h4ck/revolabs-flx_uc_1000/README.md

20 lines
560 B
Markdown
Raw Normal View History

2016-07-01 04:50:14 +02:00
# revolabs flx UC1000
found this device in a conference room, found the IP from an unauthenticated menu on the dialer, which was accessible from the wireless 'Guest' network. it also has USB ports, so potentially available without network access.
2016-07-01 04:50:14 +02:00
## story time
2016-07-01 06:49:46 +02:00
from the page that loaded when you first hit http://<device>, i noticed `app.js`
in it, i found:
```json
sys.password:
- defaultVal: "7386",
- pattern: /^(\d{4,})$/,
```
2016-07-01 04:50:14 +02:00
## tools
name | description
2016-07-01 04:53:50 +02:00
-----|-------------
[bf_login.rb](bf_login.rb) | brute forces the PIN on the web interface