SlideShare a Scribd company logo
Security 
VoIP Assessment 
Carousel leverages the 
expertise of SecureState, 
a management consulting 
firm, specializing in 
information security. 
WE BELIEVE in a business- oriented 
approach to information security 
and strive to make the world more 
secure. We have a passion to be the 
best, measured by our commitment 
to do the right thing and help others 
achieve their goals. 
We have persistently driven 
for continuous improvement, 
empowering employees with 
increasing efficiency, and eliminating 
waste in their jobs. 
Contact us to learn more 
800.401.0760 
www.carouselindustries.com 
IT SECURITY 
VoIP Attack and Penetration Testing 
Do you know if your VoIP phones and servers are segmented from the 
rest of your network? Even if they are, segmentation alone may not 
protect your voice assets. This program includes controlled tests in which 
SecureState will attempt to assess several vulnerabilities in VoIP systems 
and networks. 
Our methodology includes performing validation and testing to ensure 
that only “valid” vulnerabilities are reported while: 
• Hi-jacking phone calls 
• Recording and replaying voice calls 
• Voicemail tampering 
• Phone registration hi-jacking 
• Access to phone administrative capabilities 
• Attacking systems within the voice VLANS to gain access to the internal network 
• Attacking VoIP client phones 
• A VoIP Penetration Test is focused on vulnerabilities on VoIP systems and networks 
• SecureState focuses our attacks on vulnerabilities specific to VoIP systems 
and networks 
• Reduction of the cost, confusion, and complexity of PCI DSS compliance 
Process 
Following SecureState’s proven 
process which was developed 
through years of consulting 
experience, we can take you 
from your CurrentState to your 
DesiredState of security and 
ultimately build a program that 
helps you manage your security 
at the SecureState. SecureState 
has developed, SecureState will 
provide tactical and strategic 
recommendations for your organization to improve the security posture of your VoIP 
Network or validate that your network is secure. 
Copyright ©2014, Carousel Industries® www.carouselindustries.com 
SEC-VoIP-ASSESSMENT-1014
IT SECURITY 
Methodology 
The SecureState Profiling Team is well-known and highly regarded as experts in Penetration 
Testing. Our approach follows industry accepted testing methodologies such as PTES, 
NIST 800-115, and OSSTMM. By following these methodologies, our clients can accurately 
replicate the testing SecureState has performed in their own environment to accurately 
mitigate identified vulnerabilities. The Profiling Team also helps identify strategic “root 
cause” issues through our Penetration Tests. SecureState’s Risk Management Team is 
uniquely positioned to work closely with the Profiling Team in order to assist clients with 
mitigating these strategic “root cause” issues. 
Phase I – Pre-engagement Interaction - In this phase, SecureState works with the client to 
establish the rules of engagement as well as the scope and exchange contact information 
for both parties. SecureState provides a detailed Project Charter which contains information 
on scope and everything that will be required to conduct the testing. The Project Charter is 
discussed during the kickoff call prior to the beginning of the engagement. 
Phase II – Intelligence Gathering - VoIP Attack and Penetration Tests need to be conducted 
with care, due diligence, and a high level of industry knowledge. SecureState performs 
specific non-intrusion probing of the VoIP network, using SNMP sweeps and other low level 
scans to first map the VoIP network and systems. 
Phase III – Vulnerability Analysis - SecureState generates specifically crafted packets in 
order to identify specific patch levels, perform banner grabbing, and use various other 
techniques in order to identify potential exposures in the client’s VoIP network without 
being detected. Specialty tools such as SiVuS, sipsak and SIPSCAN are used to enumerate 
specific VoIP devices. 
In addition, SecureState will attempt to pull VoIP specific data off the network to see how it 
could potentially be manipulated. During this phase, we will attempt to hi- jack and record 
phone calls, as well as attempt to insert sounds and conduct other manipulation of VoIP 
data streams; including, eavesdropping on VoIP administrative systems. In addition, VLAN 
hopping attacks are conducted to ensure segmentation is working properly. 
Phase IV – Exploitation - During the course of the engagement, all identified VoIP 
vulnerabilities will be assessed as to the likelihood of exploitation. Communication will be 
conducted with the client’s Project Lead prior to any type of intrusive activity that could 
potentially impact network performance or system stability. Any high or critical risk exploit 
also will be communicated to the client upon discovery; so that the client can initiate 
corrective actions. 
Copyright ©2014, Carousel Industries® www.carouselindustries.com 
SEC-VoIP-ASSESSMENT-1014 
Proven Security Expertise 
Contact us to learn more 
800.401.0760 
www.carouselindustries.com

More Related Content

PPTX
F secure Radar vulnerability scanning and management
PPTX
Protecting application delivery without network security blind spots
PDF
Powerful email protection
PDF
Cyber Threats on the Industrial Environment
DOCX
Mohammad Tahir_CV
PDF
OSB180: Learn More About Ivanti Endpoint Security
PDF
Internet gatekeeper
PDF
FireEye - Breaches are inevitable, but the outcome is not
F secure Radar vulnerability scanning and management
Protecting application delivery without network security blind spots
Powerful email protection
Cyber Threats on the Industrial Environment
Mohammad Tahir_CV
OSB180: Learn More About Ivanti Endpoint Security
Internet gatekeeper
FireEye - Breaches are inevitable, but the outcome is not

What's hot (20)

PDF
Protection Service for Business
PDF
Client Security - Best security for business workstations
PPTX
Decision criteria and analysis for hardware-based encryption
PPTX
FireEye Engineering
PPTX
Multifactor Authentication
PPTX
Intercept X - Sophos Endpoint
PPTX
An introduction to Cyber Essentials
PDF
Understanding Cyber Kill Chain and OODA loop
PPTX
Anatomy of an Attack - Sophos Day Belux 2014
PDF
Cyber security webinar 6 - How to build systems that resist attacks?
PDF
F-Secure Policy Manager - onsite security management with superior control
PDF
Best corporate end-point protection 2013
PPTX
Cloud payments (HCE): a simpler step with Thales HSMs
PPTX
Alienvault threat alerts in spiceworks
PDF
Symantec: čas přítomný a budoucí
PPS
Go Its 25 15
PPTX
How to Detect System Compromise & Data Exfiltration with AlienVault USM
PDF
Achieving Cyber Essentials
PDF
Business Suite - Gain control of your IT security
Protection Service for Business
Client Security - Best security for business workstations
Decision criteria and analysis for hardware-based encryption
FireEye Engineering
Multifactor Authentication
Intercept X - Sophos Endpoint
An introduction to Cyber Essentials
Understanding Cyber Kill Chain and OODA loop
Anatomy of an Attack - Sophos Day Belux 2014
Cyber security webinar 6 - How to build systems that resist attacks?
F-Secure Policy Manager - onsite security management with superior control
Best corporate end-point protection 2013
Cloud payments (HCE): a simpler step with Thales HSMs
Alienvault threat alerts in spiceworks
Symantec: čas přítomný a budoucí
Go Its 25 15
How to Detect System Compromise & Data Exfiltration with AlienVault USM
Achieving Cyber Essentials
Business Suite - Gain control of your IT security
Ad

Similar to Security VoIP Assessment (20)

PDF
Security is our duty and we shall deliver it - White Paper
PPTX
Security Testing In The Secured World
PDF
Company_Profile_Updated_17032016
PPTX
Aksit profile final
PPTX
AKS IT Corporate Presentation
PDF
craw-security-services.pdf
PPTX
What is VAPT & Why is it Important for Your Business.pptx
PPTX
It security cognic_systems
PDF
VoIp Security Services Technical Description Cyber51
PDF
IT SECURITY ASSESSMENT PROPOSAL
DOCX
Backtrack manual Part1
PPTX
CyberKnight capabilties
PDF
Advanced IT and Cyber Security for Your Business
PPTX
Huwei Cyber Security Presentation
PDF
Cyber Octet - What is Web Application Penetration Testing (WAPT).pdf
PDF
VAPT | VAPT Testing | VAPT Services | Vulnerability Assessment and Penetratio...
PDF
Voiztrail Call Recorder
PDF
Understanding the Role of VAPT Testing in Compliance and Regulatory Standards...
PDF
NOVA mediakit for Cyber Security Compliance.pdf
PDF
Why Penetration Tests Are Important Cyber51
Security is our duty and we shall deliver it - White Paper
Security Testing In The Secured World
Company_Profile_Updated_17032016
Aksit profile final
AKS IT Corporate Presentation
craw-security-services.pdf
What is VAPT & Why is it Important for Your Business.pptx
It security cognic_systems
VoIp Security Services Technical Description Cyber51
IT SECURITY ASSESSMENT PROPOSAL
Backtrack manual Part1
CyberKnight capabilties
Advanced IT and Cyber Security for Your Business
Huwei Cyber Security Presentation
Cyber Octet - What is Web Application Penetration Testing (WAPT).pdf
VAPT | VAPT Testing | VAPT Services | Vulnerability Assessment and Penetratio...
Voiztrail Call Recorder
Understanding the Role of VAPT Testing in Compliance and Regulatory Standards...
NOVA mediakit for Cyber Security Compliance.pdf
Why Penetration Tests Are Important Cyber51
Ad

More from Iron Mountain (13)

PDF
729 Solutions Helps Connect The Dots - Our Services At A Glance
PDF
10 huge-reasons-why-businesses-need-custom-software-development1
PDF
9 Proven-Strategies
PDF
CABA Whitepaper - Cybersecurity in Smart Buildings
PDF
Cybersmart_buildings_securing your investment in connectivity and automation
PDF
Moving from tape to cloud
PDF
Cloud services - moving from tape to cloud
PDF
Guidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
PDF
9 Steps to Successful Information Lifecycle Management
PDF
10 Ways Intelligent Transportation Makes A Difference
PDF
Using Business and Technology to solve business challenges
PDF
10 Tips for CIOS Data Security in the Cloud
PDF
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
729 Solutions Helps Connect The Dots - Our Services At A Glance
10 huge-reasons-why-businesses-need-custom-software-development1
9 Proven-Strategies
CABA Whitepaper - Cybersecurity in Smart Buildings
Cybersmart_buildings_securing your investment in connectivity and automation
Moving from tape to cloud
Cloud services - moving from tape to cloud
Guidebook To Long-Term Retention Part 1: Challenges And Effective Approaches
9 Steps to Successful Information Lifecycle Management
10 Ways Intelligent Transportation Makes A Difference
Using Business and Technology to solve business challenges
10 Tips for CIOS Data Security in the Cloud
The need for IT to get in front of the BYOD (Bring Your Own Device) problem

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Machine Learning_overview_presentation.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
1. Introduction to Computer Programming.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Building Integrated photovoltaic BIPV_UPV.pdf
Spectroscopy.pptx food analysis technology
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Empathic Computing: Creating Shared Understanding
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Tartificialntelligence_presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Diabetes mellitus diagnosis method based random forest with bat algorithm
Network Security Unit 5.pdf for BCA BBA.
Machine Learning_overview_presentation.pptx
Assigned Numbers - 2025 - Bluetooth® Document
1. Introduction to Computer Programming.pptx
Unlocking AI with Model Context Protocol (MCP)
A comparative analysis of optical character recognition models for extracting...
NewMind AI Weekly Chronicles - August'25-Week II

Security VoIP Assessment

  • 1. Security VoIP Assessment Carousel leverages the expertise of SecureState, a management consulting firm, specializing in information security. WE BELIEVE in a business- oriented approach to information security and strive to make the world more secure. We have a passion to be the best, measured by our commitment to do the right thing and help others achieve their goals. We have persistently driven for continuous improvement, empowering employees with increasing efficiency, and eliminating waste in their jobs. Contact us to learn more 800.401.0760 www.carouselindustries.com IT SECURITY VoIP Attack and Penetration Testing Do you know if your VoIP phones and servers are segmented from the rest of your network? Even if they are, segmentation alone may not protect your voice assets. This program includes controlled tests in which SecureState will attempt to assess several vulnerabilities in VoIP systems and networks. Our methodology includes performing validation and testing to ensure that only “valid” vulnerabilities are reported while: • Hi-jacking phone calls • Recording and replaying voice calls • Voicemail tampering • Phone registration hi-jacking • Access to phone administrative capabilities • Attacking systems within the voice VLANS to gain access to the internal network • Attacking VoIP client phones • A VoIP Penetration Test is focused on vulnerabilities on VoIP systems and networks • SecureState focuses our attacks on vulnerabilities specific to VoIP systems and networks • Reduction of the cost, confusion, and complexity of PCI DSS compliance Process Following SecureState’s proven process which was developed through years of consulting experience, we can take you from your CurrentState to your DesiredState of security and ultimately build a program that helps you manage your security at the SecureState. SecureState has developed, SecureState will provide tactical and strategic recommendations for your organization to improve the security posture of your VoIP Network or validate that your network is secure. Copyright ©2014, Carousel Industries® www.carouselindustries.com SEC-VoIP-ASSESSMENT-1014
  • 2. IT SECURITY Methodology The SecureState Profiling Team is well-known and highly regarded as experts in Penetration Testing. Our approach follows industry accepted testing methodologies such as PTES, NIST 800-115, and OSSTMM. By following these methodologies, our clients can accurately replicate the testing SecureState has performed in their own environment to accurately mitigate identified vulnerabilities. The Profiling Team also helps identify strategic “root cause” issues through our Penetration Tests. SecureState’s Risk Management Team is uniquely positioned to work closely with the Profiling Team in order to assist clients with mitigating these strategic “root cause” issues. Phase I – Pre-engagement Interaction - In this phase, SecureState works with the client to establish the rules of engagement as well as the scope and exchange contact information for both parties. SecureState provides a detailed Project Charter which contains information on scope and everything that will be required to conduct the testing. The Project Charter is discussed during the kickoff call prior to the beginning of the engagement. Phase II – Intelligence Gathering - VoIP Attack and Penetration Tests need to be conducted with care, due diligence, and a high level of industry knowledge. SecureState performs specific non-intrusion probing of the VoIP network, using SNMP sweeps and other low level scans to first map the VoIP network and systems. Phase III – Vulnerability Analysis - SecureState generates specifically crafted packets in order to identify specific patch levels, perform banner grabbing, and use various other techniques in order to identify potential exposures in the client’s VoIP network without being detected. Specialty tools such as SiVuS, sipsak and SIPSCAN are used to enumerate specific VoIP devices. In addition, SecureState will attempt to pull VoIP specific data off the network to see how it could potentially be manipulated. During this phase, we will attempt to hi- jack and record phone calls, as well as attempt to insert sounds and conduct other manipulation of VoIP data streams; including, eavesdropping on VoIP administrative systems. In addition, VLAN hopping attacks are conducted to ensure segmentation is working properly. Phase IV – Exploitation - During the course of the engagement, all identified VoIP vulnerabilities will be assessed as to the likelihood of exploitation. Communication will be conducted with the client’s Project Lead prior to any type of intrusive activity that could potentially impact network performance or system stability. Any high or critical risk exploit also will be communicated to the client upon discovery; so that the client can initiate corrective actions. Copyright ©2014, Carousel Industries® www.carouselindustries.com SEC-VoIP-ASSESSMENT-1014 Proven Security Expertise Contact us to learn more 800.401.0760 www.carouselindustries.com