VOIP security: Difference between revisions
From Wildsong
Jump to navigationJump to search
Brian Wilson (talk | contribs) |
Brian Wilson (talk | contribs) |
||
Line 5: | Line 5: | ||
Read and follow the advice in the Asterisk source code on best practices. | Read and follow the advice in the Asterisk source code on best practices. | ||
== | == Tools == | ||
http://voipsa.org/Resources/tools.php | |||
SIPVicious http://sipvicious.org/ | SIPVicious http://sipvicious.org/ |
Revision as of 17:47, 30 March 2016
Best practices
Keep your PBX behind a firewall.
Read and follow the advice in the Asterisk source code on best practices.
Tools
http://voipsa.org/Resources/tools.php
SIPVicious http://sipvicious.org/
- svmap - scanner
- svwar - identify extensions
- svcrack - exploit weak passwords
- svreport - reporting tool
VOIPPack for Canvas
IaxPingPoker
Wireshark
sipsak
sipp
vomit
Books
Hacking VOIP Exposed
Hacking VOIP, No Starch Press, 2008
Contacts
From Digium sponsored "Asterisk VOIP Security" 2009 webinar
VOIPSA = VOIP Security Alliance http://voipsa.org
Special agent Michael T McAndrews
FBI - Oklahoma City Division
[email protected]
405-290-7770