{"id":4461,"date":"2010-07-27T20:13:15","date_gmt":"2010-07-27T18:13:15","guid":{"rendered":"http:\/\/www.corelan.be:8800\/?p=4461"},"modified":"2010-07-27T20:13:15","modified_gmt":"2010-07-27T18:13:15","slug":"cisco-voip-phones-a-hackers-perspective","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2010\/07\/27\/cisco-voip-phones-a-hackers-perspective\/","title":{"rendered":"Cisco VoIP Phones &ndash; A Hackers Perspective"},"content":{"rendered":"<h4><a href=\"\/wp-content\/uploads\/2010\/08\/ciscophones.jpg\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" style=\"border-right-width: 0px; margin: 0px 15px 0px 25px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px\" title=\"ciscophones\" border=\"0\" alt=\"ciscophones\" align=\"right\" src=\"\/wp-content\/uploads\/2010\/08\/ciscophones_thumb.jpg\" width=\"146\" height=\"98\" \/><\/a> Introduction<\/h4>\n<div>In the world of VoIP phones, each person may look at them differently. For some, an annoyance that sit on their desk, or maybe for some it is simply a part of their job either deploying them or as a help desk position taking phone calls all day. This could even go as far as some people that just use them on a daily basis at home or in a lobby. But what about in a professional Penetration Tester\u2019s mind? What kind of simple yet sensitive information are we leaving out in the open for malicious users?<\/div>\n<div>\n<p>VoIP security is important to understand what vulnerabilities we may be leaving out in the open just waiting for malicious people to crawl our network by gaining information from these VoIP phones. Here presented a document about Cisco VoIP Phones and what an attacker may be looking for, what information they may gain by using these VoIP phones as their target, and ending this document with an example case study utilizing UCSniff on a VoIP network capturing VoIP conversations!<\/p>\n<h4>Contents<\/h4>\n<ul>\n<li>Intro <\/li>\n<li>VoIP Phones - What they advertise <\/li>\n<li>Is this line secure? <\/li>\n<li>Conclusion <\/li>\n<li>References <\/li>\n<\/ul>\n<h4>Download<\/h4>\n<p>You can download the paper here :<\/p>\n<p>[download id=63]63[\/download]<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction In the world of VoIP phones, each person may look at them differently. For some, an annoyance that sit on their desk, or maybe for some it is simply a part of their job either deploying them or as a help desk position taking phone calls all day. This could even go as far &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2010\/07\/27\/cisco-voip-phones-a-hackers-perspective\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"Cisco VoIP Phones &ndash; A Hackers Perspective\"<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[997,2382,127],"tags":[998],"class_list":["post-4461","post","type-post","status-publish","format-standard","hentry","category-cisco","category-security-papers","category-security","tag-cisco"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cisco VoIP Phones &ndash; A Hackers Perspective - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2010\/07\/27\/cisco-voip-phones-a-hackers-perspective\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco VoIP Phones &ndash; A Hackers Perspective - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Introduction In the world of VoIP phones, each person may look at them differently. For some, an annoyance that sit on their desk, or maybe for some it is simply a part of their job either deploying them or as a help desk position taking phone calls all day. This could even go as far &hellip; Continue reading &quot;Cisco VoIP Phones &ndash; A Hackers Perspective&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2010\/07\/27\/cisco-voip-phones-a-hackers-perspective\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2010-07-27T18:13:15+00:00\" \/>\n<meta name=\"author\" content=\"Corelan Team (chap0)\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/07\\\/27\\\/cisco-voip-phones-a-hackers-perspective\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/07\\\/27\\\/cisco-voip-phones-a-hackers-perspective\\\/\"},\"author\":{\"name\":\"Corelan Team (chap0)\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/c34ba6b93811f60a4fa6ffc6c028b7f5\"},\"headline\":\"Cisco VoIP Phones &ndash; A Hackers Perspective\",\"datePublished\":\"2010-07-27T18:13:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/07\\\/27\\\/cisco-voip-phones-a-hackers-perspective\\\/\"},\"wordCount\":209,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"Cisco\"],\"articleSection\":[\"Cisco\",\"Papers\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/07\\\/27\\\/cisco-voip-phones-a-hackers-perspective\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/07\\\/27\\\/cisco-voip-phones-a-hackers-perspective\\\/\",\"name\":\"Cisco