Difference between revisions of "VoIP hacking workshop"
From Tmplab
Line 30: | Line 30: | ||
* Kugg | * Kugg | ||
* Err404 | * Err404 | ||
+ | * Jm | ||
|by=[[User:Sn0rkY|Sn0rkY]] | |by=[[User:Sn0rkY|Sn0rkY]] | ||
}} | }} |
Revision as of 18:18, 17 May 2010
- Titre: VoIP hacking workshop
- Par: Sn0rkY
- Date: Thursday 20th of May 2010
- Lieu: /tmp/lab
Easy way to pentest VoIP infrastructure.
Overview:
* Identification of the VoIP Product * VLAN hopping, accessing the voice VLAN from the data VLAN * VoIP accounts enumeration * Communication wiretapping and injection of sound during a call * Spoofing of phone profiles and identity spoofing * UNISTM attack on Cisco IP phones * Bypass of call restrictions and voice gateway abuse * Grab of SIP or IAX credentials * Denial of Service on VoIP servers and IP phones
Prerequisites:
* Python >= 2.5 * An editor > vi * Scapy * Wireshark (optional)
Participants:
- Sn0rky
- Phil
- Jo
- Kugg
- Err404
- Jm