Skip to main content

Cisco Phone 7970g rooted.

I wonder why nobody did this before :)
Having physical access to the device,
it's really easy to obtain root privileges.
This could allow anyone to modify a phone and
log the activity, re-route calls or anything else.

Once again, I think the big companies need
more skilled security experts to cross-check
every product before releasing it to the public.

If you need my advice, use the QR code on the
LEFT side of this website to contact me.

Oh, and obviously this can be applied to all
similar products like 7975g and many others.



  1. Hi I wanted some info on vodaphone mobile broadband hotspot device. Where can i send a message to you?

  2. zibri AT zibri DOT org it's not so difficult :)

  3. Obviously, in the picture above, SU is not the default command but the hacked one.


Post a Comment

Popular posts from this blog

TP-LINK Configuration file encrypt and decrypt.

Here we go! TP-Link is another company that thinks that security by obscurity could ever work. If you "backup" the configuration from most TP-Link routers, you will get a .BIN file which is "encrypted". Use this utility below, to decrypt it (so you can edit it) and encrypt it again. Have fun. Drop files here or

Powerline Ethernet fun and secrets.

Many 200 Mb/s powerline adapters nowadays are based on the INTELLON 6300 chipset. Despite what can be thought looking at them, they are all using the same hardware and firmwares. I heard many people with Netgear XAV101 or Linksys PLK 200 or PLE 200 having problems after firmware updates and many other people with other brands having much more problems because of lack of support or configuration/upgrade utilities. So let me explain a few things I learnt studying them. Many of 200 Mb/s powerline ethernet adapters follow the "HomePlug AV" standard. (85 Mb adapters use HomePlug 1.0 standard which is completely different). This standard uses ethernet broadcast packets using the HomePlug AV protocol. The interesting thing is that their firmware is made of two different parts: a .PIB file (Parameter Information Block) and a .NVM file (the code itself). In the P.I.B. there are many interesting things: The branding (mac address, device name, etc) and the tone map. I test


Hello again! Many of you probably hate as I do CORS because it hinders the very nature of internet, which is SHARING. There are some services to circumvent this commercial  restriction, one of these is the famous "cors anywhere". So yesterday I decided to make my own and allow you to make your own in only 2 minutes. To do so you just need a cloudflare account (can be set up in 1 minute). The you can upload my worker on it and have your personal very fast cors proxy! So, enough talk, just head to: The is also a demo online at: Enjoy! Zibri