{"id":1783,"date":"2011-11-25T09:45:37","date_gmt":"2011-11-25T09:45:37","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=1783"},"modified":"2011-11-21T04:40:05","modified_gmt":"2011-11-21T04:40:05","slug":"voip-hopper-2-01-released-ip-phone-vlan-hopping-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2011\/11\/voip-hopper-2-01-released-ip-phone-vlan-hopping-tool\/","title":{"rendered":"VoIP Hopper 2.01 Released – IP Phone VLAN Hopping Tool"},"content":{"rendered":"

VoIP Hopper is a GPLv3 licensed security tool, written in C, that rapidly runs a VLAN Hop into the Voice VLAN on specific ethernet switches. VoIP Hopper does this by mimicking the behavior of an IP Phone, in Cisco, Avaya, and Nortel environments.<\/p>\n

This requires two important steps in order for the tool to traverse VLANs for unauthorized access. First, discovery of the correct 12 bit Voice VLAN ID (VVID) used by the IP Phones is required. VoIP Hopper supports multiple protocol discovery methods (CDP, DHCP, LLDP-MED, 802.1q ARP) for this important first step. Second, the tool creates a virtual VoIP ethernet interface on the OS. It then inserts a spoofed 4-byte 802.1q vlan header containing the 12 bit VVID into a spoofed DHCP request.<\/p>\n

Once it receives an IP address in the VoIP VLAN subnet, all subsequent ethernet frames are “tagged” with the spoofed 802.1q header.<\/p>\n

VoIP Hopper is a VLAN Hop test tool but also a tool to test VoIP infrastructure security. <\/p>\n

New Features<\/strong><\/p>\n