Whitepaper : VoIP Security - A layered approach

From: Frederic Charpentier (fcharpen@xmcopartners.com)
Date: Mon Mar 20 2006 - 08:38:44 EST


Our team is pleased to release a whitepaper about VoIP.
This whitepaper propose a security analysis of the Voice Over IP
protocols with a layered approach.

Link :
http://www.xmcopartners.com/whitepapers/voip-security-layered-approach.pdf

Chapters :
1 VOICE OVER IP SECURITY
1.1 A GENERAL OVERVIEW OF VOICE OVER IP
1.2 VOICE OVER IP PARTICULARITIES
1.3 VOICE OVER IP ARCHITECTURES
1.4 VOICE OVER IP THREATS
1.4.1 Signaling Protocols Layer
1.4.1.1 SIP based Denials of Service
1.4.1.2 SIP based Man in the Middle/Call Hijacking
1.4.1.3 Possible solutions for SIP based attacks
1.4.2 Transport Protocols Layer
1.4.2.1 Eavesdropping
1.4.2.2 RTP Insertion attacks
1.4.2.3 RTCP insertion attacks
1.4.2.4 Possible solutions for RTP based attacks
1.4.3 Application Layer
1.5 FUTURE THREATS TO VOICE OVER IP SECURITY
2 CONCLUSIONS

-- 
Xmco Partners
Security Consulting / Pentest
web  : http://www.xmcopartners.com/tests-intrusion.html
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security? 
As attacks through web applications continue to rise, you need to proactively 
protect your applications from hackers. Cenzic has the most comprehensive 
solutions to meet your application security penetration testing and 
vulnerability management needs. You have an option to go with a managed 
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). 
Download FREE whitepaper on how a managed service can help you: 
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request@cenzic.com
------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:42 EDT