SlideShare a Scribd company logo
1 of 38
Download to read offline
VoIP Security 

Implementa3on and Protocol Problems  

        Sean Heelan, ISSA Seminar, May 2009 
Overview 
•  VoIP background info 
•  Finding and exploi3ng implementa3on related 
   bugs 
•  Finding and exploi3ng protocol related bugs 
•  Ques3ons! 




                 VoIP Security ‐ Implementa3on and 
5th May 2009                                          2 
                         Protocol Problems 
Who am I 
•  Graduate student in Computer Science 
•  Primarily interested in soNware verifica3on 
   and program analysis 




                 VoIP Security ‐ Implementa3on and 
5th May 2009                                          3 
                         Protocol Problems 
VoIP Background Info 




                     VoIP Security ‐ Implementa3on and 
5th May 2009                                              4 
                             Protocol Problems 
Popularity of VoIP 
•  Why bother looking for security problems? 
•  ~50% of American businesses using it in some 
   form in 2008 (src. Computer Economics) 
•  Anyone here today? 
•  Home users – Skype, Gizmo, Blueface etc. 




                    VoIP Security ‐ Implementa3on and 
5th May 2009                                             5 
                            Protocol Problems 
Ambiguous graph 3me 




                     VoIP Security ‐ Implementa3on and 
5th May 2009                                              6 
                             Protocol Problems 
Protocols 
•  SIP  
•  SCCP 
•  H.225 
•  H.239 
•  H.245 
•  RTCP 
•  SDP  
•  MGCP 
                VoIP Security ‐ Implementa3on and 
5th May 2009                                         7 
                        Protocol Problems 
Protocols 
•  IAX2  
•  Skype 
•  H.460 
•  H.450 
•  RTP 
•  STUN 
•  RSVP 
•  SS7 
•  ….and so on 
                  VoIP Security ‐ Implementa3on and 
5th May 2009                                           8 
                          Protocol Problems 
Protocols 
•  Why so many? 
•  Call setup, signalling, data transfer, route 
   nego3a3on, PSTN interoperability 
•  Each requiring a different protocol and a 
   different implementa3on 
•  Usually in C or C++ 



                   VoIP Security ‐ Implementa3on and 
5th May 2009                                            9 
                           Protocol Problems 
Protocols 
•  More protocols == More ahack vectors 
•  Heterogeneous networks are good for an 
   ahacker and bad for an administrator 
•  Tes3ng efforts are diluted across devices and 
   protocols 
•  No public tes3ng tools available for the 
   majority of the protocols men3oned  


                  VoIP Security ‐ Implementa3on and 
5th May 2009                                           10 
                          Protocol Problems 
VoIP: A hackers dream 
•  Integrates the voice communica3ons of an 
   organisa3on into an environment the ahacker 
   is familiar with 
•  Same protocols, tools and environments 
•  Open standards and accessible devices 
•  Scary as hell when you think about it – you 
   just moved your en3re comms infrastructure 
   to our playground 
•  Cheers! 
                      VoIP Security ‐ Implementa3on and 
5th May 2009                                               11 
                              Protocol Problems 
Ahacking the implementa3on 




                 VoIP Security ‐ Implementa3on and 
5th May 2009                                          12 
                         Protocol Problems 
Good ol’ memory corrup3on 
    Servers running on Windows, Linux or other 
    Unix   
+ Phones running on a tradi3onal OS or oNen 
     embedded Linux 
+ Wrihen in C/C++ 
= Buffer overflows, NULL pointers, infinite loops 
     and all their friends 


                      VoIP Security ‐ Implementa3on and 
5th May 2009                                               13 
                              Protocol Problems 
Finding the bugs 
•  Fuzzing ‐ a rather effec3ve hammer for many a 
   nail 
•  Automa3cally genera3on/sending semi‐valid 
   requests to a target in the hope of crashing it 
•  Requires no understanding of the applica3on/
   device internals 
•  Responsibly for the detec3on of a huge 
   percentage of security bugs 
                   VoIP Security ‐ Implementa3on and 
5th May 2009                                            14 
                           Protocol Problems 
Fuzzing in 2 minutes 
•  Genera3on based 
•  Muta3on based 
•  Extensions – Binary analysis, feedback loops, 
   debuggers 




                     VoIP Security ‐ Implementa3on and 
5th May 2009                                              15 
                             Protocol Problems 
Fuzzing example 1 
INVITE sip:201@192.168.3.102 SIP/2.0
CSeq: 536870905 INVITE
Via: SIP/2.0/UDP 192.168.3.104:6060;branch=z9hG4bKmj1079uq
Content-Type: application/sdp
Content-Length: 378


s_static(“INVITE quot;)
s_string(“sip:201@192.168.3.102”)
s_static(” SIP/2.0 rnquot;)


INVITE AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA SIP/2.0
CSeq: 536870905 INVITE
Via: SIP/2.0/UDP 192.168.3.104:6060;branch=z9hG4bKmj1079uq
Content-Type: application/sdp
Content-Length: 378



                              VoIP Security ‐ Implementa3on and 
5th May 2009                                                       16 
                                      Protocol Problems 
Fuzzing example 2 
INVITE sip:201@192.168.3.102 SIP/2.0
CSeq: 536870905 INVITE
Via: SIP/2.0/UDP 192.168.3.104:6060;branch=z9hG4bKmj1079uq
Content-Type: application/sdp
Content-Length: 378


s_static(quot;Content-Length: quot;)
s_dword(378, fuzzable=True, format=“ascii”)
s_static(quot;rnquot;)


INVITE sip:201@192.168.3.102 SIP/2.0
CSeq: 536870905 INVITE
Via: SIP/2.0/UDP 192.168.3.104:6060;branch=z9hG4bKmj1079uq
Content-Type: application/sdp
Content-Length: 4294967296



                               VoIP Security ‐ Implementa3on and 
5th May 2009                                                        17 
                                       Protocol Problems 
Building your own fuzzer 
•  Genera3onal fuzzing frameworks available – 
   Peach, Sulley, Fusil, Spike etc 
•  Map out the protocol in a high level 
   descrip3on language  
•  Auxiliary tools for crash detec3on and logging 




                       VoIP Security ‐ Implementa3on and 
5th May 2009                                                18 
                               Protocol Problems 
Feeling lazy? 
•  Free fuzzers for SIP – PROTOS, VoIPER 
•  Commercial fuzzers ‐ Codenomicon, 
   MuDynamics 
•  Use a generic fuzzer like GPF – takes a packet 
   capture and mutates it 




                  VoIP Security ‐ Implementa3on and 
5th May 2009                                           19 
                          Protocol Problems 
Does it work? 




                 VoIP Security ‐ Implementa3on and 
5th May 2009                                          20 
                         Protocol Problems 
And the award for epic fail goes to…. 




                VoIP Security ‐ Implementa3on and 
5th May 2009                                         21 
                        Protocol Problems 
Memory corrup3on summary 
•  Fuzzers make it simple to find bugs 
•  Trivial to find DoS condi3ons 
•  Currently no public exploits that remotely 
   execute malicious code on hard‐phones 
•  Exploi3ng vulnerabili3es in soN‐phones is 
   much easier, diho for servers running on 
   tradi3onal opera3ng systems 


                  VoIP Security ‐ Implementa3on and 
5th May 2009                                           22 
                          Protocol Problems 
So hard‐phones are safe then? 
•  Not quite … 
•  Run a variety of services along with the VoIP 
   core 
•  Web server, TFTP server/client, terminal 
   admin console 
•  Introduces every ahack vector available 
   against these services 


                  VoIP Security ‐ Implementa3on and 
5th May 2009                                           23 
                          Protocol Problems 
Web service ahacks 
•  Most hard‐phones provide a web based admin 
   interface, as do many servers 
•  Notoriously security agnos3c 
•  XSS, CSRF, SQL injec3on, default/no passwords, 
   authen3ca3on bypass 

  “Cisco Unified Communica7ons Manager is vulnerable to 
   a SQL Injec7on aBack in the parameter key of the 
   admin and user interface pages. A successful aBack 
   could allow an authen7cated aBacker to access 
   informa7on such as usernames and password hashes 
   that are stored in the database.” – Cisco 2008 
                     VoIP Security ‐ Implementa3on and 
5th May 2009                                              24 
                             Protocol Problems 
Web ahack example 
•  Snom 320  VoIP phones 
•  Admin interface accepts unauthorized POST 
   data 
•  Admin interface can also be used to make calls 
•  GNUCi3zen.org combined the above two 
   ‘features’ for remote surveillance 



                    VoIP Security ‐ Implementa3on and 
5th May 2009                                             25 
                            Protocol Problems 
GNUCi3zen.org – Snom 320 ahack 
•  Ahacker scans for vulnerable devices by 
   checking for remotely accessible signature 
   files 
•  Ahacker sends POST to vic3m’s IP with data: 
   NUMBER=ATTACKERNUM 
•  Ahacker answers the incoming call 
•  Vulnerable device uses inbuilt receiver to 
   capture ambient sound and send to the 
   ahacker 
                 VoIP Security ‐ Implementa3on and 
5th May 2009                                          26 
                         Protocol Problems 
Finding web service bugs 
•  Simple to automate 
•  Standard tools for finding SQL, CSRF and XSS 
   bugs – w3af ahack framework 
•  Using SIP packets as an injec3on vector – XSS 
   in log data  
•  Far easier to find and exploit a bug in a web 
   interface than to create a reliable memory 
   corrup3on exploit 
                       VoIP Security ‐ Implementa3on and 
5th May 2009                                                27 
                               Protocol Problems 
Ahacking the protocols 




                      VoIP Security ‐ Implementa3on and 
5th May 2009                                               28 
                              Protocol Problems 
Ahacking the protocols 
•  Authen3ca3on 
•  Authoriza3on 
•  Encryp3on 
•  Same approach as every TCP/IP based service 




                      VoIP Security ‐ Implementa3on and 
5th May 2009                                               29 
                              Protocol Problems 
Ahacking the protocols ‐ discovery 
•  Many VoIP protocols are TCP based and run on 
   standard ports – nmap 
•  Specialist tools available for certain protocols 
   – SIPVicious, iaxscan – Can scan thousands of 
   hosts an hour 
•  Scanning random hosts turns up hoards of 
   easily accessible servers 


                  VoIP Security ‐ Implementa3on and 
5th May 2009                                           30 
                          Protocol Problems 
Ahacking the protocols ‐ 
                    authen3ca3on 
•  SIP and IAX2 – 2 step authen3ca3on by default 
•  What does that mean? – We can enumerate valid 
   accounts first and then crack passwords 
•  Account discovery search space 
      – Two step auth = X*X 
      – Single step auth = XX 
          Where X is the size of the username/password pool 
•  We’d shoot a web developer that did this but 
   apparently it’s OK for VoIP 
                        VoIP Security ‐ Implementa3on and 
5th May 2009                                                   31 
                                Protocol Problems 
Ahacking the protocols ‐ 
                    authen3ca3on 
•  Many networks s3ll use 3 or 4 digit usernames 
   and passwords 
•  SIPVicious/iaxscan can check all possible 
   combina3ons in minutes 




                      VoIP Security ‐ Implementa3on and 
5th May 2009                                               32 
                              Protocol Problems 
Ahacking the protocols ‐ sniffing 
•  Not en3rely a protocol level problem 
•  Intercepted communica3ons can be easily 
   reconstructed into audio/video files – 
   wireshark, UCSniff 
•  VLAN hopping – exploi3ng networks that rely 
   on layer 2 protocols to allow access to the 
   voice LAN – Voip Hopper 


                 VoIP Security ‐ Implementa3on and 
5th May 2009                                          33 
                         Protocol Problems 
Taking the trunk 
•  Stealing individual accounts is fun and all but 
   how about stealing the phone company? 
•  Requires admin access to an accessible router 
   or switch 
•  How?  
•  Straight through the front door 



                   VoIP Security ‐ Implementa3on and 
5th May 2009                                            34 
                           Protocol Problems 
Taking the trunk 
•  Robert Moore – 2007, stole 10 million minutes 
   worth of talk 3me 
•  Step 1: Bought informa3on on corporate IP 
   addresses for $800 
•  Step 2: Scanned for accessible VoIP routers and 
   switches 
•  Step 3: Scanned for default passwords and 
   unpatched Cisco boxes 
•  Step 4: Profit! (Or jail in Mr. Moore’s case) 

