Since more than a few people were interested in current technology related to UpNp,

here's some of the features of this dangerous, yet mostly open protocol:

Miranda is one of the oldest tools used for upnp discovery.  http://www.securiteam.com/tools/6N0012KN5Q.html

http://www.ethicalhacker.net/content/view/220/24/

On a more interesting note, upnp can actually be used as an attack vector:
http://www.gnucitizen.org/blog/hacking-with-upnp-universal-plug-and-play/

Which has been exposed at both 2600 and DefCon as early as 2001.
http://www.upnp-hacks.org/upnp.html

The most common current use of upnp as an attack vector involves Linksys "routers":
http://homecommunity.cisco.com/t5/Wireless-Routers/Hackers-Using-Linksys-Wireless-Router-to-Break-In-Through-The/m-p/330103

As you can see, any of you wanting to do research in this area, could easily come upon some real world cracks or at least a few bugtraq entries.  Perhaps enough to present next year at one of the security Cons?


 http://www.obnosis.com
Catch My MetaSploit & IP CAM Surveillance
Presentations @ ABLEConf.com in April!