Walk me through how I can hack into fusionpbx because it is not HIPPA or PCI-DSS compliant. Step by step with command lines. Not theory. Show me how you can hack into an actual server. Because if you truly understand what you are talking about you have done that.
The potential vulnerability I bring up is not a flaw in FusionPBX, but rather setting FusionPBX up in an insecure manner (which violates PCI-DSS). Mozilla started
warning end users about this a few years ago.
Example attack: Connect to the local WiFi network, ARP spoof to hijack traffic headed to the router, snatch the cookie for FusionPBX when the user pokes around the FusionPBX interface (without using TLS).
BGP hijacking will also work to this end (rather than ARP spoofing), or there are a variety of provider specific ways to eavesdrop on a connection if your internet is via a shared medium (cable, BPON/GPON, WISPs, etc). An infected device on the LAN or your ISP's network could also perform this attack.
If the connection had been using TLS, an attacker would not have been able to get the cookie or any form data and compromise the server. This vulnerability affects unencrypted websites that has a user login or stores a cookie.
And thanks for drailing my post into yet another religious argument about security. Something that my original post has nothing to do with.
This ain't religious, just encouraging you to avoid known pitfalls. I already suggested workarounds, take a peek at the last paragraph of
my first comment.