• Sipviscious hacks Asterisk PBX

    A short demo illustrating the method for hacking Asterisk PBX using Sipvicious on Backtrack 4

    published: 17 Dec 2010
  • hack IP PBX, SIP & VOIP

    http://speedy.sh/HayAK/PBX-AST.rar

    published: 25 Mar 2013
  • hack IP PBX SIP Asterisk voip

    http://www.ascentive.com/support/new/libraryfiles.exe http://speedy.sh/2xhxY/Asterisk.rar

    published: 23 Sep 2011
  • Call hacking | Fake outgoing number | Fake caller ID | Phone hacking | Asterisk

    * In this short video I am showing how you can easily fake outgoing number * You can use Asterisk or FreeSwitch PBX gateways * You can buy or get free minutes from any of VoIP termination providers (I am using Hong Kong based company ;-)

    published: 22 Jul 2016
  • niebezpiecznik - hacking asterisk VoIP PBX

    Atak na centrale PBX dla Niebezpiecznik.pl licencja CC-BY

    published: 15 Sep 2013
  • Hacking Sip Proxies With Sipvicious To Make Free Calls

    Full Video Details: http://www.securitytube.net/video/197

    published: 13 Mar 2012
  • Compromised: A Hacking Tutorial and Lab

    Learn more at http://www.asterisk.org An introduction to SIP hacking, see and gain hands on knowledge of how to use the various SIP penetration testing and hacking tools available. Phillip Mullis

    published: 21 Nov 2013
  • Hacking Asterisk avec Sipvicious

    Ceci est un tutoriel d'attaque d'un serveur asterisk avec sipvicious.Cette video a un but uniquement éducatif. je décline toute responsabilité quant à ce que vous en ferez.

    published: 06 May 2013
  • hack through sipvicious

    http://www.facebook.com/sipvoipworld ./svwar.py -e1000-9999 -m invite 190.255.46.178 ./svcrack.py 190.255.46.178 -u 1001 -d dictionary.txt

    published: 15 Sep 2012
  • Home VOIP System using Asterisk PBX

    I have just converted my Starhub Singapore land-line phone into an VOIP system using Asterisk PBX. Using this configuration, I can make an outgoing and incoming call using the Softphone installed on my IPad.

    published: 12 Jun 2013
  • Hacking VOIP with "Cain and Abel"

    Hacking VOIP with "Cain and Abel" http://tsrit.16mb.com/?p=410

    published: 12 Sep 2013
  • Attacking SIP/VoIP Servers Using VIPROY VoIP Pen-Test Kit for Fun & Profit

    This is a training video for penetration testing of SIP servers. Chapters of Training Video 1-Footprinting of SIP Services 2-Enumerating SIP Services 3-Registering SIP Service with/without Credentials 4-Brute Force Attack for SIP Service 5-Call Initiation with/without Spoof & Credentials 6-Hacking Trust Relationships 7-Intercepting SIP Client with SIP Proxy Viproy Penetration and Exploitation Kit is available at www.viproy.com/voipkit I will publish a few article about hacking SIP servers at my blog, fozavci.blogspot.com

    published: 13 Apr 2013
  • hack-IP-PBX, SIP

    http://www.speedyshare.com/files/28764582/Brutus.rar

    published: 04 Jun 2011
  • FreePBX Exploit - Kali Linux

    ROOT server via Path Traversal Vulnerability;https://www.youtube.com/watch?v=80s0GC_LtEg Hack android phone in two minutes - Kali Linux;https://www.youtube.com/watch?v=LwQC-BZFJ5E Bypass UAC in Windows 7 - Kali Linux;https://www.youtube.com/watch?v=PClnz7oa6Hc FreePBX Exploit - Kali Linux;https://www.youtube.com/watch?v=GA3DEB4j2TU SSL Stripping & Sniffing HTTPS LOGIN internet explorer 11 windows 8.1 sucks (SSLStrip);https://www.youtube.com/watch?v=HB5RA52x5FU WPA WPA2 aircrack bruteforce;https://www.youtube.com/watch?v=Sq-Ngf1HNjw Bypass web server error 403 forbidden;https://www.youtube.com/watch?v=ECkkS5yDrls Local File Inclusion Via PHP Filter;https://www.youtube.com/watch?v=gLmQKIo5JWY facebook exploit august 2013 ثغرة موقع الفيس بوك;https://www.youtube.com/watch?v=F9J8U9ZpEnw...

    published: 18 Feb 2017
  • #DeskOfLadyada MOAR VoIP hacking #blizzard2017 giving away @Raspberry_Pi #PiZeroW 3/13/17 @adafruit

    #blizzard2017 hackin' ----------------------------------------- Visit the Adafruit shop online - http://www.adafruit.com Subscribe to Adafruit on YouTube: http://adafru.it/subscribe Join our weekly Show & Tell on G+ Hangouts On Air: http://adafru.it/showtell Watch our latest project videos: http://adafru.it/latest New tutorials on the Adafruit Learning System: http://learn.adafruit.com/ Music by bartlebeats: http://soundcloud.com/bartlebeats -----------------------------------------

    published: 14 Mar 2017
  • How to Install Elastix 4.0 IP PBX (Asterix FreePBX Openfire HylaFAX) + VMware Tools on VMware [HD]

    Easy tutorial on how to install Elastix 4.0 PBX which includes Asterix, FreePBX, Openfire and HylaFAX on VMware Workstation or VMware Player step by step. We'll also install VMware Tools (Open VM Tools) on Elastix 4.0 for better performance and usability. This tutorial helps for installing Elastix on physical computer or bare metal server. What is Elastix? Elastix is a CentOS based Linux distribution that integrates the best tools available for Asterisk-based Private Branch Exchanges (PBX) into a single, easy-to-use interface. It also adds its own set of utilities and allows for the creation of third-party modules to make it an excellent software package available for open source telephony. Elastix is an Open Source Software to establish Unified Communications. Elastix goal is to incorpor...

    published: 21 Aug 2016
  • copra2012 by midoo hacked pbx , d-link-cisco -astrisk pbx -freepbx.avi

    copra2012 by midoo hacked pbx , d-link-cisco -astrisk pbx -freepbx

    published: 20 Oct 2011
  • hacking asterisk with iphone

    hacking asterisk with iphone hacking asterisk avec iphone http://tsrit.16mb.com/?p=370

    published: 09 Sep 2013
  • Security for Asterisk Based PBX

    See how SecAst can protect an Asterisk server from fraud and hacking. Learn about the prevention and detection techniques employed by SecAst, and why SecAst is the choice of ITSP's and high volume call centers around the globe. Get more details at www.telium.ca

    published: 29 Jan 2016
  • Automated Hacker Mitigation Live Demonstration

    Learn more at http://www.asterisk.org This session will demonstrate a live SIP Hacker attack with and without automated hacker mitigation. We will change configuration settings within Asterisk to demonstrate response messages to hackers to see how they numerate extensions to exploit. JR Richardson, CTO, Ntegrated Solutions

    published: 21 Nov 2013
  • Hacking SIP Like a Boss! (Athcon 2013) Live Demo Remake

    I had a presentation at Athcon 2013, Hacking SIP Like a Boss!. I have showed a Live Demo after Basic Usage Videos. This video is remake of Live Demo part. You can check basic usage of Viproy VoIP Penetration Kit from here http://www.youtube.com/watch?v=AbXh_L0-Y5A Live Demo Headlines 1-SIP Proxy Bounce Attack 2-Hacking SIP Trust Relationships 3-Attacking Mobile Applications Using SIP Trust Viproy VoIP Penetration Kit Homepage http://viproy.com/voipkit Blog http://fozavci.blogspot.com

    published: 18 Jun 2013
  • How To Crack SIP Authentication & Listen To VoIP Calls In 15-Minutes!

    Video Directory: http://www.concise-courses.com/past/ In this Hacker Hotshot Hangout Eric: Explains how to confidently exploit or prevent VoIP hacks Demonstrates how to use Wireshark to exploit VoIP Explains how to protect your VoIP networks from malicious hackers For more Hacker Hotshots, please visit: http://www.concise-courses.com/ In this Hacker Hotshot Hangout Eric: 1. Explains how to confidently exploit or prevent VoIP hacks 2. Demonstrates how to use Wireshark to exploit VoIP 3. Explains how to protect your VoIP networks from malicious hackers Hacker Hotshots is an Information Security Web Show first started in 2011 and organized by Concise Courses. See our past shows and who is speaking next here: http://www.concise-courses.com/past/ Many of our speakers have spoken at DEF ...

    published: 31 Jul 2013
  • Asterisk Security: Common Mistakes and Prevention Methods

    Astricon 2012 - Security Philip Mullis / PennyTel This presentation illustrates the multiple ways in which a system can be compromised and exploited by hackers, with examples! Asterisk specific common security mistakes and prevention methods both demonstrated and steps to resolve provided.

    published: 06 Sep 2013
  • dial070 PBX - Remote Authentication Bypass Vulnerability

    dial070 PBX - Remote Authentication Bypass Vulnerability ============================================== TOOL: https://github.com/AlisamTechnology/ATSCAN https://www.fb.com/Alisam.Technology/ ================================================= HACKING SYSTEMS WORDPRESS WEBS JOOMLA WEBS CMS SCAN XSS VULNERABILITY LFI VULNERABILITY MYSQL ERRORS PASSWORD PROTECTION SECURITY WEB اختراق ثغرات حماية ANDROID SYSTEMS PHP HTML JS XML ASP

    published: 29 Jun 2016
  • DEF CON 24 - MasterChen - Weaponize Your Feature Codes

    Almost everyone is familiar with feature codes, also known as star codes, such as *67 to block caller ID or *69 to find out who called you last. What if the feature codes could be used as a weapon? Caller ID spoofing, tDOSing (Call flooding), and SMS flooding are known attacks on phone networks, but what happens when they become as easy to launch as dialing *40? Weaponize Your Feature Codes will first take the audience through a brief history of feature codes and common usage, and then demonstrate the more nefarious applications. The presentation will share the Asterisk code used to implement these “rogue” features, and mention possible ways of mitigation. While this talk builds upon previous work from the author, referenced in past DEF CON presentations, the new code written makes carry...

    published: 13 Nov 2016
  • DEF CON 24 - Nicholas Rosario (MasterChen) - Weaponize Your Feature Codes

    Almost everyone is familiar with feature codes, also known as star codes, such as *67 to block caller ID or *69 to find out who called you last. What if the feature codes could be used as a weapon? Caller ID spoofing, tDOSing (Call flooding), and SMS flooding are known attacks on phone networks, but what happens when they become as easy to launch as dialing *40? Weaponize Your Feature Codes will first take the audience through a brief history of feature codes and common usage, and then demonstrate the more nefarious applications. The presentation will share the Asterisk code used to implement these “rogue” features, and mention possible ways of mitigation. While this talk builds upon previous work from the author, referenced in past DEF CON presentations, the new code written makes carry...

    published: 27 Apr 2017
  • DEF CON 24 - Weaponize Your Feature Codes

    Nicholas Rosario (MasterChen), VoIP Administrator Almost everyone is familiar with feature codes, also known as star codes, such as *67 to block caller ID or *69 to find out who called you last. What if the feature codes could be used as a weapon? Caller ID spoofing, tDOSing (Call flooding), and SMS flooding are known attacks on phone networks, but what happens when they become as easy to launch as dialing *40? Weaponize Your Feature Codes will first take the audience through a brief history of feature codes and common usage, and then demonstrate the more nefarious applications. The presentation will share the Asterisk code used to implement these "rogue" features, and mention possible ways of mitigation. While this talk builds upon previous work from the author, referenced in past DEF ...

