - French]
[Presentation]  Threats and vulnerability over networks and PCs [23 March 2005 - French]
themeRootkit
[Tip]  RKSCAN: Scanner for loadable kernel-module rootkits [25 October 2000 - English]
[Tip]  Presentation and detection of the ADORE rootkit [16 October 2000 - French]
themeGSM
[Presentation]  Panorama de la Cybercriminalité 2010 (CLUSIF) : Confidentialité GSM [13 January 2010 - French]
[Presentation]  Web Attacks with Smartphone [4 June 2009 - French]
[Presentation]  Mobility and security [20 January 2005 - French]
[Presentation]  Insecurity of JAVA embedded environments [18 March 2003 - French]
[Article]  Barrer la route aux virus de téléphones portables [18 November 2002 - French]
[Presentation]  GPRS from IP security point of view [19 June 2001 - English]
> Copyright © 2009, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 9 June 2009 at 13:09:29 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants