{"id":993,"date":"2008-09-04T05:39:32","date_gmt":"2008-09-04T05:39:32","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=993"},"modified":"2015-09-09T19:39:18","modified_gmt":"2015-09-09T11:39:18","slug":"xtest-voip-infrastructure-security-testing-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2008\/09\/xtest-voip-infrastructure-security-testing-tool\/","title":{"rendered":"XTest – VoIP Infrastructure Security Testing Tool"},"content":{"rendered":"

[ad]<\/p>\n

What is XTest?<\/strong><\/p>\n

XTest is a simple, practical, and free, wired 802.1x supplicant security tool implementing the RFC 3847 EAP-MD5 Authentication method. It can be used to assess the password strength within wired ethernet environments that rely on 802.1x to protect IP Phones and the VoIP Infrastructure against rogue PC access. XTest is developed in C and freely available to anyone, under the GPLv3 license.
\nWhy XTest?<\/p>\n

XTest was developed with the specific aim of improving the security of environments that use 802.1x to protect IP Phone endpoints and their supporting VoIP Infrastructure. With the increasing prevalence of 802.1x Supplicant support in wired hard Phones, 802.1x will be increasingly used to ensure that remote IP Phones placed in areas with low physical security will have their directly connected ethernet switch ports secured against unauthorized access.<\/p>\n

Furthermore, the tool can demonstrate the danger of relying solely on 802.1x, because the current wired 802.1x implementation only requires authentication when the port initially comes up\/up. Subsequent packets are not authenticated, allowing an attacker to share a connection on a hub with the valid 802.1x supplicant, allowing unauthorized switchport access.<\/p>\n

Features<\/strong> <\/p>\n