19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 13-15:<br />

SiVuS<br />

discovered<br />

several<br />

VoIP-centric<br />

vulnerabilities.<br />

Chapter 13: Communication and Messaging Systems<br />

Whether SiVuS’s results and recommendations are an issue in your environment,<br />

I encourage you to sift through each one to determine what can and<br />

should be fixed. Remember, odds are good that the bad guys both inside and<br />

outside your network can see these vulnerabilities just as easily as you can.<br />

You can also use SiVuS to generate SIP messages, which come in handy if you<br />

want to test any built-in VoIP authentication mechanisms on your VoIP hosts.<br />

SiVuS’s documentation outlines the specifics.<br />

Other free tools for analyzing SIP traffic are PROTOS (www.ee.oulu.fi/<br />

research/ouspg/protos/testing/c07/sip/index.html), and sipsak<br />

(http://sipsak.org). A good website that lists all sorts of VoIP tools is<br />

www.voipsa.org/Resources/tools.php.<br />

Capturing and recording voice traffic<br />

If you have access to the wired or wireless network, you can capture VoIP<br />

conversations easily. This is a great way to prove that the network and the<br />

VoIP installation are vulnerable. There are many legal issues associated with<br />

tapping into phone conversations, so make sure you have permission and are<br />

careful not to abuse your test results.<br />

273

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!