<div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div><div><div><div dir="ltr"><br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Sun, Jun 16, 2019 at 3:37 PM John T. Bittner <<a href="mailto:john@xaccel.net">john@xaccel.net</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<div lang="EN-US">
<div class="gmail-m_-1833021964774015584WordSection1">
<p class="MsoNormal">Anyone know how someone can hack an asterisk box and register with every single account on the box.<u></u><u></u></p>
<p class="MsoNormal">This box only has 3 accounts, with very complex passwords. Have VoIP blacklist setup and fail2ban…<u></u><u></u></p></div></div></blockquote></div><br></div>I've seen this happen when web-based provisioning is used, I have seen attempts to download configuration files off of my provisioning server increase in frequency over the last two years.<br><br></div>The 'Hacker' will do a get on /polycom /cisco /yealink /aastra /mitel etc, If they get a valid response they will start enumerating mac addresses<br><br>/polycom/0004F2018101.cfg<br>/polycom/0004F2018102.cfg<br>...<br></div>/polycom/0004F2018109.cfg<br><br></div><div>Then they will use any credentials gained in the download attack to place calls, registering as needed.<br></div><div dir="ltr"><br></div></div></div></div></div></div>