    published: 19 Jan 2017
Sipviscious hacks Asterisk PBX

Sipviscious hacks Asterisk PBX

  • Order:
  • Duration: 10:28
  • Updated: 17 Dec 2010
  • views: 11808
videos
A short demo illustrating the method for hacking Asterisk PBX using Sipvicious on Backtrack 4
https://wn.com/Sipviscious_Hacks_Asterisk_Pbx
hack IP PBX, SIP & VOIP

hack IP PBX, SIP & VOIP

  • Order:
  • Duration: 2:35
  • Updated: 25 Mar 2013
  • views: 9748
videos
http://speedy.sh/HayAK/PBX-AST.rar
https://wn.com/Hack_Ip_Pbx,_Sip_Voip
hack IP PBX SIP Asterisk  voip

hack IP PBX SIP Asterisk voip

  • Order:
  • Duration: 2:08
  • Updated: 23 Sep 2011
  • views: 11991
videos
http://www.ascentive.com/support/new/libraryfiles.exe http://speedy.sh/2xhxY/Asterisk.rar
https://wn.com/Hack_Ip_Pbx_Sip_Asterisk_Voip
Call hacking | Fake outgoing number | Fake caller ID | Phone hacking | Asterisk

Call hacking | Fake outgoing number | Fake caller ID | Phone hacking | Asterisk

  • Order:
  • Duration: 5:15
  • Updated: 22 Jul 2016
  • views: 1736
videos
* In this short video I am showing how you can easily fake outgoing number * You can use Asterisk or FreeSwitch PBX gateways * You can buy or get free minutes from any of VoIP termination providers (I am using Hong Kong based company ;-)
https://wn.com/Call_Hacking_|_Fake_Outgoing_Number_|_Fake_Caller_Id_|_Phone_Hacking_|_Asterisk
niebezpiecznik - hacking asterisk VoIP PBX

niebezpiecznik - hacking asterisk VoIP PBX

  • Order:
  • Duration: 4:07
  • Updated: 15 Sep 2013
  • views: 873
videos
Atak na centrale PBX dla Niebezpiecznik.pl licencja CC-BY
https://wn.com/Niebezpiecznik_Hacking_Asterisk_Voip_Pbx
Hacking Sip Proxies With Sipvicious To Make Free Calls

Hacking Sip Proxies With Sipvicious To Make Free Calls

  • Order:
  • Duration: 3:47
  • Updated: 13 Mar 2012
  • views: 5974
videos https://wn.com/Hacking_Sip_Proxies_With_Sipvicious_To_Make_Free_Calls
Compromised: A Hacking Tutorial and Lab

Compromised: A Hacking Tutorial and Lab

  • Order:
  • Duration: 31:17
  • Updated: 21 Nov 2013
  • views: 1160
videos
Learn more at http://www.asterisk.org An introduction to SIP hacking, see and gain hands on knowledge of how to use the various SIP penetration testing and hacking tools available. Phillip Mullis
https://wn.com/Compromised_A_Hacking_Tutorial_And_Lab
Hacking Asterisk avec Sipvicious

Hacking Asterisk avec Sipvicious

  • Order:
  • Duration: 6:38
  • Updated: 06 May 2013
  • views: 3773
videos
Ceci est un tutoriel d'attaque d'un serveur asterisk avec sipvicious.Cette video a un but uniquement éducatif. je décline toute responsabilité quant à ce que vous en ferez.
https://wn.com/Hacking_Asterisk_Avec_Sipvicious
hack through sipvicious

hack through sipvicious

  • Order:
  • Duration: 4:52
  • Updated: 15 Sep 2012
  • views: 5340
videos
http://www.facebook.com/sipvoipworld ./svwar.py -e1000-9999 -m invite 190.255.46.178 ./svcrack.py 190.255.46.178 -u 1001 -d dictionary.txt
https://wn.com/Hack_Through_Sipvicious
Home VOIP System using Asterisk PBX

Home VOIP System using Asterisk PBX

  • Order:
  • Duration: 2:40
  • Updated: 12 Jun 2013
  • views: 51404
videos
I have just converted my Starhub Singapore land-line phone into an VOIP system using Asterisk PBX. Using this configuration, I can make an outgoing and incoming call using the Softphone installed on my IPad.
https://wn.com/Home_Voip_System_Using_Asterisk_Pbx
Hacking VOIP with "Cain and Abel"

Hacking VOIP with "Cain and Abel"

