IVR Security:- Internal A3acks Via Phone Line
|
|
|
- Egbert Nash
- 10 years ago
- Views:
Transcription
1 IVR Security:- Internal A3acks Via Phone Line
2 Who am I? Rahul Sasi Security isight Partners. Member Garage4Hackers.
3 Garage 4 Hackers InformaGon Security professionals from Fortune 500, Security research and ConsulGng firms from all across the world. Security Firms ConsulGng Firms Research Firms Law Enforcements h3p://
4 IVR ApplicaGon Phone Banking Telephone Assistant Operator Hospital Medical Enquiry
5 What Made Me Interested: IVR ApplicaGon My Phone Banking. How it works. It used 16 digit Account No followed by 4 digit ATM pin for authengcagon using a voice call to IVR.
6 How it could be Hacked: In Theory Probability Theory Probability that event A occurs P(A) = n(a) / n(s). where, n(a) - number of event occurs in A n(s) - number of possible outcomes n(a) = n no of customers (huge) n(s) = no of pin combinagon (9000)
7 More Theory So if we make a program that dials into IVR and tries to authengcates into users account StarGng form account no 1000 to 2000 for password The chances of 1000 users having 6666 as pin for there accounts is very high :D. The lowest possibility lets say 10 accounts.
8 Enough Theories Individual Users ader 3 invalid a3empts, there account gets blocked. And every night at 12 clock your account would be automagcally acgvated ;) So if I start my brute force program at night 10 O clock, I could try 5 different pins for 1000 accounts with out blocking any accounts :D
9 Now what With the above logic any one would be able to crack least 50 ATM pins in 4 hours Gme :O Enough Theories
10 AT Commands Basic Sending DTMF tones using phone modem. AT [A3enGon ] ATD ATZ + vts ATH
11 How to Automate Serial Port CommunicaGon Talk to your phone modem.
12 Demo #1 IVR Brute.mp4
13 IVR: IntroducGon InteracGve Voice RecogniGon systems, use Touch- tone or Speech RecogniGon to make callers interact with the system. Touch Tones: DTMF inputs. Speech RecogniGon: Could send in voice commands, and TTS(Text to Speech) Engine Could detect it.
14 IVR Architecture
15 Layers of IVR Telephone Network TCP, IP Network VXML Telephony Server Web ApplicaGon server
16 Modules: How it works Client (Telephone Phone) Telephone Network PBX (Private Branch Exchange ) VXML Telephony Server VXML CXML Web ApplicaGon Servers Databases
17 Finger PrinGng Internal Servers: Triggering Errors: If we could trigger error messages on Internal servers, the text to voice (3s) machine would read out the error. There are many ways to trigger error, Fuzz for the grammar files, or best way is source code audigng. Automated Fuzzing for Errors.(tools)
18 Vulnerable Programs Sample Vulnerable Program: error_vul.xml
19 Demo #2 Finger PrinGng Internal Servers [Demo Video] ivr_error_video.mp4
20 Input ValidaGon A3acks: Using Grammar files [Nonsense Grammar format] Using prebuilt grammar files.
21 Chances of SQL InjecGon A3ack Vulnerable Program
22 Demo #3 Fuzzing for Grammar files
23 SQL Payloads Via DTMF DTMF LimitaGons, we could only send [0-9 ] * # A B C D Advance SQL injecgon Based on [ False InjecGon ]
24 Basic InjecGon: select * from users where id='$id' and password='$password or 1=1
25 select * from users where id='$id' and password='$password '=0# Input: '=0# [ and It Works ] Other inputs that will work: AddiGon +0# MulGplicaGon '*9# 1*0*0*1 [True] 1*0*0*1 [False] h3p:// db.com/papers/18263/
26 IVR: Enter User ID User: 1337 IVR: Wrong User ID, Please try again IVR: Enter User ID User: IVR: Welcome Rahul Sasi
27 IVR: Enter User ID User: 31337*1*1*1*1 IVR: Welcome Rahul Sasi IVR: Enter User ID User: 31337*1*1*1*0 IVR: Invalid User [or] No Response
28 SQL InjecGon Check using DTMF Demo Video
29 Long strings, chances of Buffer Overflow. Improper Input validagon on input to CGI applicagons form VXML server. Voice and DTMF Fuzzing could Reveal Bugs. Our tool will be having voice fuzzing Support.
30 LimitaGons. Payloads cannot have / and other special characters. Sending payload using Upper Case Alpha Numeric Shell code. The payload has to be converted to DTMF (0-9) and Alphabets (A- Z)
31 Demo Video Vulnerable Program
32 The making of Voice Payload. Upper Case Alpha Numeric Payload
33 Demo #4 IVR: A3acking Internal Server using Voice Payload.
How I DOS ed My Bank. (DTMF Input Processing Easy DOS Attacks via Phone Lines)
How I DOS ed My Bank (DTMF Input Processing Easy DOS Attacks via Phone Lines) 60 Min, Genres: Action, Comedy, Sci- Fi, Thriller, Family Our paper would be on DTMF input processing algorithms [DSP], that
Cisco Unified Communications Manager Auto-Attendant
Cisco Unified Communications Manager Auto-Attendant This chapter provides information about Cisco Unified Communications Manager Auto-Attendant, a simple automated attendant, which allows callers to locate
Dramatically simplifying voice and data networking. IVR Editor HOW-TO Guide
Dramatically simplifying voice and data networking IVR Editor HOW-TO Guide 2 edgebox How-To Guide IVR Editor HOW-TO Guide Table of Contents Introduction... 3 IVR...3 The edgebox IVR Editor...3 Understanding
Let's take a look at another example, which is based on the following diagram:
Chapter 3 - Voice Dial Peers In order to understand the concept of dial peers, it is important to understand call legs. A voice call over a packet network is segmented into discrete call legs. A call leg
Eliac Call Recording - Configurator Guide. Eliac. Call Recording System Ver. 2.x. www.smartsoft-eg.com
Eliac Call Recording System Ver. 2.x 1 System Overview Eliac Call Recording is a complete system that records both incoming and outgoing calls for any analog telephone lines, and can record either internal
SYMETRIX SOLUTIONS: TECH TIP February 2014
Crestron Symetrix Dialer Example Introduction This tech-tip describes how to control a Symetrix Radius AEC and telephony interface using a Crestron Pro2-style controller. A complete Symetrix Radius configuration
