Penetration Testing mailing list archives

New article on SecurityFocus: Two attacks against VOIP


From: "Erin Carroll" <amoeba () amoebazone com>
Date: Wed, 5 Apr 2006 22:47:14 -0700

The following Infocus article was published on SecurityFocus recently:

Two attacks against VoIP
By Peter Thermos
2006-04-04

This purpose of this article is to discuss two of the most well known
attacks that can be carried out in current VoIP deployments. The first
attack demonstrates the ability to hijack a user's VoIP Subscription and
subsequent communications. The second attack looks at the ability to
eavesdrop in to VoIP communications.

http://www.securityfocus.com/infocus/1862


Also note: We enjoy publishing article submissions from the community. 
For submission guidelines and contact information please see
http://www.securityfocus.com/static/submissions.html

--
Erin Carroll
Moderator
SecurityFocus pen-test list
"Do Not Taunt Happy-Fun Ball" 

-- 
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.1.385 / Virus Database: 268.3.5/302 - Release Date: 4/5/2006
 


------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: