You are on page 1of 50

Overview

IP Telephony
Telephony Security
Tactical VoIP Toolkit
Conclusion

Ravage Unleashed:
Tactical VoIP Assault Tool

the grugq <grugq@tacticalvoip.com >


2007
c

April 9, 2007

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 1/48
Overview
IP Telephony
Telephony Security
Tactical VoIP Toolkit
Conclusion

Outline

1 Overview

2 IP Telephony

3 Telephony Security

4 Tactical VoIP Toolkit

5 Conclusion

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 2/48
Overview
IP Telephony
Telephony Security
Tactical VoIP Toolkit
Conclusion

Introduction

Presenter
the grugq
VoIP security researcher since 2001
Director of Tactical VoIP
Presentation
IP Telephony Security Threats
Auditting Techniques

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 3/48
Overview
IP Telephony
Telephony Security
Tactical VoIP Toolkit
Conclusion

1 Overview
2 IP Telephony
A Bit of SIP
3 Telephony Security
History
Components of Telephone Security
SIP Assault Tactics
4 Tactical VoIP Toolkit
VoIPy: Heart of the TacVTK
Ravage: Registrar Assault Tool
Assault Scenarios
Siping: Subversive Signaling
5 Conclusion

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 4/48
Overview
IP Telephony
Telephony Security A Bit of SIP
Tactical VoIP Toolkit
Conclusion

Outline

1 Overview

2 IP Telephony
A Bit of SIP

3 Telephony Security

4 Tactical VoIP Toolkit

5 Conclusion

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 5/48
Overview
IP Telephony
Telephony Security A Bit of SIP
Tactical VoIP Toolkit
Conclusion

Public Switched Telephone Network (PSTN)

Over a century old


Acoustic based control system
Signaling is In Band
First (known) attacks in the 1950’s
Secured (mostly) circa 2000

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 6/48
Overview
IP Telephony
Telephony Security A Bit of SIP
Tactical VoIP Toolkit
Conclusion

VoIP Functionality

What it is Multimedia content exchange over IP network(s)


That means Voice/Video calls over the internet

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 7/48
Overview
IP Telephony
Telephony Security A Bit of SIP
Tactical VoIP Toolkit
Conclusion

VoIP Functionality

What it is Multimedia content exchange over IP network(s)


That means Voice/Video calls over the internet

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 7/48
Overview
IP Telephony
Telephony Security A Bit of SIP
Tactical VoIP Toolkit
Conclusion

VoIP Benefits

Significant cost savings


Added functionality
portability
content tie-in
Expanded multimedia capabilities
video
whiteboards

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 8/48
Overview
IP Telephony
Telephony Security A Bit of SIP
Tactical VoIP Toolkit
Conclusion

VoIP Costs

No such thing as a free lunch


Quality of service
Unreliable
Sound quality issues
”comfort noise”
Security problems abound
All telephony assets are exposed
including those on the PSTN

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 9/48
Overview
IP Telephony
Telephony Security A Bit of SIP
Tactical VoIP Toolkit
Conclusion

VoIP Costs

No such thing as a free lunch


Quality of service
Unreliable
Sound quality issues
”comfort noise”
Security problems abound
All telephony assets are exposed
including those on the PSTN

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 9/48
Overview
IP Telephony
Telephony Security A Bit of SIP
Tactical VoIP Toolkit
Conclusion

VoIP: Under the hood

Several protocols providing different functionality


Core IP Telephony requirements:
Signaling Call control
Lookup
Negotiation
Tear down
Media Call content
Competing protocols for signaling

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 10/48
Overview
IP Telephony
Telephony Security A Bit of SIP
Tactical VoIP Toolkit
Conclusion

Major Signaling Protocols

H.323
ASN.1 (binary) PER encoded protocol suite
Proprietary vendor stacks not interoperable
Common in Enterprise environments
Session Initiation Protocol SIP
Bastard son of HTTP & email
Plain text protocol over UDP
Common on the internet due to interoperability
and ease of development

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 11/48
Overview
IP Telephony
Telephony Security A Bit of SIP
Tactical VoIP Toolkit
Conclusion

Outline
1 Overview
2 IP Telephony
A Bit of SIP
3 Telephony Security
History
Components of Telephone Security
SIP Assault Tactics
4 Tactical VoIP Toolkit
VoIPy: Heart of the TacVTK
Ravage: Registrar Assault Tool
Assault Scenarios
Siping: Subversive Signaling
5 Conclusion

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 12/48
Overview
IP Telephony
Telephony Security A Bit of SIP
Tactical VoIP Toolkit
Conclusion

The SIP Protocol

Client-Server model
Based on HTTP
Defined in RFC 3261

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 13/48
Overview
IP Telephony
Telephony Security A Bit of SIP
Tactical VoIP Toolkit
Conclusion

Architecture Components

Telephone User Agent (UA)


Hardware
Software
Proxy Authorizes access to services
Interface to a local VoIP Network
Registrar URI lookup to IP network address
maps bob@biloxi.com to
bob@pc13.biloxi.com
Gateways Convert call sessions from one network to another

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 14/48
Overview
IP Telephony
Telephony Security A Bit of SIP
Tactical VoIP Toolkit
Conclusion

SIP Message

Command Line METHOD URI VERSION


INVITE bob@biloxi.com SIP/2.0
Headers Name : Value[, Value]
Body Mime content

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 15/48
Overview
IP Telephony
Telephony Security A Bit of SIP
Tactical VoIP Toolkit
Conclusion

Example INVITE
INVITE sip:bob@biloxi.com SIP/2.0
Via: SIP/2.0/UDP localhost;branch=z9hG4bKaca45b4c3;rport=
To: ‘‘Bob’’ <sip:bob@biloxi.com>
From: siping <sip:siping@localhost>
Call-ID: eb92357c0ca7c60a
Max-Forwards: 70
Contact: siping <sip:siping@localhost>
CSeq: 1 INVITE

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 16/48
Overview
IP Telephony History
Telephony Security Components of Telephone Security
Tactical VoIP Toolkit SIP Assault Tactics
Conclusion

Outline

1 Overview

2 IP Telephony

3 Telephony Security
History
Components of Telephone Security
SIP Assault Tactics

4 Tactical VoIP Toolkit

5 Conclusion

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 17/48
Overview
IP Telephony History
Telephony Security Components of Telephone Security
Tactical VoIP Toolkit SIP Assault Tactics
Conclusion

Outline
1 Overview
2 IP Telephony
A Bit of SIP
3 Telephony Security
History
Components of Telephone Security
SIP Assault Tactics
4 Tactical VoIP Toolkit
VoIPy: Heart of the TacVTK
Ravage: Registrar Assault Tool
Assault Scenarios
Siping: Subversive Signaling
5 Conclusion

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 18/48
Overview
IP Telephony History
Telephony Security Components of Telephone Security
Tactical VoIP Toolkit SIP Assault Tactics
Conclusion

PSTN Phreaking

Generate correct acoustic tone — issue control commands


Hardware based phreaking
Blue Box 2600Hz to access trunk line
Captain Crunch
Steve Jobs & Steve Wozniak
Red Box imitate coins in a pay phone

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 19/48
Overview
IP Telephony History
Telephony Security Components of Telephone Security
Tactical VoIP Toolkit SIP Assault Tactics
Conclusion

Death of Phreaking

Aggressive prosecution of caught phreakers


Non technical fraud detection
Command & Control system was moved to digital
Out of Band
Can’t access it — Can’t control it
Process started in the 90’s, mostly completed by 2000
Few hold outs across the world

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 20/48
Overview
IP Telephony History
Telephony Security Components of Telephone Security
Tactical VoIP Toolkit SIP Assault Tactics
Conclusion

Outline
1 Overview
2 IP Telephony
A Bit of SIP
3 Telephony Security
History
Components of Telephone Security
SIP Assault Tactics
4 Tactical VoIP Toolkit
VoIPy: Heart of the TacVTK
Ravage: Registrar Assault Tool
Assault Scenarios
Siping: Subversive Signaling
5 Conclusion

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 21/48
Overview
IP Telephony History
Telephony Security Components of Telephone Security
Tactical VoIP Toolkit SIP Assault Tactics
Conclusion

Summary

Telephony . . .
Service Access to services, e.g. PSTN, Voice Mail, etc.
Session Phone call in progress
Identity Phone number

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 22/48
Overview
IP Telephony History
Telephony Security Components of Telephone Security
Tactical VoIP Toolkit SIP Assault Tactics
Conclusion

Target: Telephony Services

Access to services
Toll Fraud free telephony services
Long Distance (very important historically)
PSTN access (land lines & mobile phones)
Revenue Generation toll fraud can be lucrative
Resell stolen access/minutes
Premium rate numbers
900 numbers
SMS
Toll mismatch:
Luxembourg example
Termination cost 2 euro
Origination charge 9 cents

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 23/48
Overview
IP Telephony History
Telephony Security Components of Telephone Security
Tactical VoIP Toolkit SIP Assault Tactics
Conclusion

Target: Telephone Session

Phone call in progress


Monitor
Eavesdrop on call session content
Modify
Inject new content
Suppress existing content
Deny
Tear down a session
Degrade session quality
Hijack
Combination modification/denial
Malicious redirection
the grugq <grugq@tacticalvoip.com > 2007
c Ravage Unleashed: Tactical VoIP Assault Tool 24/48
Overview
IP Telephony History
Telephony Security Components of Telephone Security
Tactical VoIP Toolkit SIP Assault Tactics
Conclusion

Target: Telephony Identity

Phone number
Impersonate
Spoof out going call identification
Hijack
Capture incoming calls
Deny
Null route/re-route calls

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 25/48
Overview
IP Telephony History
Telephony Security Components of Telephone Security
Tactical VoIP Toolkit SIP Assault Tactics
Conclusion

Outline
1 Overview
2 IP Telephony
A Bit of SIP
3 Telephony Security
History
Components of Telephone Security
SIP Assault Tactics
4 Tactical VoIP Toolkit
VoIPy: Heart of the TacVTK
Ravage: Registrar Assault Tool
Assault Scenarios
Siping: Subversive Signaling
5 Conclusion

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 26/48
Overview
IP Telephony History
Telephony Security Components of Telephone Security
Tactical VoIP Toolkit SIP Assault Tactics
Conclusion

Target: Service

Service Gain access to PSTN/VoIP network


Toll Fraud
Resell access to generate revenue
Architecture Targets
Proxies
Gateways

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 27/48
Overview
IP Telephony History
Telephony Security Components of Telephone Security
Tactical VoIP Toolkit SIP Assault Tactics
Conclusion

Session

Signaling manipulation of an existing sessions is limited to


redirecting session members
Session Redirect in session content via malicious signals
Man in the Middle
Inject spurious messages
Architecture Targets
Proxies
User Agents

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 28/48
Overview
IP Telephony History
Telephony Security Components of Telephone Security
Tactical VoIP Toolkit SIP Assault Tactics
Conclusion

Identity

Falsify outbound identity


Modify SIP “From” header
Subvert URI lookups
Remove association = Denial of Service
Modify association = Hijack

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 29/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

Outline

1 Overview

2 IP Telephony

3 Telephony Security

4 Tactical VoIP Toolkit


VoIPy: Heart of the TacVTK
Ravage: Registrar Assault Tool
Assault Scenarios
Siping: Subversive Signaling

5 Conclusion

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 30/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

Overview

The TacVTK provides:


Core Tools Specific assessment tasks
Framework Easy extention for custom audit requirements

Addresses lack of definitive VoIP auditting tools


First development in 2004
Under sporadic development ever since
Developed in python
Available at: http://www.tacticalvoip.com/tools.html

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 31/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

Outline
1 Overview
2 IP Telephony
A Bit of SIP
3 Telephony Security
History
Components of Telephone Security
SIP Assault Tactics
4 Tactical VoIP Toolkit
VoIPy: Heart of the TacVTK
Ravage: Registrar Assault Tool
Assault Scenarios
Siping: Subversive Signaling
5 Conclusion

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 32/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

VoIPy: heart of the TacVTK

Python module implementing core VoIP protocols


Currently supports only SIP
Enables rapid development of custom attack tools

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 33/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

Example VoIPy code

Send an INVITE
from voipy import sip
to_uri = ’‘‘Bob’’ <sip:bob@biloxi.com>’
from_uri = ’‘‘Alice’’ <sip:alice@atlanta.com>’

msg = sip.request.Invite(to=to_uri, from=from_uri, contact=from_

sock.sendto(str(msg), (’biloxi.com’, 5060))

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 34/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

