❌

Normal view

Received β€” 27 March 2026 ⏭ /r/netsec - Information Security News & Discussion

DVRTC: intentionally vulnerable VoIP/WebRTC lab with SIP enumeration, RTP bleed, TURN abuse, and credential cracking exercises

Author here. DVRTC is our attempt to fill a gap that's been there for a while: web app security has DVWA and friends, but there's been nothing equivalent for VoIP and WebRTC attack techniques.

The first scenario (pbx1) deploys a full stack β€” Kamailio as the SIP proxy, Asterisk as the back-end PBX, rtpengine for media, coturn for TURN/STUN β€” with each component configured to exhibit specific vulnerable behaviors:

  • Kamailio returns distinguishable responses for valid vs. invalid extensions (enumeration), logs User-Agent headers to MySQL without sanitisation (SQLi), and has a special handler that triggers digest auth leaks for extension 2000
  • rtpengine is using default configuration, that enables RTP bleed (leaking media from other sessions) and RTP injection
  • coturn uses hardcoded credentials and a permissive relay policy for the TURN abuse exercise
  • Asterisk has extension 1000 with a weak password (1500) for online cracking

7 exercises with step-by-step instructions. There's also a live instance at pbx1.dvrtc.net if you want to try it without standing up your own.

Happy to answer questions.

submitted by /u/EnableSecurity
[link] [comments]

China-linked Red Menshen using BPFdoor kernel backdoor in telecom networks

Backdoor operates at the kernel level using BPF to passively inspect traffic and trigger on crafted packets, avoiding exposed ports or typical C2 indicators.

Tradecraft enables long-term persistence and covert access inside core network infrastructure, with very limited visibility from standard monitoring.

Interesting case of network-layer backdoor design rather than traditional userland implants.

submitted by /u/raptorhunter22
[link] [comments]
❌