I made use of Windows bridging feature to bridge two Ethernet ports, so traffic would pass through the computer. This proved to be a bit difficult as I did not have a dedicated network tap. The next step is to monitor the traffic that goes in and out of this device. The results of nmap scans were not conclusive, as it did not tell us much, other than the fact that this device has two ports open (500) Nmap is very confident that this device runs on Linux versions 2.6.9 – 2.6.33 With nmap, we also could attempt OS detection of this black box device. This information did not tell us much, but it did tell us what this phone supported, via the use of SIP Allow messages (INVITE, ACK, CANCEL, BYE, MESSAGE, INFO, REFER, NOTIFY) We were able to gather some SIP information from this device however. The default NMAP scan manages to find only two open ports:Īlthough there are known exploits for SIP, rudimentary testing with nmap’s SIP scripts such as sip-brute, sip-call-spoof, and sip-enum was not effective against this black-box device. Tools like nmap will be able to achieve this. The simplest way to start off analysis of a black box device is to do a port scan. In this case, the author has a Sorenson ntouch VP on hand, and this is the ‘black box’ device I will be analyzing. The devices mentioned are internet-connected “black-box” devices that enable communication between deaf people, and provides a way for deaf people to communicate with others via the use of an interpreter. Some examples include the Sorenson ntouch VP, Purple’s SmartVP, and ZVRS’ Z70. However, there are some unique, and proprietary, devices that are to be used by Deaf people. Video Communication Devices are prevalent, and they are widely used around the world.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |