What to bring:
Each student must provide their own laptop with DVD-ROM and a minimum of 4 GB of free space on their laptop to store the instructor provided VMware image.
|
Overview
This course addresses exploiting VoIP -- from end user devices through carrier grade servers -- including protocol level attacks, application bugs and common dangerous deployment mistakes. The course provides deep coverage of a broad spectrum of VoIP relevant security threats:
- Hijacking
- Sniffing
- Injecting
- Interdicting
- SPITing
Starting with a bits and bytes analysis of VoIP on the wire and progessing to exploit development, you will constantly be increasing your VoIP security skills. In addition to a thorough theoretical understanding of VoIP security issues, you will directly apply your knowlege in practical VoIP workshops. Each workshop addresses an aspect of VoIP security, further deepening your understanding and completing your skill set.
You will leave with a solid grounding in VoIP security assessment, including methodology, techniques and an advanced toolset to facilitate security auditing. You will also have comprehensive knowlege of the major VoIP protocol suites, covering signalling, media and PSTN integration. Additionally, you will have exposure to, and training with, the most powerful and flexible VoIP security assessment tool suite available.
The VoIPhreaking tool suite, based on the VoIPy library, provides a flexible framework for VoIP security analysis. Coded by the grugq, this tool suite is specifically developed for VoIP hacking. After learning how to utilize the suite, you will also be able to extend the core suite to develop new and unique exploits and tests specific to your environment or engagement.
Who should attend:
This course is ideal for penetration testers looking to expand their skill set, telecoms engineers and network administrators looking to understand emerging threats, and anyone else interested in VoIP security.
Prerequisites
Each student must provide their own laptop with DVD-ROM and a minimum of 4 GB of free space on their laptop to store the instructor provided VMware image.
|
Trainer:
|
The Grugq has been at the forefront of forensic research for the last six years, during which he has been pioneering in the realm of anti-forensic research and development. During this time, he has also worked with leading IT security consultancies and a major financial institution. Most recently he has been involved with an innovative security software development start-up company. Currently the director of gxlabs, an information security company, the Grugq continues his research on security, forensics and beer.
|