Category: Security

Attack on SIP protocol – VoIP Vulnerability

The Attack of SIP protocol

We previously discussed in this blog the SIp protocol. We have also said that “Session Initiation Protocol” (SIP) is becoming popular quite fast and it has also achieved quick acceptance in “mixed-vendor VoIP networks”. One of the most striking properties of SIP is its use of “existing protocols”. And by default, SIP messages are sometimes sent in the form of plain (normal) text.

This is quite unfortunate as the very properties that make SIP striking can also be leveraged by attackers to make a compromise regarding the security of a particular SIP network.

VoIP Security – Main Targets of VoIP Attacks

VoIP SecurityThese days IP phones are easily obtainable and abundant in many corporate fields, they have become striking targets for attackers. Also VoIP administrators should keep an eye against VoIP differences, of fishing and spam as both are very popular in e-mail fields, and also as toll fraud, which is rather frequent in PBX fields. This article is about mentioning all the popular attack targets for a VoIP network and seeing how there are deployed.

 

Firewall – Defending Networks

In network security today, a firewall may be a software or hardware that makes a barrier between our internal network and untrusted external network. You can look at the firewall as a set of related programs that enforce an access control policy between two or more networks.

firewallThe name “firewall” is very strange, it has been originally used to describe the segment that separated the engine compartment from the interior of an automobile. In the networking world firewall is the first line of defense and the technology that will allow us to segment the network in physically separate subnetworks.