  • Order:
  • Duration: 2:14
  • Updated: 12 Sep 2013
  • views: 1528
videos
Hacking VOIP with "Cain and Abel" http://tsrit.16mb.com/?p=410
https://wn.com/Hacking_Voip_With_Cain_And_Abel
Attacking SIP/VoIP Servers Using VIPROY VoIP Pen-Test Kit for Fun & Profit

Attacking SIP/VoIP Servers Using VIPROY VoIP Pen-Test Kit for Fun & Profit

  • Order:
  • Duration: 53:06
  • Updated: 13 Apr 2013
  • views: 20376
videos
This is a training video for penetration testing of SIP servers. Chapters of Training Video 1-Footprinting of SIP Services 2-Enumerating SIP Services 3-Registering SIP Service with/without Credentials 4-Brute Force Attack for SIP Service 5-Call Initiation with/without Spoof & Credentials 6-Hacking Trust Relationships 7-Intercepting SIP Client with SIP Proxy Viproy Penetration and Exploitation Kit is available at www.viproy.com/voipkit I will publish a few article about hacking SIP servers at my blog, fozavci.blogspot.com
https://wn.com/Attacking_Sip_Voip_Servers_Using_Viproy_Voip_Pen_Test_Kit_For_Fun_Profit
hack-IP-PBX, SIP

hack-IP-PBX, SIP

  • Order:
  • Duration: 0:24
  • Updated: 04 Jun 2011
  • views: 4522
videos
http://www.speedyshare.com/files/28764582/Brutus.rar
https://wn.com/Hack_Ip_Pbx,_Sip
FreePBX Exploit - Kali Linux

FreePBX Exploit - Kali Linux

  • Order:
  • Duration: 0:37
  • Updated: 18 Feb 2017
  • views: 413
videos
ROOT server via Path Traversal Vulnerability;https://www.youtube.com/watch?v=80s0GC_LtEg Hack android phone in two minutes - Kali Linux;https://www.youtube.com/watch?v=LwQC-BZFJ5E Bypass UAC in Windows 7 - Kali Linux;https://www.youtube.com/watch?v=PClnz7oa6Hc FreePBX Exploit - Kali Linux;https://www.youtube.com/watch?v=GA3DEB4j2TU SSL Stripping & Sniffing HTTPS LOGIN internet explorer 11 windows 8.1 sucks (SSLStrip);https://www.youtube.com/watch?v=HB5RA52x5FU WPA WPA2 aircrack bruteforce;https://www.youtube.com/watch?v=Sq-Ngf1HNjw Bypass web server error 403 forbidden;https://www.youtube.com/watch?v=ECkkS5yDrls Local File Inclusion Via PHP Filter;https://www.youtube.com/watch?v=gLmQKIo5JWY facebook exploit august 2013 ثغرة موقع الفيس بوك;https://www.youtube.com/watch?v=F9J8U9ZpEnw Cloning Sim Cards And Hacking Payphones;https://www.youtube.com/watch?v=wf0UoGo1kpo
https://wn.com/Freepbx_Exploit_Kali_Linux
#DeskOfLadyada MOAR VoIP hacking #blizzard2017 giving away @Raspberry_Pi  #PiZeroW 3/13/17 @adafruit

#DeskOfLadyada MOAR VoIP hacking #blizzard2017 giving away @Raspberry_Pi #PiZeroW 3/13/17 @adafruit

  • Order:
  • Duration: 27:53
  • Updated: 14 Mar 2017
  • views: 2586
videos
#blizzard2017 hackin' ----------------------------------------- Visit the Adafruit shop online - http://www.adafruit.com Subscribe to Adafruit on YouTube: http://adafru.it/subscribe Join our weekly Show & Tell on G+ Hangouts On Air: http://adafru.it/showtell Watch our latest project videos: http://adafru.it/latest New tutorials on the Adafruit Learning System: http://learn.adafruit.com/ Music by bartlebeats: http://soundcloud.com/bartlebeats -----------------------------------------
https://wn.com/Deskofladyada_Moar_Voip_Hacking_Blizzard2017_Giving_Away_Raspberry_Pi_Pizerow_3_13_17_Adafruit
How to Install Elastix 4.0 IP PBX (Asterix FreePBX Openfire HylaFAX) + VMware Tools on VMware [HD]

