Two attacks against VoIP
This purpose of this article is to discuss two of the most well known attacks that can be carried out in current VoIP deployments. The first attack demonstrates the ability to hijack a user's VoIP Subscription and subsequent communications. The second attack looks at the ability to eavesdrop in to VoIP communications. 2006-04-04 http://www.securityfocus.com/infocus/1862 Malicious Malware: attacking the attackers, part 2 This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner. Part two of two. 2006-02-02 http://www.securityfocus.com/infocus/1857 Malicious Malware: attacking the attackers, part 1 This article explores measures to attack those malicious attackers who seek to harm our legitimate systems. The proactive use of exploits and bot networks that fight other bot networks, along with social engineering and attacker techniques are all discussed in an ethical manner. Part one of two. 2006-01-31 http://www.securityfocus.com/infocus/1856 Evading NIDS, revisited This article looks at some of the most popular IDS evasion attack techniques, based on fragmentation or using the TTL field. Snort's configuration and response to these attacks will also be discussed. 2005-12-06 http://www.securityfocus.com/infocus/1852 Cisco SNMP configuration attack with a GRE tunnel 2005-09-16 http://www.securityfocus.com/infocus/1847 WEP: Dead Again, Part 2 Part two of the WEP cracking series shows how active attacks can dramatically increase the rate of packet collection and speed up statistical attacks. 2005-03-08 http://www.securityfocus.com/infocus/1824 Penetration Testing IPsec VPNs This article discusses a methodology to assess the security posture of an organization's IPsec based VPN architecture. 2005-02-09 http://www.securityfocus.com/infocus/1821 Blind Buffer Overflows In ISAPI Extensions This paper will outline the risks ISAPI Extensions pose and how they can be exploited by third parties without any binary exposure or knowledge using blind stack overflows. This method can enable remote code execution in proprietary and third party applications. 2005-01-25 http://www.securityfocus.com/infocus/1819 WEP: Dead Again, Part 1 This article is the first of a two-part series that looks at the new generation of WEP cracking tools for WiFi networks, which offer dramatically faster speeds for penetration testers over the previous generation of tools. In many cases, a WEP key can be determined in seconds or minutes. 2004-12-14 http://www.securityfocus.com/infocus/1814 Metasploit Framework, Part 3 This third and final article in the Metasploit series covers the msfcli scripting interface as well as the intuitive web interface to the Framework. The article also discusses what's new with version 2.2, and then introduces the exploit development process through an example. 2004-09-14 http://www.securityfocus.com/infocus/1800 |
|
Privacy Statement |