Difference between revisions of "VoIP hacking workshop"
From Tmplab
(time) |
|||
(4 intermediate revisions by 2 users not shown) | |||
Line 32: | Line 32: | ||
* Jm | * Jm | ||
* Tealck | * Tealck | ||
+ | * Nico | ||
+ | * lagachette | ||
|by=[[User:Sn0rkY|Sn0rkY]] | |by=[[User:Sn0rkY|Sn0rkY]] | ||
}} | }} |
Latest revision as of 14:57, 20 May 2010
- Titre: VoIP hacking workshop
- Par: Sn0rkY
- Date: Thursday 20th of May 2010, 8PM (20h00)
- Lieu: /tmp/lab
Easy way to pentest VoIP infrastructure.
Overview:
* Identification of the VoIP Product * VLAN hopping, accessing the voice VLAN from the data VLAN * VoIP accounts enumeration * Communication wiretapping and injection of sound during a call * Spoofing of phone profiles and identity spoofing * UNISTM attack on Cisco IP phones * Bypass of call restrictions and voice gateway abuse * Grab of SIP or IAX credentials * Denial of Service on VoIP servers and IP phones
Prerequisites:
* Python >= 2.5 * An editor > vi * Scapy * Wireshark (optional)
Participants:
- Sn0rky
- Phil
- Jo
- Kugg
- Err404
- Jm
- Tealck
- Nico
- lagachette