Hi Fred,

nice paper
btw, what about H.323?

Regards
/JA
https://www.securinfos.info

----- Original Message ----- 
From: "Frederic Charpentier" <[EMAIL PROTECTED]>
Cc: <full-disclosure@lists.grok.org.uk>
Sent: Thursday, March 23, 2006 3:43 PM
Subject: [Full-disclosure] VoIP Security whitepaper : a layered approach


> Hi FD,
> Our team is pleased to release a whitepaper about VoIP.
> This whitepaper propose a security analysis of the Voice Over IP
> protocols with a layered approach.
>
> Link :
> http://www.xmcopartners.com/whitepapers/voip-security-layered-approach.pdf
>
> Chapters :
> 1 VOICE OVER IP SECURITY
> 1.1 A GENERAL OVERVIEW OF VOICE OVER IP
> 1.2 VOICE OVER IP PARTICULARITIES
> 1.3 VOICE OVER IP ARCHITECTURES
> 1.4 VOICE OVER IP THREATS
> 1.4.1 Signaling Protocols Layer
> 1.4.1.1    SIP based Denials of Service
> 1.4.1.2    SIP based Man in the Middle/Call Hijacking
> 1.4.1.3    Possible solutions for SIP based attacks
> 1.4.2 Transport Protocols Layer
> 1.4.2.1    Eavesdropping
> 1.4.2.2    RTP Insertion attacks
> 1.4.2.3    RTCP insertion attacks
> 1.4.2.4    Possible solutions for RTP based attacks
> 1.4.3    Application Layer
> 1.5 FUTURE THREATS TO VOICE OVER IP SECURITY
> 2 CONCLUSIONS
>
>
> -- 
> Xmco Partners
> Security Consulting / Pentest
> web  : http://www.xmcopartners.com/
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to