Useful Links
Computer Science
Cybersecurity
VoIP Security and Hacking
1. Introduction to VoIP Technology
2. VoIP Architecture and Components
3. The VoIP Threat Landscape
4. VoIP Reconnaissance and Enumeration
5. Common VoIP Attacks and Exploits
6. Securing VoIP Infrastructure
7. Cryptography in VoIP
8. Authentication and Authorization
9. VoIP Security Monitoring and Incident Response
10. VoIP Security Auditing and Penetration Testing
11. Advanced Topics and Future Trends
VoIP Reconnaissance and Enumeration
Discovering VoIP Infrastructure
DNS Enumeration for SRV Records
Identifying SIP and H.323 Services
ENUM Lookups
DNS Zone Transfers
Subdomain Enumeration
Port Scanning for VoIP Services
Identifying Open SIP, H.323, MGCP Ports
Scanning for RTP/RTCP Ports
UDP Port Scanning Techniques
TCP Port Scanning for VoIP
Banner Grabbing
Extracting Service Information
Identifying Software Versions
Fingerprinting VoIP Systems
Network Topology Discovery
Traceroute Analysis
Network Mapping
Identifying Network Devices
Enumerating VoIP Users and Extensions
SIP Extension Scanning
Brute Force Extension Discovery
Identifying Active Extensions
Dictionary-Based Attacks
Directory Harvesting Attacks
Harvesting Usernames via Responses
Exploiting Directory Services
LDAP Enumeration
User Agent Identification
Analyzing SIP User-Agent Headers
Device Fingerprinting
Registration Analysis
Monitoring Registration Attempts
Identifying Valid Accounts
Tools for VoIP Discovery
Nmap Scripts (NSE)
SIP and H.323 NSE Scripts
Custom Script Development
Specialized VoIP Scanners
SIPVicious
Smap
VoiPenum
SiVuS
Network Analysis Tools
Wireshark for VoIP Analysis
tcpdump for Packet Capture
Custom Reconnaissance Scripts
Python-Based Tools
Bash Scripting for Automation
Previous
3. The VoIP Threat Landscape
Go to top
Next
5. Common VoIP Attacks and Exploits