Presentation is loading. Please wait.

Presentation is loading. Please wait.

PROJECT BY: KARNATI VAMSI KRISHNA VANKANA SIVA SAKETH REDDY VOIP EXPLOITS USING KALI LINUX TOOLS.

Similar presentations


Presentation on theme: "PROJECT BY: KARNATI VAMSI KRISHNA VANKANA SIVA SAKETH REDDY VOIP EXPLOITS USING KALI LINUX TOOLS."— Presentation transcript:

1 PROJECT BY: KARNATI VAMSI KRISHNA VANKANA SIVA SAKETH REDDY VOIP EXPLOITS USING KALI LINUX TOOLS

2 CONTENTS Project Title Tools Used  SIPSAK  Metasploit  XPLICO Implementations Problems Faced References

3 PROJECT TITLE “Pen testing and Exploits using KALI Linux Tools”

4 TOOL USED SIPSAK:  This tool can be used testing SIP devices & applications.  This can be done just by using OPTION req method.  In our project we used it to Fingerprint the SIP device.

5 IMPLEMENTING SIPSAK WE USED THIS TOOL TO FINGERPRINT THE SIP DEVICES. COMAND: sipsak –vv –s sip:10.103.5.217

6

7 TOOL USED METASPLOIT:  Using the Modules & Auxiliaries available in Metasploit framework VoIP can be exploited.  This framework can be used for several attacks.  We can use it for enumerating SIP extensions.  We can use it for creating fake SIP invite request, which makes the target device ring.

8 IMPLEMENTING METASPLOIT WE USED THIS TOOL TO ENUMERATE DEVICES AND TO FLOOD INVITE REQUESTS TO SIP DEVICES. COMMANDS: Use auxiliary/scanner/sip/options Use auxiliary/voip/sip-invite-spoof RESULTS: SIP Devices are enumerated SIP device receives several invite requests, which cause for multiple Rings.

9

10 IMPLEMENTING XPLICO WE USED THIS TOOL TO CAPTURE SIP TRAFFIC COMMANDS:

11 SIPCRACK TOOL COMMAND: sipdump –p auth.txt Dumps the authentication data from PCAP file into auth.txt Sipcrack –w auth.txt Cracks the password of the Sip device

12

13

14 TOOLS TRIED SIPSAK METASPLOIT SIPCRACK VOIPONG VOMIT XPLICO

15 REFERENCES: www.google.com http://www.backtrack-linux.org/wiki/index.php/Pentesting_VOIP http://www.enderunix.org/voipong/manual/book.html#INSTALLATION http://zer0byte.com/2013/03/19/kali-linux-complete-tools-list-installation-screen- shots/ http://zer0byte.com/2013/03/19/kali-linux-complete-tools-list-installation-screen- shots/ http://www.offensive-security.com/metasploit- unleashed/Msfconsole_Commands#path http://www.offensive-security.com/metasploit- unleashed/Msfconsole_Commands#path


Download ppt "PROJECT BY: KARNATI VAMSI KRISHNA VANKANA SIVA SAKETH REDDY VOIP EXPLOITS USING KALI LINUX TOOLS."

Similar presentations


Ads by Google