hello cranky! so you recently diverted your attention to steal others
work without giving any credits and get glorified. Do you think this
community is such a fool that it can not idenitfy your plagiarism.


SIP and its related issues are known for years. Anyone who is yet to
explore it, look for SIP Exploitation in google.

http://www.google.co.in/search?hl=en&q=SIP+Exploitation&meta=







On 9/20/07, Aditya K Sood <[EMAIL PROTECTED]> wrote:
> Hi
>
> I have released core research paper on SIP comprising of Payload
> problems and Attack vectors.
>
> This research paper lays stress on the potential weaknesses present in
> the SIP which make it vulnerable to stringent attacks. The point of
> discussion is to understand the weak spots in the protocol. The payloads
> constitute the request vectors. The protocol inherits well defined
> security procedures and implementation objects. The security model is
> hierarchical and is diverged in every working layer of SIP from top to
> bottom. SIP features can be exploited easily if definitive attack base
> is subjugated. We will discuss about inherited flaws and methods to
> combat against predefined attacks. The payloads have to be scrutinized
> at the network level. It is critical because payloads are
> considered as infection bases to infect networks . The pros and cons
> will be enumerated from security perspective.
>
> You can download paper at:
>
> http://mlabs.secniche.org
>
> Regards
> Aks aka 0kn0ck
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to