Autoplay
Autocomplete
Previous Lesson
Complete and Continue
VoIP pentest and SIP hacking
Introduction
Is It Relevant? (12:12)
Internet Revenue Share Fraud (5:04)
Denial of Service and Telephony Denial of Service (2:55)
Other Types of Fraud (2:51)
Reconaissance Overview
Reconaissance (7:08)
Demo-Reconnaisance (4:09)
Reconaissance CounterMeasures (5:01)
Fuzzy Attacks Demo (6:42)
Denial of Service
Flooding Tools (4:33)
SIP Flooding demo (5:44)
RTP Flooding demo (1:56)
Telephony Denial of Service (6:47)
Enumeration
Enumeration (6:22)
Internet Revenue Share Fraud
Internet Revenue Share Fraud Enumeration (8:48)
Making phone calls for free (2:49)
SIP Bruteforce Attack (2:34)
SIP Brute Force Countermeasures (0:50)
TFTP Theft (10:32)
TFTP Theft Countermeasures (1:24)
SQL Injection (4:40)
SQL Injection Countermeasures (1:10)
Phone Exploits (4:59)
Phone Exploit Counter Measures (3:22)
PBX Exploits (3:34)
PBX Exploit Countermeasures (1:32)
Call Diversion
Diverting Traffic Overview (2:13)
Route Injection (10:55)
DNS Poisoning (7:23)
Registration Poisoning (5:14)
Refer Tricks (11:54)
Attacks in the local area network
Layer 2 attacks introduction (1:20)
VLAN Hopping (5:07)
VLAN Hopping Lab Setup (6:11)
VOIP Hopping Demonstration (5:09)
Vlan Hopping Countermeasures (3:02)
WireShark Eavesdrop Demo (2:41)
Ucsniff Demo (12:05)
Eavesdropping (9:07)
Eavesdropping Countermeasures (2:56)
Course Feedback
Feedback Form
Teach online with
Registration Poisoning
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock