SlideShare a Scribd company logo
Pentesting voIP
Boring stuffs
• allows you to make and receive telephone calls over the Internet
• low international phone call rates to other countries
• Protocols under voIP:
• SIP(UDP -5060)
• H.323
• RTP
• Skype
• SIP: Requests
• INVITE - establish connection
• BYE - terminate
• REGISTER – indicate client address to
server
• SIP: Responses
• 1xx - responses to requests
• 2xx: 200-level responses indicate a
successful completion of the request
• 3xx: redirection is needed for completion
of the request.
• 4xx: bad syntax
• 5xx: The server failed to fulfil an
apparently valid request
• 6xx: This is a global failure
Attacks on SIP
• Information gathering and foot printing
• Eavesdropping and capturing traffic
• VLAN hopping
• Spoofing Caller ID
• Identification of Denial of Service (DoS) vulnerabilities
• Authentication Attacks
Demo !!
VoIP Checklist for Penetration Testers
• VoIP-001 - VLAN hopping from data network to voice network
• VoIP-002 - Extension Enumeration & Number Harvesting
• VoIP-003 - Capturing SIP Authentication
• VoIP-004 - Eavesdropping Calls
• VoIP-005 - CallerID spoofing
• VoIP-006 - RTP injection
• VoIP-007 - Signaling Manipulation
• VoIP-008 - Identification of insecure services
• VoIP-009 - Testing for Default Credentials
• VoIP-010 - Application level vulnerabilities
• VoIP-011 - Voice Mail Attacks
• VoIP-012 - Phone Firmware Analysis

More Related Content

PPTX
FreePBX Application Introduce
PDF
Sip 416 (sip proxy server) intro
PPTX
Sip 416 (sip proxy server) intro
PPT
Meletis Belsis - Voip security
PPT
Introduction to VoIP Security
PPTX
VoIP – vulnerabilities and attacks
PPTX
Firewall
PPTX
Voice over Internet Protocol.
FreePBX Application Introduce
Sip 416 (sip proxy server) intro
Sip 416 (sip proxy server) intro
Meletis Belsis - Voip security
Introduction to VoIP Security
VoIP – vulnerabilities and attacks
Firewall
Voice over Internet Protocol.

Similar to Pentesting VoIP (20)

PPTX
Positive Hack Days. Gritsai. VOIP insecurities workshop
PDF
VOIP services
PPTX
Session Initiation Protocol - In depth analysis
PDF
BlackHat Hacking - Hacking VoIP.
PPT
1 Vo Ip Overview
PPT
1 VoIP Overview[1]
PPT
Introduction To SIP
PPTX
Introduction to SIP + SIP Call Flow + SIP Network Entities
PDF
Sip Understanding The Session Initiation Protocol 2nd Edition Alan B Johnston
PPT
1 Vo Ip Overview
PPT
1 Vo I P Overview
PPT
PPT
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
PPT
Voice Over IP Overview w/Secuirty
PPTX
SIP security in IP telephony
PPT
VoIPER: Smashing the VoIP stack while you sleep
PDF
Defcon 21-ozavci-vo ip-wars-return-of-the-sip by pseudor00t
PPTX
An approach to mitigate DDoS attacks on SIP.pptx
PDF
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
Positive Hack Days. Gritsai. VOIP insecurities workshop
VOIP services
Session Initiation Protocol - In depth analysis
BlackHat Hacking - Hacking VoIP.
1 Vo Ip Overview
1 VoIP Overview[1]
Introduction To SIP
Introduction to SIP + SIP Call Flow + SIP Network Entities
Sip Understanding The Session Initiation Protocol 2nd Edition Alan B Johnston
1 Vo Ip Overview
1 Vo I P Overview
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Voice Over IP Overview w/Secuirty
SIP security in IP telephony
VoIPER: Smashing the VoIP stack while you sleep
Defcon 21-ozavci-vo ip-wars-return-of-the-sip by pseudor00t
An approach to mitigate DDoS attacks on SIP.pptx
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
Ad

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Spectroscopy.pptx food analysis technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Empathic Computing: Creating Shared Understanding
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation_ Review paper, used for researhc scholars
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Review of recent advances in non-invasive hemoglobin estimation
Understanding_Digital_Forensics_Presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
Spectroscopy.pptx food analysis technology
“AI and Expert System Decision Support & Business Intelligence Systems”
MIND Revenue Release Quarter 2 2025 Press Release
NewMind AI Weekly Chronicles - August'25 Week I
Empathic Computing: Creating Shared Understanding
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
Ad

Pentesting VoIP

  • 2. Boring stuffs • allows you to make and receive telephone calls over the Internet • low international phone call rates to other countries • Protocols under voIP: • SIP(UDP -5060) • H.323 • RTP • Skype
  • 3. • SIP: Requests • INVITE - establish connection • BYE - terminate • REGISTER – indicate client address to server • SIP: Responses • 1xx - responses to requests • 2xx: 200-level responses indicate a successful completion of the request • 3xx: redirection is needed for completion of the request. • 4xx: bad syntax • 5xx: The server failed to fulfil an apparently valid request • 6xx: This is a global failure
  • 4. Attacks on SIP • Information gathering and foot printing • Eavesdropping and capturing traffic • VLAN hopping • Spoofing Caller ID • Identification of Denial of Service (DoS) vulnerabilities • Authentication Attacks
  • 6. VoIP Checklist for Penetration Testers • VoIP-001 - VLAN hopping from data network to voice network • VoIP-002 - Extension Enumeration & Number Harvesting • VoIP-003 - Capturing SIP Authentication • VoIP-004 - Eavesdropping Calls • VoIP-005 - CallerID spoofing • VoIP-006 - RTP injection • VoIP-007 - Signaling Manipulation • VoIP-008 - Identification of insecure services • VoIP-009 - Testing for Default Credentials • VoIP-010 - Application level vulnerabilities • VoIP-011 - Voice Mail Attacks • VoIP-012 - Phone Firmware Analysis