Release Notes: This is the first official release. The following functionalities are currently available: grab specific information from a Cisco IP Phone embedded Web server to better qualify the device, retrieve the Cisco IP Phone configuration file from a TFTP server whenever possible (if the device is not a Cisco IP Phone, retrieve the Web banner whenever possible), test the SIP UDP/TCP, SIPS UDP/TCP, and SCCP ports, try to identify the editor from the MAC address, and identify the IP communication product from information included in Web pages.
Release Notes: This release adds a new SIP Scanner (UDP or TCP) module with administration services detection and information gathering on SIP UA or server. Threads have been implemented in the launcher. Several tools can now be used at the same time.
Release Notes: For the scanner, this release adds VxWorks debug mode detection.
Release Notes: This release fixes an exploit related to the Aastra IP Phone hardcode telnet login/password.
Release Notes: An incorrect name in a file blocked the launch of the main script on some systems. This has been corrected.
Release Notes: This release adds code for a polycom HDX telnet authorization bypass exploit and a "having fun with SSH on Cisco IP" phone tool.