Difference between revisions of "VoIP hacking workshop"

From Tmplab
 
(9 intermediate revisions by 6 users not shown)
Line 1: Line 1:
 
{{Workshop
 
{{Workshop
 
|title=VoIP hacking workshop
 
|title=VoIP hacking workshop
|when=Thursday 20th of May 2010
+
|when=Thursday 20th of May 2010, 8PM (20h00)
 
|where=/tmp/lab
 
|where=/tmp/lab
 
|intro=Easy way to pentest VoIP infrastructure.
 
|intro=Easy way to pentest VoIP infrastructure.
Line 24: Line 24:
 
   * Wireshark (optional)
 
   * Wireshark (optional)
  
 +
Participants:
 +
* Sn0rky
 +
* Phil
 +
* Jo
 +
* Kugg
 +
* Err404
 +
* Jm
 +
* Tealck
 +
* Nico
 +
* lagachette
  
 
|by=[[User:Sn0rkY|Sn0rkY]]
 
|by=[[User:Sn0rkY|Sn0rkY]]
 
}}
 
}}

Latest revision as of 14:57, 20 May 2010

  • Titre: VoIP hacking workshop
  • Par: Sn0rkY
  • Date: Thursday 20th of May 2010, 8PM (20h00)
  • Lieu: /tmp/lab

Easy way to pentest VoIP infrastructure.

Overview:

  * Identification of the VoIP Product
  * VLAN hopping, accessing the voice VLAN from the data VLAN
  * VoIP accounts enumeration
  * Communication wiretapping and injection of sound during a call
  * Spoofing of phone profiles and identity spoofing
  * UNISTM attack on Cisco IP phones
  * Bypass of call restrictions and voice gateway abuse
  * Grab of SIP or IAX credentials
  * Denial of Service on VoIP servers and IP phones

Prerequisites:

 * Python >= 2.5
 * An editor > vi
 * Scapy
 * Wireshark (optional)

Participants:

  • Sn0rky
  • Phil
  • Jo
  • Kugg
  • Err404
  • Jm
  • Tealck
  • Nico
  • lagachette