VOIP security: Difference between revisions

From Wildsong
Jump to navigationJump to search
Brian Wilson (talk | contribs)
Brian Wilson (talk | contribs)
Line 5: Line 5:
Read and follow the advice in the Asterisk source code on best practices.  
Read and follow the advice in the Asterisk source code on best practices.  


== Vulnerability testing tools ==
== Tools ==
 
http://voipsa.org/Resources/tools.php
 


SIPVicious http://sipvicious.org/
SIPVicious http://sipvicious.org/

Revision as of 17:47, 30 March 2016

Best practices

Keep your PBX behind a firewall.

Read and follow the advice in the Asterisk source code on best practices.

Tools

http://voipsa.org/Resources/tools.php


SIPVicious http://sipvicious.org/

  • svmap - scanner
  • svwar - identify extensions
  • svcrack - exploit weak passwords
  • svreport - reporting tool

VOIPPack for Canvas

IaxPingPoker

Wireshark

sipsak

sipp

vomit

Books

Hacking VOIP Exposed

Hacking VOIP, No Starch Press, 2008

Contacts

From Digium sponsored "Asterisk VOIP Security" 2009 webinar

VOIPSA = VOIP Security Alliance http://voipsa.org



Special agent Michael T McAndrews
FBI - Oklahoma City Division
[email protected]
405-290-7770