what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files from Fatih Ozavci

Real NameFatih Ozavci
Email addressprivate
Websitewww.viproy.com/fozavci
First Active2007-05-17
Last Active2015-12-01
View User Profile
VoIP Wars: Destroying Jar Jar Lync
Posted Dec 1, 2015
Authored by Fatih Ozavci | Site viproy.com

This archive includes presentation slides for the talk VoIP Wars: Destroying Jar Jar Lync along with the Viproxy tool used to perform the attack.

tags | paper
systems | linux
SHA-256 | 7c10f7a577fbea0fc76921b0346d6dd57980d6c5773f75f34712eadc6b092e2e
Viproy VoIP Penetration / Exploitation Kit 2.99.1
Posted Aug 18, 2015
Authored by Fatih Ozavci | Site viproy.com

Viproy Voip Penetration and Exploitation Kit is developed to improve quality of SIP penetration testing. It provides authentication and trust analysis features that assists in creating simple tests.

Changes: Various updates.
tags | tool
systems | unix
SHA-256 | 7adcb6181b4f32dd3c5611997d9af5ccec5f78decd8a67ca1dc7faf38e23b1bc
The Art Of VoIP Hacking
Posted Aug 10, 2015
Authored by Fatih Ozavci, Christos Archimandritis

This set of slide is from "The Art of VoIP Hacking", a workshop that was held at Defcon 23.

tags | paper
SHA-256 | ef720563f84090601b556006b1294eb24450124db43e13dabccb9df654d51dc0
Viproy VoIP Penetration / Exploitation Kit 2.0
Posted Aug 18, 2014
Authored by Fatih Ozavci | Site viproy.com

Viproy Voip Penetration and Exploitation Kit is developed to improve quality of SIP penetration testing. It provides authentication and trust analysis features that assists in creating simple tests.

Changes: Released at Blackhat Arsenal USA 2014 with TCP/TLS support for SIP, vendor extensions support, Cisco CDP spoofer/sniffer, Cisco Skinny protocol analyzers, VOSS exploits and network analysis modules. Furthermore, Viproy provides SIP and Skinny development libraries for custom fuzzing and analyze modules.
tags | tool
systems | linux, unix
SHA-256 | dd2aee754acd9cdcd4184af9508f9a6f1c6510444a5f6485807f4ac9ebf5000f
VoIP Wars: Attack Of The Cisco Phones
Posted Aug 18, 2014
Authored by Fatih Ozavci

These are the slides from the presentation "VoIP Wars: Attack of the Cisco Phones" from the talk given at Defcon 22 and Blackhat USA 2014.

tags | paper
systems | cisco
SHA-256 | 720ddb24a662b21cf705390762e270841f4e60b42dfbc2cfb78cf7cff84316a9
Viproy VoIP Penetration / Exploitation Kit 1.0
Posted Jul 26, 2014
Authored by Fatih Ozavci | Site viproy.com

Viproy Voip Penetration and Exploitation Kit is developed to improve quality of SIP penetration testing. It provides authentication and trust analysis features that assists in creating simple tests.

Changes: Release 1.0 with various updates.
tags | tool
systems | unix
SHA-256 | 804f9b4c83d5ccb2b408d8d927fe6b3a91923b84aafe53f383b2a42e494bb041
VoIP Wars: Return Of The SIP
Posted Aug 6, 2013
Authored by Fatih Ozavci

These are the presentation slides from "VoIP Wars: Return of the SIP" as presented at Defcon 21 in Las Vegas.

tags | paper
SHA-256 | b8a1c2dd94a7b8b91a355e18362e46e83c30a286f91570bba6af13abe725558f
Hacking SIP Like A Boss Presentation Slides
Posted Jun 8, 2013
Authored by Fatih Ozavci

These are the presentation slides for the Hacking SIP Like A Boss presentation given at Athcon 2013.

tags | paper
SHA-256 | 53fbc30333acdeadc3874c962abbe40c92f1c1e844a6354e73fd3df90a47f6f4
Viproy VoIP Penetration / Exploitation Kit
Posted Apr 11, 2013
Authored by Fatih Ozavci | Site viproy.com

Viproy Voip Penetration and Exploitation Kit is developed to improve quality of SIP penetration testing. It provides authentication and trust analysis features that assists in creating simple tests.

tags | tool
systems | unix
SHA-256 | 8c765de8ebd06f2a12c1e1ff3be3e4e5f33bb6e44daa21085344559c1f80ada4
Hacking Trust Relationships Between SIP Gateways
Posted Feb 15, 2013
Authored by Fatih Ozavci

NGN (Next Generation Networks) operators provide SIP services for their customers. Customers can call other operator's customers via SIP services and SIP gateways. SIP gateways use SIP Trunks for trusted call initiation and cdr/invoice management. In this paper, a new method will be explained. The technique describes how you can detect trusted 3rd party SIP Trunks and initiate a call.

tags | paper
SHA-256 | 33bea19376a276f1f48990e88237092dbdee4f0b66b893ce188d683dae1156c5
Metasploit SIP Penetration Testing Modules
Posted Feb 5, 2013
Authored by Fatih Ozavci | Site github.com

SIP library for Metasploit is developed to help SIP Penetration Tests. It provides authentication feature that helps to create simple tests. It includes 5 different modules with authentication support: options tester, brute forcer, enumerator, invite tester and registration tester. All attacks could perform before and after authentication to fuzz SIP services and value added services.

tags | exploit, tool
systems | unix
SHA-256 | 41632950e1dfb5c8f4747d0ec339c406fcdc45963d3dde7254720e67bc738c64
Pen-Tester's Guide To Metasploit Framework
Posted Jan 16, 2013
Authored by Fatih Ozavci | Site gamasec.net

This 250+ page document is a pentesting guide to using the Metasploit Framework. Written in Turkish.

tags | paper
SHA-256 | b8f6fe8232b3bf30116e8fff2bb7ebd7f7879704c84e5874d496fd7ab235874c
Secunia Security Advisory 27384
Posted Oct 30, 2007
Authored by Secunia, Fatih Ozavci | Site secunia.com

Secunia Security Advisory - Fatih Ozavci and Caglar Cakici have reported some vulnerabilities in RSA KEON Registration Authority, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 2a78f18e1de140d32f2b878fcd997505ecb3af1c092a4cb6fb1ded04361aeb3f
GS07-02.txt
Posted Oct 25, 2007
Authored by Fatih Ozavci, Caglar Cakici | Site gamasec.net

The RSA KEON Registration Authority Web Interface suffers from multiple cross site scripting vulnerabilities. Version 1.0 is susceptible.

tags | advisory, web, vulnerability, xss
SHA-256 | 26c310be669771da1384f9cf1a2df0bcb062948b01a68a3476d898341ac35511
GS07-01.txt
Posted May 17, 2007
Authored by Fatih Ozavci, Caglar Cakici | Site gamasec.net

Various HTTP content scanning systems fail to properly scan full-width/half-width Unicode encoded traffic. This may allow malicious content to bypass HTTP content scanning systems. Systems affected include Checkpoint Web Intelligence and IBM ISS Proventia Series systems.

tags | advisory, web
SHA-256 | ed7d99c4b0c8cf924026804e5a72dd264e34e794211f2f18d66d3c41fdd46077
Page 1 of 1
Back1Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close