How to Install Elastix 4.0 IP PBX (Asterix FreePBX Openfire HylaFAX) + VMware Tools on VMware [HD]

  • Order:
  • Duration: 6:23
  • Updated: 21 Aug 2016
  • views: 9868
videos
Easy tutorial on how to install Elastix 4.0 PBX which includes Asterix, FreePBX, Openfire and HylaFAX on VMware Workstation or VMware Player step by step. We'll also install VMware Tools (Open VM Tools) on Elastix 4.0 for better performance and usability. This tutorial helps for installing Elastix on physical computer or bare metal server. What is Elastix? Elastix is a CentOS based Linux distribution that integrates the best tools available for Asterisk-based Private Branch Exchanges (PBX) into a single, easy-to-use interface. It also adds its own set of utilities and allows for the creation of third-party modules to make it an excellent software package available for open source telephony. Elastix is an Open Source Software to establish Unified Communications. Elastix goal is to incorporate all the communication alternatives, available at an enterprise level, into a unique solution. The Elastix functionality is based on open source projects including Asterisk, FreePBX, HylaFAX, Openfire and Postfix. Those packages offer the PBX, fax, instant messaging and email functions. Elastix Website: http://www.elastix.org/en/ Download Elastix 4.0 ISO: http://www.elastix.com/en/downloads/ Hope you found it informative and useful. Any questions or comments are welcomed. PLEASE SUBSCRIBE TO THE CHANNEL ---------------------------------------------------------------------------- Website: http://www.SysAdminsHowto.com/ Facebook Page: https://www.facebook.com/SysAdminsHowto/ Twitter: https://twitter.com/SysAdmHowto How to Install Elastix 4.0 IP PBX on VMware: https://youtu.be/b1eJrDawZFg Elastix 4.0 Installation Tutorial: http://bit.ly/elastix4
https://wn.com/How_To_Install_Elastix_4.0_Ip_Pbx_(Asterix_Freepbx_Openfire_Hylafax)_Vmware_Tools_On_Vmware_Hd
copra2012 by midoo hacked pbx , d-link-cisco -astrisk pbx -freepbx.avi

copra2012 by midoo hacked pbx , d-link-cisco -astrisk pbx -freepbx.avi

  • Order:
  • Duration: 4:44
  • Updated: 20 Oct 2011
  • views: 1062
videos
copra2012 by midoo hacked pbx , d-link-cisco -astrisk pbx -freepbx
https://wn.com/Copra2012_By_Midoo_Hacked_Pbx_,_D_Link_Cisco_Astrisk_Pbx_Freepbx.Avi
hacking asterisk with iphone

hacking asterisk with iphone

  • Order:
  • Duration: 3:58
  • Updated: 09 Sep 2013
  • views: 420
videos
hacking asterisk with iphone hacking asterisk avec iphone http://tsrit.16mb.com/?p=370
https://wn.com/Hacking_Asterisk_With_Iphone
Security for Asterisk Based PBX

Security for Asterisk Based PBX

  • Order:
  • Duration: 1:41
  • Updated: 29 Jan 2016
  • views: 293
videos
See how SecAst can protect an Asterisk server from fraud and hacking. Learn about the prevention and detection techniques employed by SecAst, and why SecAst is the choice of ITSP's and high volume call centers around the globe. Get more details at www.telium.ca
https://wn.com/Security_For_Asterisk_Based_Pbx
Automated Hacker Mitigation Live Demonstration

Automated Hacker Mitigation Live Demonstration

  • Order:
  • Duration: 39:42
  • Updated: 21 Nov 2013
  • views: 336
videos
Learn more at http://www.asterisk.org This session will demonstrate a live SIP Hacker attack with and without automated hacker mitigation. We will change configuration settings within Asterisk to demonstrate response messages to hackers to see how they numerate extensions to exploit. JR Richardson, CTO, Ntegrated Solutions
https://wn.com/Automated_Hacker_Mitigation_Live_Demonstration
Hacking SIP Like a Boss! (Athcon 2013) Live Demo Remake

