Exploit the possiblities
Showing 1 - 7 of 7 RSS Feed

Files

VoIP Wars: Return Of The SIP
Posted Aug 6, 2013
Authored by Fatih Ozavci

These are the presentation slides from "VoIP Wars: Return of the SIP" as presented at Defcon 21 in Las Vegas.

tags | paper
MD5 | 2a27c2084d5a6bce0b1e763dfb792f3b
Enumerating And Breaking VoIP
Posted Nov 21, 2011
Authored by Sohil Garg

Whitepaper called Enumerating and Breaking VoIP. It discusses various enumeration techniques followed by a demonstration of a few VoIP attacks.

tags | paper
MD5 | 6f838df84fef711d5acd89d899314395
Cisco VoIP Phones - A Hackers Perspective
Posted Jul 26, 2010
Authored by chap0

Whitepaper called Cisco VoIP Phone - A Hackers Perspective.

tags | paper
systems | cisco
MD5 | 9762e45d583ee557b5973b01f6d64df3
targeting-voip.pdf
Posted Oct 7, 2008
Authored by Kendric Tang | Site irmplc.com

Whitepaper discussing methodologies and logistics to targeting Voice Over IP (VoIP) networks.

tags | paper
MD5 | 6cf443937c55a3febd2aff3bf63c18ac
calljack.txt
Posted Jan 22, 2008
Authored by PAgVac | Site gnucitizen.org

Call Jacking: Phreaking The BT Home Hub.

tags | paper
MD5 | 5b531137f594cec86923f76c724b4f76
asterisk-vta.txt
Posted Nov 20, 2006
Authored by Marek Roy | Site sekcore.com

Whitepaper detailing step by step instructions on how to connect Vonage to an Asterisk PBX.

tags | paper
MD5 | d5f8a4ad8e900ab29691244fd48fa846
voip-security-layered-approach.pdf
Posted Apr 1, 2006
Authored by Frederic Charpentier | Site xmcopartners.com

A whitepaper discussing a layered approach to VOIP security.

tags | paper
MD5 | f13ddc28d058001c0891d529a306cd3e
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Lebanese Government Hackers Hit Thousands Of Victims With Incredibly Simple Campaign
Posted Jan 19, 2018

tags | headline, government, malware, fraud, cyberwar, phish
Dridex Banking Trojan Compromises FTP Sites In New Campaign
Posted Jan 19, 2018

tags | headline, malware, bank, trojan, cybercrime, fraud
Triton Exploited Zero-Day Flaw To Target Industrial Systems
Posted Jan 19, 2018

tags | headline, hacker, malware, cyberwar, scada
Apple Sued Over Being Susceptible To Meltdown / Spectre
Posted Jan 19, 2018

tags | headline, flaw, apple, intel
Intel Fix Causes Reboots And Slowdowns
Posted Jan 18, 2018

tags | headline, flaw, intel
Text Bomb Is Latest Apple Bug
Posted Jan 18, 2018

tags | headline, phone, denial of service, flaw, apple
Industrial Systems Scrambling To Catch Up With Meltdown, Spectre
Posted Jan 18, 2018

tags | headline, flaw, scada, intel
German Hacker Offers Rare Look Inside Secretive World Of Julian Assange, WikiLeaks
Posted Jan 18, 2018

tags | headline, hacker, government, britain, data loss, germany
Google Intros Security Center Tool For G Suite
Posted Jan 18, 2018

tags | headline, google
Hackers Can't Dig Into Latest Xiaomi Phone Due To GPL Violations
Posted Jan 18, 2018

tags | headline, hacker, phone, google
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close