                   VoIP Security ‐ Implementa3on and 
5th May 2009                                            35 
                           Protocol Problems 
Taking the trunk 
•  “70% of all the companies he scanned were 
   insecure, and 45% to 50% of VoIP providers were 
   insecure” 
•  “I'd say 85% of them were misconfigured routers. 
   They had the default passwords on themquot; 
•  “The telecoms we couldn't get into had access 
   lists or boxes we couldn't get into because of 
   strong passwords.” 
  ‐ Source: http://www.informationweek.com
                   VoIP Security ‐ Implementa3on and 
5th May 2009                                            36 
                           Protocol Problems 
Ahacking the protocols ‐ summary 
•  Essen3ally the same offence/defence we’ve 
   had for years 
•  Discovery, enumera3on and exploita3on 
   follow roughly the same paherns as most 
   other TCP/IP services 
•  Protec3ng against these problems is the same 
   struggle with password management, access 
   lists and updates 

                 VoIP Security ‐ Implementa3on and 
5th May 2009                                          37 
                         Protocol Problems 
Ques3on Time! 
                http://seanhn.wordpress.com 




                     VoIP Security ‐ Implementa3on and 
5th May 2009                                              38 
                             Protocol Problems 

More Related Content

What's hot

Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceFatih Ozavci
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Fatih Ozavci
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesFatih Ozavci
 
Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!Fatih Ozavci
 
VoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenFatih Ozavci
 
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)Fatih Ozavci
 
Encrypted Voice Communications
Encrypted Voice CommunicationsEncrypted Voice Communications
Encrypted Voice Communicationssbwahid
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateWave Italia SpA
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.Sumutiu Marius
 
Asterisk PBX Presentation, 2006
Asterisk PBX Presentation, 2006Asterisk PBX Presentation, 2006
Asterisk PBX Presentation, 2006Erkhembaatar M.
 
Aethra Telecommunications Integrated Access Devices Jan 2014
Aethra Telecommunications Integrated Access Devices Jan 2014Aethra Telecommunications Integrated Access Devices Jan 2014
Aethra Telecommunications Integrated Access Devices Jan 2014Aethra Telecommunications
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyChristopher Duffy
 
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemSyuan Wang
 
Voice encryption for gsm using arduino
Voice encryption for gsm using arduinoVoice encryption for gsm using arduino
Voice encryption for gsm using arduinoiruldaworld
 

What's hot (20)

Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco Phones
 
Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!
 
VoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers Awaken
 
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
 
VOIP security
VOIP securityVOIP security
VOIP security
 
Encrypted Voice Communications
Encrypted Voice CommunicationsEncrypted Voice Communications
Encrypted Voice Communications
 
Meletis Belsis - Voip security
Meletis Belsis - Voip securityMeletis Belsis - Voip security
Meletis Belsis - Voip security
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical Overview
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
 
Asterisk PBX Presentation, 2006
Asterisk PBX Presentation, 2006Asterisk PBX Presentation, 2006
Asterisk PBX Presentation, 2006
 
Grandstream Surveillance Presentation 06/2014
Grandstream Surveillance Presentation 06/2014Grandstream Surveillance Presentation 06/2014
Grandstream Surveillance Presentation 06/2014
 
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice EncryptionSlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice Encryption
 
Aethra Telecommunications Integrated Access Devices Jan 2014
Aethra Telecommunications Integrated Access Devices Jan 2014Aethra Telecommunications Integrated Access Devices Jan 2014
Aethra Telecommunications Integrated Access Devices Jan 2014
 
Aethra Telecommunications IP PBX Jan 2014
Aethra Telecommunications IP PBX Jan 2014Aethra Telecommunications IP PBX Jan 2014
Aethra Telecommunications IP PBX Jan 2014
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
 
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
 
Voice encryption for gsm using arduino
Voice encryption for gsm using arduinoVoice encryption for gsm using arduino
Voice encryption for gsm using arduino
 

Viewers also liked

VoIP Security for Dummies
VoIP Security for DummiesVoIP Security for Dummies
VoIP Security for DummiesAvaya Inc.
 