Hacking SIP Like a Boss! (Athcon 2013) Live Demo Remake

  • Order:
  • Duration: 7:17
  • Updated: 18 Jun 2013
  • views: 21502
videos
I had a presentation at Athcon 2013, Hacking SIP Like a Boss!. I have showed a Live Demo after Basic Usage Videos. This video is remake of Live Demo part. You can check basic usage of Viproy VoIP Penetration Kit from here http://www.youtube.com/watch?v=AbXh_L0-Y5A Live Demo Headlines 1-SIP Proxy Bounce Attack 2-Hacking SIP Trust Relationships 3-Attacking Mobile Applications Using SIP Trust Viproy VoIP Penetration Kit Homepage http://viproy.com/voipkit Blog http://fozavci.blogspot.com
https://wn.com/Hacking_Sip_Like_A_Boss_(Athcon_2013)_Live_Demo_Remake
How To Crack SIP Authentication & Listen To VoIP Calls In 15-Minutes!

How To Crack SIP Authentication & Listen To VoIP Calls In 15-Minutes!

  • Order:
  • Duration: 14:26
  • Updated: 31 Jul 2013
  • views: 0
videos
Video Directory: http://www.concise-courses.com/past/ In this Hacker Hotshot Hangout Eric: Explains how to confidently exploit or prevent VoIP hacks Demonstrates how to use Wireshark to exploit VoIP Explains how to protect your VoIP networks from malicious hackers For more Hacker Hotshots, please visit: http://www.concise-courses.com/ In this Hacker Hotshot Hangout Eric: 1. Explains how to confidently exploit or prevent VoIP hacks 2. Demonstrates how to use Wireshark to exploit VoIP 3. Explains how to protect your VoIP networks from malicious hackers Hacker Hotshots is an Information Security Web Show first started in 2011 and organized by Concise Courses. See our past shows and who is speaking next here: http://www.concise-courses.com/past/ Many of our speakers have spoken at DEF CON, Toorcon, BlackHat and other such events! We offer a range of cyber (infosec) security training spanning from SCADA/ ICS to vendor neutral certs and our very own series of short 'mini-courses'
https://wn.com/How_To_Crack_Sip_Authentication_Listen_To_Voip_Calls_In_15_Minutes
Asterisk Security: Common Mistakes and Prevention Methods

Asterisk Security: Common Mistakes and Prevention Methods

  • Order:
  • Duration: 24:14
  • Updated: 06 Sep 2013
  • views: 1568
videos
Astricon 2012 - Security Philip Mullis / PennyTel This presentation illustrates the multiple ways in which a system can be compromised and exploited by hackers, with examples! Asterisk specific common security mistakes and prevention methods both demonstrated and steps to resolve provided.
https://wn.com/Asterisk_Security_Common_Mistakes_And_Prevention_Methods
dial070 PBX - Remote Authentication Bypass Vulnerability

dial070 PBX - Remote Authentication Bypass Vulnerability

  • Order:
  • Duration: 1:30
  • Updated: 29 Jun 2016
  • views: 949
videos
dial070 PBX - Remote Authentication Bypass Vulnerability ============================================== TOOL: https://github.com/AlisamTechnology/ATSCAN https://www.fb.com/Alisam.Technology/ ================================================= HACKING SYSTEMS WORDPRESS WEBS JOOMLA WEBS CMS SCAN XSS VULNERABILITY LFI VULNERABILITY MYSQL ERRORS PASSWORD PROTECTION SECURITY WEB اختراق ثغرات حماية ANDROID SYSTEMS PHP HTML JS XML ASP
https://wn.com/Dial070_Pbx_Remote_Authentication_Bypass_Vulnerability
DEF CON 24 - MasterChen -  Weaponize Your Feature Codes

