exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files

VoIP Wars: Return Of The SIP
Posted Aug 6, 2013
Authored by Fatih Ozavci

These are the presentation slides from "VoIP Wars: Return of the SIP" as presented at Defcon 21 in Las Vegas.

tags | paper
SHA-256 | b8a1c2dd94a7b8b91a355e18362e46e83c30a286f91570bba6af13abe725558f
Enumerating And Breaking VoIP
Posted Nov 21, 2011
Authored by Sohil Garg

Whitepaper called Enumerating and Breaking VoIP. It discusses various enumeration techniques followed by a demonstration of a few VoIP attacks.

tags | paper
SHA-256 | 5915b289644f1e037253a04414a137d01faffd8f590ab4c59e271cdc1509e4fd
Cisco VoIP Phones - A Hackers Perspective
Posted Jul 26, 2010
Authored by chap0

Whitepaper called Cisco VoIP Phone - A Hackers Perspective.

tags | paper
systems | cisco
SHA-256 | 2c496289f0aca8550749404683c6af282e9decfb23e9186b238a7db76158f79c
targeting-voip.pdf
Posted Oct 7, 2008
Authored by Kendric Tang | Site irmplc.com

Whitepaper discussing methodologies and logistics to targeting Voice Over IP (VoIP) networks.

tags | paper
SHA-256 | ccdbeff46d2e5b171f304770a9d63a1e7ba7046344245d6bb1c27d2c50c4de15
calljack.txt
Posted Jan 22, 2008
Authored by PAgVac | Site gnucitizen.org

Call Jacking: Phreaking The BT Home Hub.

tags | paper
SHA-256 | 8434889c58e6152602c9079e136c14b2c7bbd89c0fdc662f4f56dc3e14fbed91
asterisk-vta.txt
Posted Nov 20, 2006
Authored by Marek Roy | Site sekcore.com

Whitepaper detailing step by step instructions on how to connect Vonage to an Asterisk PBX.

tags | paper
SHA-256 | ccd01db66d130c1f335c2abafb8f43419c81878543fafc420e22f8b91fe7cba2
voip-security-layered-approach.pdf
Posted Apr 1, 2006
Authored by Frederic Charpentier | Site xmcopartners.com

A whitepaper discussing a layered approach to VOIP security.

tags | paper
SHA-256 | ad3e0a27c9e7c5cc97aff80ef03f5f685dd1f9adcecffafd393f9afc91425d99
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Malware Operators Use Copyright Infringement To Lure In Businesses
Posted Nov 1, 2024

tags | headline, malware, cybercrime, fraud
FakeCall Malware Menaces Android Devices
Posted Oct 31, 2024

tags | headline, malware, phone, google
Chinese Attackers Accessed Canadian Government Networks For Five Years
Posted Oct 31, 2024

tags | headline, hacker, government, canada, china, cyberwar, spyware
Windows Themes 0-Day Bug Exposes Users To NTLM Credential Theft
Posted Oct 31, 2024

tags | headline, hacker, microsoft, data loss, flaw, password, zero day
Yahoo Discloses NetIQ iManager Flaws Allowing Remote Code Execution
Posted Oct 31, 2024

tags | headline, flaw, yahoo
North Korean Nation State Threat Actor Using Play Ransomware
Posted Oct 31, 2024

tags | headline, government, malware, cybercrime, cyberwar, cryptography, north korea
Prosecutors Seek A 17-Year Prison Term For Pentagon Secrets Leaker Jack Teixeira
Posted Oct 31, 2024

tags | headline, government, usa, data loss, cyberwar, military
LottieFiles Supply Chain Attack Exposes Users To Wallet Drainer
Posted Oct 31, 2024

tags | headline, hacker, privacy, malware, data loss, cryptography
Intel And AMD Chips Still Vulnerable To Spectre Flaw
Posted Oct 30, 2024

tags | headline, flaw, intel
AI Bug Bounty Program Yields 34 Flaws In Open Source Tools
Posted Oct 30, 2024

tags | headline, botnet, flaw
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close