Voip powerpoint
Voip powerpointVoip powerpoint
Voip powerpointGW1992
 
Voice over IP (VoIP)
Voice over IP (VoIP)Voice over IP (VoIP)
Voice over IP (VoIP)Peter R. Egli
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)habib_786
 
Our Internet Connection
Our Internet ConnectionOur Internet Connection
Our Internet ConnectionCSaC
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?mahipal9
 
What is VoIP and How it works?
What is VoIP and How it works?What is VoIP and How it works?
What is VoIP and How it works?broadconnect
 
Voice over internet protocol (VoIP)
 Voice over internet protocol (VoIP)  Voice over internet protocol (VoIP)
Voice over internet protocol (VoIP) Namra Afzal
 
Voip introduction
Voip introductionVoip introduction
Voip introductiondaksh bhatt
 
VOIP Presentation
VOIP Presentation VOIP Presentation
VOIP Presentation tofael1
 
Public Switched Telephone Network
Public Switched Telephone NetworkPublic Switched Telephone Network
Public Switched Telephone NetworkHaither Mithath
 
VOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLVOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLRajan Kumar
 
Public Switched Telephone Network (PSTN)
Public Switched Telephone Network (PSTN)Public Switched Telephone Network (PSTN)
Public Switched Telephone Network (PSTN)J.T.A.JONES
 

Viewers also liked (17)

VoIP Security for Dummies
VoIP Security for DummiesVoIP Security for Dummies
VoIP Security for Dummies
 
Voip
VoipVoip
Voip
 
Voip powerpoint
Voip powerpointVoip powerpoint
Voip powerpoint
 
Voice over IP (VoIP)
Voice over IP (VoIP)Voice over IP (VoIP)
Voice over IP (VoIP)
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
 
Our Internet Connection
Our Internet ConnectionOur Internet Connection
Our Internet Connection
 
Voice over internet protocol
Voice over internet protocolVoice over internet protocol
Voice over internet protocol
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?
 
Introduction to VoIP
Introduction to VoIPIntroduction to VoIP
Introduction to VoIP
 
What is VoIP and How it works?
What is VoIP and How it works?What is VoIP and How it works?
What is VoIP and How it works?
 
Voice over internet protocol (VoIP)
 Voice over internet protocol (VoIP)  Voice over internet protocol (VoIP)
Voice over internet protocol (VoIP)
 
Voip introduction
Voip introductionVoip introduction
Voip introduction
 
Embedded Linux on ARM
Embedded Linux on ARMEmbedded Linux on ARM
Embedded Linux on ARM
 
VOIP Presentation
VOIP Presentation VOIP Presentation
VOIP Presentation
 
Public Switched Telephone Network
Public Switched Telephone NetworkPublic Switched Telephone Network
Public Switched Telephone Network
 
VOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLVOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOL
 
Public Switched Telephone Network (PSTN)
Public Switched Telephone Network (PSTN)Public Switched Telephone Network (PSTN)
Public Switched Telephone Network (PSTN)
 

Similar to VoIP security: Implementation and Protocol Problems

Session Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysisSession Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysischinmaypadhye1985
 
Scanning The Intertubes For Voip
Scanning The Intertubes For VoipScanning The Intertubes For Voip
Scanning The Intertubes For VoipSandro Gauci
 
Group1 Ss08 Smartphones
Group1 Ss08 SmartphonesGroup1 Ss08 Smartphones
Group1 Ss08 SmartphonesKalun Leung
 
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011Lorenzo Busatti
 
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011Lorenzo Busatti
 
wifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slideswifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slidesguest1c1a9a
 
nokia and opensource n800
nokia and opensource n800nokia and opensource n800
nokia and opensource n800winsopc
 
A Skype case study (2011)
A Skype case study (2011)A Skype case study (2011)
A Skype case study (2011)Vasia Kalavri
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer vilss
 
Hybrid Open Source Telephony (OST) and Proprietary Scenarios
Hybrid Open Source Telephony (OST) and Proprietary ScenariosHybrid Open Source Telephony (OST) and Proprietary Scenarios
Hybrid Open Source Telephony (OST) and Proprietary ScenariosRoberto Galoppini
 