Outline
1 Overview
2 IP Telephony
A Bit of SIP
3 Telephony Security
History
Components of Telephone Security
SIP Assault Tactics
4 Tactical VoIP Toolkit
VoIPy: Heart of the TacVTK
Ravage: Registrar Assault Tool
Assault Scenarios
Siping: Subversive Signaling
5 Conclusion

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 35/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

Ravage: Registrar Assault Tool

Core tool for auditting SIP registars


SIP registrars are critical components for secure SIP networks
Ravage provides several attack modes

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 36/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

Ravage: Attack Modes

Enum enumerate usernames on a Registrar


OPTIONS
INVITE
REGISTER
Bruteforce guess user/pass combos for a Registrar
REGISTER
INVITE

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 37/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

Ravage: Subversion Attack Modes

Inject insert a binding into a registrar


Remove delete a binding from a registrar
Hijack take over a binding in a registrar

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 38/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

Ravage textttENUM

Enumerate usernames within a SIP environment


Techniques:
INVITE
If response is not 404 Not Found user exists
OPTIONS
Identical to INVITE
Less noisy, since OPTIONS doesn’t initiate a call
session
REGISTER
If response is 401 Unauthorised user exists

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 39/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

Ravage textttBRUTE

Try username/password combinations to gain access


Techniques:
REGISTER
Target a Registrar
Attempt to insert/remove a binding
INVITE
Target an authorising proxy
Attempt to initiate a call session

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 40/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

Ravage Modification

Alter the bindings of within a SIP Registrar


Techniques:
Remove
REGISTER with an Expires set to 0
Insert
REGISTER with a new Contact URI
Hijack
REGISTER with an Expires set to 0
REGISTER with a new Contact URI

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 41/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

Toll Fraud for Dummies

Enumerate accounts in a SIP environment


$ ravage enum ...
Gain access to an account
$ ravage brute ...
Create a trunk using the account
asterisk
Sell access to the illicit trunk
Profit!

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 42/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

Phishing Accelerator

Directed attack against a financial institution


Potential telephony infrastructure targets:
Call center logins
Telecos providing VoIP services
Redirect incoming phone calls to VoIP harvester
Victim calls phone banking hotline
“Hallo. Welcome your bank. Please be entering pin number.
Thanking you.”

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 43/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

Outline
1 Overview
2 IP Telephony
A Bit of SIP
3 Telephony Security
History
Components of Telephone Security
SIP Assault Tactics
4 Tactical VoIP Toolkit
VoIPy: Heart of the TacVTK
Ravage: Registrar Assault Tool
Assault Scenarios
Siping: Subversive Signaling
5 Conclusion

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 44/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

siping

Craft custom SIP messages on the command line


Provides limited UA logic
Useful for poking servers
Capable of creating arbitrary SIP message content

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 45/48
Overview
IP Telephony VoIPy: Heart of the TacVTK
Telephony Security Ravage: Registrar Assault Tool
Tactical VoIP Toolkit Siping: Subversive Signaling
Conclusion

siping example

Example INVITE
grugq@zer0gee:~/siping$ siping.py -v -mI sip:bob@biloxi.com
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
INVITE sip:bob@biloxi.com SIP/2.0
Via: SIP/2.0/UDP localhost;branch=z9hG4bKac2ba31c6;rport=
To: <sip:bob@biloxi.com>
From: siping <sip:siping@localhost>
Call-ID: d42e27136a5dd71c
Max-Forwards: 70
Contact: siping <sip:siping@localhost>
CSeq: 1 INVITE

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 46/48
Overview
IP Telephony
Telephony Security
Tactical VoIP Toolkit
Conclusion

Outline

1 Overview

2 IP Telephony

3 Telephony Security

4 Tactical VoIP Toolkit

5 Conclusion

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 47/48
Overview
IP Telephony
Telephony Security
Tactical VoIP Toolkit
Conclusion

VoIP Security more Critical

VoIP continues to gain traction


VoIP security is still primitive
TacVTK provides new capabilities to auditors
ravage: SIP registrar security analysis
siping: SIP signaling injection tool
VoIPy: flexible VoIP development framework
VoIP makes phone calls as secure as email

the grugq <grugq@tacticalvoip.com > 2007


c Ravage Unleashed: Tactical VoIP Assault Tool 48/48

You might also like