The objective of my career has been pretty simple up until recently. Bad guys want information X. Keep bad guys from taking information X. Simple enough. There’s also an Appendix to that objective. Bad guys always want to take information X. Build a program to stop bad guys from taking information X. Routinely check the infrastructure […]
Knock off those network analysis cobwebs by downloading the file below and taking part in the Wireshark VoIP challenge. This a a short capture but a tricky one. Wireshark PCAP File MD5 Hash: 139b7dfea64ee097a4a415ba320cc5b6 The Challenge I’m currently putting together a new VoIP class and came across a nasty little Linux program that can manipulate VoIP […]
Auto Answer is a feature in many VoIP phones that allows the phone to go off-hook the very instant a call is received by the instrument. In this video we’ll look at how this feature is setup and talk about the security vulnerabilities. NIST Report: Link Video Conferencing Auto Answer: Link 1 Link 2 Link 3
Sometime when performing a packet capture, you may come across some VoIP conversations. If the initial call setup is not in this capture, subsequent voice packets will be labeled in such a way that it makes it difficult to decode the VoIP conversation. What follows is a tutorial to get around this problem.
At one time I had the misconception that you had to have an IP PBX to use a VoIP phone, but it’s simply not true. In this video I’ll show you how to dial another VoIP phone without routing through the PBX or SIP Proxy. Linphone: http://www.linphone.org Grandstream phones for under $50: http://www.ebay.com/sch/i.html?_from=R40&_sacat=0&_nkw=grandstream&_udhi=50