Difference between revisions of "VoIP hacking workshop"
From Tmplab
(time) |
|||
Line 1: | Line 1: | ||
{{Workshop | {{Workshop | ||
|title=VoIP hacking workshop | |title=VoIP hacking workshop | ||
− | |when=Thursday 20th of May 2010 | + | |when=Thursday 20th of May 2010, 8PM (20h00) |
|where=/tmp/lab | |where=/tmp/lab | ||
|intro=Easy way to pentest VoIP infrastructure. | |intro=Easy way to pentest VoIP infrastructure. |
Revision as of 13:59, 18 May 2010
- Titre: VoIP hacking workshop
- Par: Sn0rkY
- Date: Thursday 20th of May 2010, 8PM (20h00)
- Lieu: /tmp/lab
Easy way to pentest VoIP infrastructure.
Overview:
* Identification of the VoIP Product * VLAN hopping, accessing the voice VLAN from the data VLAN * VoIP accounts enumeration * Communication wiretapping and injection of sound during a call * Spoofing of phone profiles and identity spoofing * UNISTM attack on Cisco IP phones * Bypass of call restrictions and voice gateway abuse * Grab of SIP or IAX credentials * Denial of Service on VoIP servers and IP phones
Prerequisites:
* Python >= 2.5 * An editor > vi * Scapy * Wireshark (optional)
Participants:
- Sn0rky
- Phil
- Jo
- Kugg
- Err404
- Jm
- Tealck