Main

February 22, 2007

Comments

Hi there! Congrats for the show guys, it's really great.

Just wanted to point out that you don't need to sniff the traffic to exploit BID 22191 (PA168 session hijack). All that is required is that a super user establishes a session with the device (authenticates). At that point an attacker can hijack the admin's session from ANY IP address. Of course, this can be automated by repeatedly sending a "evil" superuser request (as shown in the PoC script).

The "evil" request will dump the device's config settings, including superuser passwords in the clear. So to clarify, no sniffing is required :D

Keep the hard work!

The comments to this entry are closed.

Promote Blue Box!

VoIP Security Books