VOIP security: Difference between revisions
From Wildsong
Jump to navigationJump to search
Brian Wilson (talk | contribs) Created page with "== Best practices == Keep your PBX behind a firewall. Read and follow the advice in the Asterisk source code on best practices. == Vulnerability testing tools == SIPVicio..." |
Brian Wilson (talk | contribs) |
||
Line 17: | Line 17: | ||
IaxPingPoker | IaxPingPoker | ||
Wireshark | |||
sipsak | |||
sipp | |||
vomit | |||
== Books == | |||
Hacking VOIP Exposed | |||
Hacking VOIP, No Starch Press, 2008 | |||
== Contacts == | == Contacts == |
Revision as of 17:46, 30 March 2016
Best practices
Keep your PBX behind a firewall.
Read and follow the advice in the Asterisk source code on best practices.
Vulnerability testing tools
SIPVicious http://sipvicious.org/
- svmap - scanner
- svwar - identify extensions
- svcrack - exploit weak passwords
- svreport - reporting tool
VOIPPack for Canvas
IaxPingPoker
Wireshark
sipsak
sipp
vomit
Books
Hacking VOIP Exposed
Hacking VOIP, No Starch Press, 2008
Contacts
From Digium sponsored "Asterisk VOIP Security" 2009 webinar
VOIPSA = VOIP Security Alliance
Special agent Michael T McAndrews
FBI - Oklahoma City Division
[email protected]
405-290-7770