The objective of my career has been pretty simple up until recently. Bad guys want information X. Keep bad guys from taking information X. Simple enough. There’s also an Appendix to that objective. Bad guys always want to take information X. Build a program to stop bad guys from taking information X. Routinely check the infrastructure […]
Knock off those network analysis cobwebs by downloading the file below and taking part in the Wireshark VoIP challenge. This a a short capture but a tricky one. Wireshark PCAP File MD5 Hash: 139b7dfea64ee097a4a415ba320cc5b6 The Challenge I’m currently putting together a new VoIP class and came across a nasty little Linux program that can manipulate VoIP […]
Sometime when performing a packet capture, you may come across some VoIP conversations. If the initial call setup is not in this capture, subsequent voice packets will be labeled in such a way that it makes it difficult to decode the VoIP conversation. What follows is a tutorial to get around this problem.