Preparation
- Download pmdump from http://www.ntsecurity.nu/toolbox/pmdump/.
- Start MagicJack
- Identify MagicJack's process ID (PID).
- Open a DOS (command) window.
- Execute pmdump -list
- Find "magicjack.exe" in the output. Note the number associated with it.
- Make at least one call. (Ex. to the special echo-test number: 909-390-0003.).
- Using the DOS (command) window and PID as described above, execute:
pmdump {pid} mj_dump.txt - Open mj_dump.txt using a text editor like textpad.
- Search for the string:
s=ENSResip
For example, if you connect to the Phoenix proxy, you should see:
o=- {nnnnnnnnnn} {nnnnnnnnnn} IN IP4 66.104.81.70 s=ENSResip c=IN IP4 66.104.81.75You can use nslookup to resolve both IP addresses to hostnames, revealing the regional SIP/proxy and RTP/vms servers you are presently using.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.