Full Disclosure mailing list archives
Re: [Mlabs] Scrutinising SIP Payloads : Traversing Attack Vectors in VOIP and IM
From: "Lamer Buster" <lamerbuster () gmail com>
Date: Thu, 20 Sep 2007 10:37:21 +0530
hello cranky! so you recently diverted your attention to steal others work without giving any credits and get glorified. Do you think this community is such a fool that it can not idenitfy your plagiarism. SIP and its related issues are known for years. Anyone who is yet to explore it, look for SIP Exploitation in google. http://www.google.co.in/search?hl=en&q=SIP+Exploitation&meta= On 9/20/07, Aditya K Sood <zeroknock () secniche org> wrote:
Hi I have released core research paper on SIP comprising of Payload problems and Attack vectors. This research paper lays stress on the potential weaknesses present in the SIP which make it vulnerable to stringent attacks. The point of discussion is to understand the weak spots in the protocol. The payloads constitute the request vectors. The protocol inherits well defined security procedures and implementation objects. The security model is hierarchical and is diverged in every working layer of SIP from top to bottom. SIP features can be exploited easily if definitive attack base is subjugated. We will discuss about inherited flaws and methods to combat against predefined attacks. The payloads have to be scrutinized at the network level. It is critical because payloads are considered as infection bases to infect networks . The pros and cons will be enumerated from security perspective. You can download paper at: http://mlabs.secniche.org Regards Aks aka 0kn0ck _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- [Mlabs] Scrutinising SIP Payloads : Traversing Attack Vectors in VOIP and IM Aditya K Sood (Sep 19)
- Re: [Mlabs] Scrutinising SIP Payloads : Traversing Attack Vectors in VOIP and IM Lamer Buster (Sep 19)