VoIP Wars - The Phreakers Awaken
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the world of VoIP security in this 53-minute Black Hat conference talk by Fatih Ozavci. Delve into cutting-edge attacks, tools, and vulnerabilities in VoIP networks, focusing on cloud-based Unified Communications (UC) solutions. Learn about jailbreaking tenant environments, critical security flaws in major vendors' products, and exploiting VoIP protocol vulnerabilities. Discover techniques for testing IP Multimedia Subsystem (IMS) services and understand the custom toolset developed by the speaker. Gain insights into the business impact of these attacks on various implementations, including cloud UC services, commercial services, and corporate communications. Through live demonstrations, understand how to secure and test communication infrastructure and services. Get introduced to updated versions of Viproy and Viproxy tools used for attack demonstrations. Cover topics ranging from traditional phone systems to modern challenges in corporate and cloud communications, as well as federated systems and IMS. Examine attack surfaces, testing approaches, and specific techniques for targeting clients, call centers, and IMS. Conclude with strategies for securing unified communications and participate in a live workshop to reinforce the concepts presented.
Syllabus
Intro
TRADITIONAL PHONE SYSTEMS
UNIFIED COLLABORATION
UNIFIED ATTACK SURFACES
SIP & RTP FUNDAMENTALS
CHALLENGES OF MODERN COMMUNICATIONS
CORPORATE COMMUNICATIONS
CLOUD COMMUNICATIONS
FEDERATED COMMUNICATIONS
IP-MULTIMEDIA SUBSYSTEM (IMS)
CLIENTS UNDER ATTACK
ATTACK SURFACES TO CLIENTS
TEST APPROACH
SECURITY TESTING SERVICES
CALL CENTRE SECURITY TESTING
IMS SECURITY TESTING
VIPROY VOIP PEN-TESTING TOOLKIT
SECURITY TESTING USING VIPROXY
ATTACKING THROUGH UC/IMS
SAMPLE SIP INVITE/SDP EXPLOIT
ATTACKING THROUGH MESSAGING
ATTACKING WITH ORIGINAL CLIENTS
ATTACKING SKYPE FOR BUSINESS
SECURING UNIFIED COMMUNICATIONS
VOIP WARS: THE LIVE WORKSHOP
Taught by
Black Hat
Related Courses
0-Days and Mitigations - Roadways to Exploit and Secure Connected BMW CarsBlack Hat via YouTube Ways to Die in Mobile OAuth
Black Hat via YouTube Ways to Bypass Your macOS Privacy Mechanisms
Black Hat via YouTube Electronegativity - A Study of Electron Security
Black Hat via YouTube A Titan M Odyssey
Black Hat via YouTube