[ Removed by Reddit on account of violating the content policy. ]
[link] [comments]
[ Removed by Reddit on account of violating the content policy. ]
Author here. DVRTC is our attempt to fill a gap that's been there for a while: web app security has DVWA and friends, but there's been nothing equivalent for VoIP and WebRTC attack techniques.
The first scenario (pbx1) deploys a full stack β Kamailio as the SIP proxy, Asterisk as the back-end PBX, rtpengine for media, coturn for TURN/STUN β with each component configured to exhibit specific vulnerable behaviors:
7 exercises with step-by-step instructions. There's also a live instance at pbx1.dvrtc.net if you want to try it without standing up your own.
Happy to answer questions.
Backdoor operates at the kernel level using BPF to passively inspect traffic and trigger on crafted packets, avoiding exposed ports or typical C2 indicators.
Tradecraft enables long-term persistence and covert access inside core network infrastructure, with very limited visibility from standard monitoring.
Interesting case of network-layer backdoor design rather than traditional userland implants.