VoIP Phones &ndash; A Hackers Perspective - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2010-07-27T18:13:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/07\\\/27\\\/cisco-voip-phones-a-hackers-perspective\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/07\\\/27\\\/cisco-voip-phones-a-hackers-perspective\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2010\\\/07\\\/27\\\/cisco-voip-phones-a-hackers-perspective\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cisco VoIP Phones &ndash; A Hackers Perspective\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/c34ba6b93811f60a4fa6ffc6c028b7f5\",\"name\":\"Corelan Team (chap0)\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6550326824a9e9418e0a74973ca14896814be1a0c4753fef9a9f1811027eb652?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6550326824a9e9418e0a74973ca14896814be1a0c4753fef9a9f1811027eb652?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6550326824a9e9418e0a74973ca14896814be1a0c4753fef9a9f1811027eb652?s=96&d=mm&r=x\",\"caption\":\"Corelan Team (chap0)\"},\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/chap0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cisco VoIP Phones &ndash; A Hackers Perspective - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2010\/07\/27\/cisco-voip-phones-a-hackers-perspective\/","og_locale":"en_US","og_type":"article","og_title":"Cisco VoIP Phones &ndash; A Hackers Perspective - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Introduction In the world of VoIP phones, each person may look at them differently. For some, an annoyance that sit on their desk, or maybe for some it is simply a part of their job either deploying them or as a help desk position taking phone calls all day. This could even go as far &hellip; Continue reading \"Cisco VoIP Phones &ndash; A Hackers Perspective\"","og_url":"https:\/\/www.corelan.be\/index.php\/2010\/07\/27\/cisco-voip-phones-a-hackers-perspective\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2010-07-27T18:13:15+00:00","author":"Corelan Team (chap0)","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2010\/07\/27\/cisco-voip-phones-a-hackers-perspective\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2010\/07\/27\/cisco-voip-phones-a-hackers-perspective\/"},"author":{"name":"Corelan Team (chap0)","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/c34ba6b93811f60a4fa6ffc6c028b7f5"},"headline":"Cisco VoIP Phones &ndash; A Hackers Perspective","datePublished":"2010-07-27T18:13:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2010\/07\/27\/cisco-voip-phones-a-hackers-perspective\/"},"wordCount":209,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["Cisco"],"articleSection":["Cisco","Papers","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2010\/07\/27\/cisco-voip-phones-a-hackers-perspective\/","url":"https:\/\/www.corelan.be\/index.php\/2010\/07\/27\/cisco-voip-phones-a-hackers-perspective\/","name":"Cisco VoIP Phones &ndash; A Hackers Perspective - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2010-07-27T18:13:15+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2010\/07\/27\/cisco-voip-phones-a-hackers-perspective\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2010\/07\/27\/cisco-voip-phones-a-hackers-perspective\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2010\/07\/27\/cisco-voip-phones-a-hackers-perspective\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"Cisco VoIP Phones &ndash; A Hackers Perspective"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/c34ba6b93811f60a4fa6ffc6c028b7f5","name":"Corelan Team (chap0)","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6550326824a9e9418e0a74973ca14896814be1a0c4753fef9a9f1811027eb652?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/6550326824a9e9418e0a74973ca14896814be1a0c4753fef9a9f1811027eb652?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6550326824a9e9418e0a74973ca14896814be1a0c4753fef9a9f1811027eb652?s=96&d=mm&r=x","caption":"Corelan Team (chap0)"},"url":"https:\/\/www.corelan.be\/index.php\/author\/chap0\/"}]}},"views":7485,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/4461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=4461"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/4461\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=4461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=4461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=4461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}