Cisco VoIP Phones – A Hackers Perspective

ciscophones Introduction

In the world of VoIP phones, each person may look at them differently. For some, an annoyance that sit on their desk, or maybe for some it is simply a part of their job either deploying them or as a help desk position taking phone calls all day. This could even go as far as some people that just use them on a daily basis at home or in a lobby. But what about in a professional Penetration Tester’s mind? What kind of simple yet sensitive information are we leaving out in the open for malicious users?

VoIP security is important to understand what vulnerabilities we may be leaving out in the open just waiting for malicious people to crawl our network by gaining information from these VoIP phones. Here presented a document about Cisco VoIP Phones and what an attacker may be looking for, what information they may gain by using these VoIP phones as their target, and ending this document with an example case study utilizing UCSniff on a VoIP network capturing VoIP conversations!

Contents

  • Intro
  • VoIP Phones – What they advertise
  • Is this line secure?
  • Conclusion
  • References

Download

You can download the paper here :

Please log in to download Cisco Voip - A Hackers Perspective (698.9 KiB)

2010, chap0. All rights reserved.

Related Posts: