seeing is believing
Showing 1 - 15 of 15 RSS Feed

Files from Fatih Ozavci

Real NameFatih Ozavci
Email addressprivate
Websitewww.viproy.com/fozavci
First Active2007-05-17
Last Active2015-12-01
View User Profile
VoIP Wars: Destroying Jar Jar Lync
Posted Dec 1, 2015
Authored by Fatih Ozavci | Site viproy.com

This archive includes presentation slides for the talk VoIP Wars: Destroying Jar Jar Lync along with the Viproxy tool used to perform the attack.

tags | paper
systems | linux
MD5 | d01f150679adc98f0bc25ca5a7f93b27
Viproy VoIP Penetration / Exploitation Kit 2.99.1
Posted Aug 18, 2015
Authored by Fatih Ozavci | Site viproy.com

Viproy Voip Penetration and Exploitation Kit is developed to improve quality of SIP penetration testing. It provides authentication and trust analysis features that assists in creating simple tests.

Changes: Various updates.
tags | tool
systems | unix
MD5 | e0191021c0364a6ae196f7f5037bbac6
The Art Of VoIP Hacking
Posted Aug 10, 2015
Authored by Fatih Ozavci, Christos Archimandritis

This set of slide is from "The Art of VoIP Hacking", a workshop that was held at Defcon 23.

tags | paper
MD5 | 2bb191336700840493d1684a6f05b828
Viproy VoIP Penetration / Exploitation Kit 2.0
Posted Aug 18, 2014
Authored by Fatih Ozavci | Site viproy.com

Viproy Voip Penetration and Exploitation Kit is developed to improve quality of SIP penetration testing. It provides authentication and trust analysis features that assists in creating simple tests.

Changes: Released at Blackhat Arsenal USA 2014 with TCP/TLS support for SIP, vendor extensions support, Cisco CDP spoofer/sniffer, Cisco Skinny protocol analyzers, VOSS exploits and network analysis modules. Furthermore, Viproy provides SIP and Skinny development libraries for custom fuzzing and analyze modules.
tags | tool
systems | linux, unix
MD5 | 82dee8e3b84a388e0cf419630d57166a
VoIP Wars: Attack Of The Cisco Phones
Posted Aug 18, 2014
Authored by Fatih Ozavci

These are the slides from the presentation "VoIP Wars: Attack of the Cisco Phones" from the talk given at Defcon 22 and Blackhat USA 2014.

tags | paper
systems | cisco
MD5 | bb13aada0c6fd0247b93479a050ac5e4
Viproy VoIP Penetration / Exploitation Kit 1.0
Posted Jul 26, 2014
Authored by Fatih Ozavci | Site viproy.com

Viproy Voip Penetration and Exploitation Kit is developed to improve quality of SIP penetration testing. It provides authentication and trust analysis features that assists in creating simple tests.

Changes: Release 1.0 with various updates.
tags | tool
systems | unix
MD5 | 37c0419cf33bcae70d12db453738d631
VoIP Wars: Return Of The SIP
Posted Aug 6, 2013
Authored by Fatih Ozavci

These are the presentation slides from "VoIP Wars: Return of the SIP" as presented at Defcon 21 in Las Vegas.

tags | paper
MD5 | 2a27c2084d5a6bce0b1e763dfb792f3b
Hacking SIP Like A Boss Presentation Slides
Posted Jun 8, 2013
Authored by Fatih Ozavci

These are the presentation slides for the Hacking SIP Like A Boss presentation given at Athcon 2013.

tags | paper
MD5 | 539aafae9d174506acc7b85a6c4f5d40
Viproy VoIP Penetration / Exploitation Kit
Posted Apr 11, 2013
Authored by Fatih Ozavci | Site viproy.com

Viproy Voip Penetration and Exploitation Kit is developed to improve quality of SIP penetration testing. It provides authentication and trust analysis features that assists in creating simple tests.

tags | tool
systems | unix
MD5 | 15a0884b6978e9fcc413813d92c2c5cf
Hacking Trust Relationships Between SIP Gateways
Posted Feb 15, 2013
Authored by Fatih Ozavci

NGN (Next Generation Networks) operators provide SIP services for their customers. Customers can call other operator's customers via SIP services and SIP gateways. SIP gateways use SIP Trunks for trusted call initiation and cdr/invoice management. In this paper, a new method will be explained. The technique describes how you can detect trusted 3rd party SIP Trunks and initiate a call.

tags | paper
MD5 | b01c34a288842aa683d300eec9f0407f
Metasploit SIP Penetration Testing Modules
Posted Feb 5, 2013
Authored by Fatih Ozavci | Site github.com

SIP library for Metasploit is developed to help SIP Penetration Tests. It provides authentication feature that helps to create simple tests. It includes 5 different modules with authentication support: options tester, brute forcer, enumerator, invite tester and registration tester. All attacks could perform before and after authentication to fuzz SIP services and value added services.

tags | exploit, tool
systems | unix
MD5 | b3788e4b2fd56bb05cd17d98b915abb8
Pen-Tester's Guide To Metasploit Framework
Posted Jan 16, 2013
Authored by Fatih Ozavci | Site gamasec.net

This 250+ page document is a pentesting guide to using the Metasploit Framework. Written in Turkish.

tags | paper
MD5 | 89f84892e289337734145482a2f46c4a
Secunia Security Advisory 27384
Posted Oct 30, 2007
Authored by Secunia, Fatih Ozavci | Site secunia.com

Secunia Security Advisory - Fatih Ozavci and Caglar Cakici have reported some vulnerabilities in RSA KEON Registration Authority, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | e45790b0c1f3d19af9ec60c2eb2af0fe
GS07-02.txt
Posted Oct 25, 2007
Authored by Fatih Ozavci, Caglar Cakici | Site gamasec.net

The RSA KEON Registration Authority Web Interface suffers from multiple cross site scripting vulnerabilities. Version 1.0 is susceptible.

tags | advisory, web, vulnerability, xss
MD5 | 03a90818e1fd1fb2fa73e5d90e719eab
GS07-01.txt
Posted May 17, 2007
Authored by Fatih Ozavci, Caglar Cakici | Site gamasec.net

Various HTTP content scanning systems fail to properly scan full-width/half-width Unicode encoded traffic. This may allow malicious content to bypass HTTP content scanning systems. Systems affected include Checkpoint Web Intelligence and IBM ISS Proventia Series systems.

tags | advisory, web
MD5 | 0a9c643277ef9ac0d42b10d2a455e812
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close