Open Mic Webcast: IBM Sametime Audio Video Troubleshooting - 04 May 2016
Open Mic Webcast: IBM Sametime Audio Video Troubleshooting - 04 May 2016Open Mic Webcast: IBM Sametime Audio Video Troubleshooting - 04 May 2016
Open Mic Webcast: IBM Sametime Audio Video Troubleshooting - 04 May 2016Gunawan T Wicaksono
 
Top 10 most interesting vulnerabilities and attacks in SAP
Top 10 most interesting vulnerabilities and attacks in SAPTop 10 most interesting vulnerabilities and attacks in SAP
Top 10 most interesting vulnerabilities and attacks in SAPERPScan
 
2015 02 24 lmtv baselining
2015 02 24 lmtv baselining2015 02 24 lmtv baselining
2015 02 24 lmtv baseliningTony Fortunato
 
Телефонные аппараты SNOM для Skype for Business Server. Обзор возможностей, п...
Телефонные аппараты SNOM для Skype for Business Server. Обзор возможностей, п...Телефонные аппараты SNOM для Skype for Business Server. Обзор возможностей, п...
Телефонные аппараты SNOM для Skype for Business Server. Обзор возможностей, п...Alexander Zhuravlev, Ph.D.
 

Similar to VoIP security: Implementation and Protocol Problems (20)

Session Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysisSession Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysis
 
Scanning The Intertubes For Voip
Scanning The Intertubes For VoipScanning The Intertubes For Voip
Scanning The Intertubes For Voip
 
Group1 Ss08 Smartphones
Group1 Ss08 SmartphonesGroup1 Ss08 Smartphones
Group1 Ss08 Smartphones
 
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
 
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
 
wifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slideswifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slides
 
wifi
wifiwifi
wifi
 
nokia and opensource n800
nokia and opensource n800nokia and opensource n800
nokia and opensource n800
 
No More Fraud, Astricon, Las Vegas 2014
No More Fraud, Astricon, Las Vegas 2014No More Fraud, Astricon, Las Vegas 2014
No More Fraud, Astricon, Las Vegas 2014
 
Performance test
Performance testPerformance test
Performance test
 
A Skype case study (2011)
A Skype case study (2011)A Skype case study (2011)
A Skype case study (2011)
 
Tp link error codes
Tp link error codesTp link error codes
Tp link error codes
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
 
Hybrid Open Source Telephony (OST) and Proprietary Scenarios
Hybrid Open Source Telephony (OST) and Proprietary ScenariosHybrid Open Source Telephony (OST) and Proprietary Scenarios
Hybrid Open Source Telephony (OST) and Proprietary Scenarios
 
Open Mic Webcast: IBM Sametime Audio Video Troubleshooting - 04 May 2016
Open Mic Webcast: IBM Sametime Audio Video Troubleshooting - 04 May 2016Open Mic Webcast: IBM Sametime Audio Video Troubleshooting - 04 May 2016
Open Mic Webcast: IBM Sametime Audio Video Troubleshooting - 04 May 2016
 
Top 10 most interesting vulnerabilities and attacks in SAP
Top 10 most interesting vulnerabilities and attacks in SAPTop 10 most interesting vulnerabilities and attacks in SAP
Top 10 most interesting vulnerabilities and attacks in SAP
 
2015 02 24 lmtv baselining
2015 02 24 lmtv baselining2015 02 24 lmtv baselining
2015 02 24 lmtv baselining
 
voip_en
voip_envoip_en
voip_en
 
Free OpUtils Training presentation
Free OpUtils Training presentationFree OpUtils Training presentation
Free OpUtils Training presentation
 
Телефонные аппараты SNOM для Skype for Business Server. Обзор возможностей, п...
Телефонные аппараты SNOM для Skype for Business Server. Обзор возможностей, п...Телефонные аппараты SNOM для Skype for Business Server. Обзор возможностей, п...
Телефонные аппараты SNOM для Skype for Business Server. Обзор возможностей, п...
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

VoIP security: Implementation and Protocol Problems