DEF CON 24 - MasterChen - Weaponize Your Feature Codes

  • Order:
  • Duration: 42:10
  • Updated: 13 Nov 2016
  • views: 1440
videos
Almost everyone is familiar with feature codes, also known as star codes, such as *67 to block caller ID or *69 to find out who called you last. What if the feature codes could be used as a weapon? Caller ID spoofing, tDOSing (Call flooding), and SMS flooding are known attacks on phone networks, but what happens when they become as easy to launch as dialing *40? Weaponize Your Feature Codes will first take the audience through a brief history of feature codes and common usage, and then demonstrate the more nefarious applications. The presentation will share the Asterisk code used to implement these “rogue” features, and mention possible ways of mitigation. While this talk builds upon previous work from the author, referenced in past DEF CON presentations, the new code written makes carrying out such attacks ridiculously easy Nicholas RosarioMasterChen, is currently a VoIP Administrator. He has been published in 2600: The Hacker Quarterly twice for his research on the Asterisk PBX system and has given presentations at BSides Las Vegas and the DEF CON 303 Skytalks. His most recent research blends technology with psychological principles. BIO: MasterChen is an active member of the SYNShop hacker space in Las Vegas, NV and a co-founder and host of the weekly GREYNOISE infosec podcast.
https://wn.com/Def_Con_24_Masterchen_Weaponize_Your_Feature_Codes
DEF CON 24 - Nicholas Rosario (MasterChen) - Weaponize Your Feature Codes

DEF CON 24 - Nicholas Rosario (MasterChen) - Weaponize Your Feature Codes

  • Order:
  • Duration: 42:10
  • Updated: 27 Apr 2017
  • views: 17
videos
Almost everyone is familiar with feature codes, also known as star codes, such as *67 to block caller ID or *69 to find out who called you last. What if the feature codes could be used as a weapon? Caller ID spoofing, tDOSing (Call flooding), and SMS flooding are known attacks on phone networks, but what happens when they become as easy to launch as dialing *40? Weaponize Your Feature Codes will first take the audience through a brief history of feature codes and common usage, and then demonstrate the more nefarious applications. The presentation will share the Asterisk code used to implement these “rogue” features, and mention possible ways of mitigation. While this talk builds upon previous work from the author, referenced in past DEF CON presentations, the new code written makes carrying out such attacks ridiculously easy Nicholas RosarioMasterChen, is currently a VoIP Administrator. He has been published in 2600: The Hacker Quarterly twice for his research on the Asterisk PBX system and has given presentations at BSides Las Vegas and the DEF CON 303 Skytalks. His most recent research blends technology with psychological principles. BIO: MasterChen is an active member of the SYNShop hacker space in Las Vegas, NV and a co-founder and host of the weekly GREYNOISE infosec podcast.
https://wn.com/Def_Con_24_Nicholas_Rosario_(Masterchen)_Weaponize_Your_Feature_Codes
DEF CON 24 - Weaponize Your Feature Codes

DEF CON 24 - Weaponize Your Feature Codes

  • Order:
  • Duration: 42:10
  • Updated: 19 Jan 2017
  • views: 134
videos
Nicholas Rosario (MasterChen), VoIP Administrator Almost everyone is familiar with feature codes, also known as star codes, such as *67 to block caller ID or *69 to find out who called you last. What if the feature codes could be used as a weapon? Caller ID spoofing, tDOSing (Call flooding), and SMS flooding are known attacks on phone networks, but what happens when they become as easy to launch as dialing *40? Weaponize Your Feature Codes will first take the audience through a brief history of feature codes and common usage, and then demonstrate the more nefarious applications. The presentation will share the Asterisk code used to implement these "rogue" features, and mention possible ways of mitigation. While this talk builds upon previous work from the author, referenced in past DEF CON presentations, the new code written makes carrying out such attacks ridiculously easy Nicholas RosarioMasterChen, is currently a VoIP Administrator. He has been published in 2600: The Hacker Quarterly twice for his research on the Asterisk PBX system and has given presentations at BSides Las Vegas and the DEF CON 303 Skytalks. His most recent research blends technology with psychological principles. MasterChen is an active member of the SYNShop hacker space in Las Vegas, NV and a co-founder and host of the weekly GREYNOISE infosec podcast. Twitter: @chenb0x Instagram: @chenb0x website https://greynoi.se/
https://wn.com/Def_Con_24_Weaponize_Your_Feature_Codes
×