1. Login to www.ifbyphone.com with your User ID and password. Select Virtual Receptionist from the Basic Services tab.
Virtual Receptionist Virtual Receptionist is a hosted PBX auto attendant service with intelligent routing that automatically greets and routes phone calls based on your office schedule. It gives your company
Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080
Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX
Using Web Security Scanners to Detect Vulnerabilities in Web Services
DSN 2009 Using Web Security Scanners to Detect Vulnerabilities in Web Services Marco Vieira,, Henrique Madeira {mvieira, nmsa, henrique}@dei.uc.pt CISUC Department of Informatics Engineering University
Wildix W04FXO Whitepaper
Wildix W04FXO Whitepaper Thanks to Wildix W04FXO gateway, you can enchance your legacy PBX with Unified Communications capabilities. You can connect up to 4 lines to the W04FXO, each of them can be set
Updated Since : 2007-02-18
Microsoft Exchange Server 2007 Unified Messaging PBX Configuration Note: Panasonic KX-TES824 with AudioCodes MP-11x FXO using Analog lines (In-band DTMF) By : AudioCodes Updated Since : 2007-02-18 READ
Voice Call Addon for Ozeki NG SMS Gateway
Voice Call Addon for Ozeki NG SMS Gateway Document version v.1.0.0.0 Copyright 2000-2011 Ozeki Informatics Ltd. All rights reserved 1 Table of Contents Voice Call Addon for Ozeki NG SMS Gateway Introduction
1 VoIP/PBX Axxess Server
- 1 1 VoIP/PBX Axxess Server The Axxess Server supports comprehensive Voice Over Internet Protocol network services, which are based on the Open Source Asterisk VoIP software. The Axxess Server VoIP telephony
This topic describes dial peers and their applications.
Dial Peers What is Dial Peer? This topic describes dial peers and their applications. What is a Dial Peer? A dial peer is an addressable call endpoint. Dial peers establish logical connections, called
Updated Since : 2007-02-18
Microsoft Exchange Server 2007 Unified Messaging PBX Configuration Note: Panasonic KX-TDA200 with AudioCodes MP-11x FXO using Analog lines (In-band DTMF) By : AudioCodes Updated Since : 2007-02-18 READ
Updated Since : 2007-02-09
Microsoft Exchange Server 2007 Unified Messaging PBX Configuration Note: Avaya S8300 with AudioCodes Mediant 2000 using T1 CAS (In-band DTMF Tones) By : AudioCodes Updated Since : 2007-02-09 READ THIS
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
White Paper Integration of TTY Calls into a Call Center Using the Placeholder Call Technique Updated: February 2007
Overview of Call Centers White Paper Integration of TTY Calls into a Call Center Using the Placeholder Call Technique Updated: February 2007 All organizations have a phone system, but a call center has
Internet Telephony Terminology
Internet Telephony Terminology Understanding the business phone system world can be a daunting task to a lay person who just wants a system that serves his or her business needs. The purpose of this paper
Implementing Database Security and Auditing
Implementing Database Security and Auditing A guide for DBAs, information security administrators and auditors Ron Ben Natan ELSEVIER DIGITAL PRESS Amsterdam Boston Heidelberg London New York Oxford P
A Guide to Connecting to FreePBX
A Guide to Connecting to FreePBX FreePBX is a basic web Graphical User Interface that manages Asterisk PBX. It includes many features available in other PBX systems such as voice mail, conference calling,
Implementing a Digital Answering Machine with a High-Speed 8-Bit Microcontroller
Implementing a Digital Answering Machine with a High-Speed 8-Bit Microcontroller Zafar Ullah Senior Application Engineer Scenix Semiconductor Inc. Leo Petropoulos Application Manager Invox TEchnology 1.0
IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow
IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication
Updated Since : 2007-02-09
Microsoft Exchange Server 2007 Unified Messaging PBX Configuration Note: Siemens HiPath3550 with AudioCodes MP-11x FXO using Analog lines (In-band DTMF) By : AudioCodes Updated Since : 2007-02-09 READ
SIP Trunking using Optimum Business SIP Trunk Adaptor and the Allworx 6x IP PBX 7.1.6.1
ALLWORX SIP Trunking using Optimum Business SIP Trunk Adaptor and the Allworx 6x IP PBX 7.1.6.1 Goal The purpose of this configuration guide is to describe the steps needed to configure the Allworx 6x
NCH Swift Sound IVM Phone Answering Attendant
NCH Swift Sound IVM Phone Answering Attendant This manual has been created for use with IVM version 4.02. More information on other versions of IVM can be found at www.nch.com.au/ivm. IVM Answering Attendant
Cisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved.
Optimizing Converged Cisco Networks (ONT) reserved. Lesson 2.4: Calculating Bandwidth Requirements for VoIP reserved. Objectives Describe factors influencing encapsulation overhead and bandwidth requirements
: AudioCodes. Updated Since : 2007-05-28 READ THIS BEFORE YOU PROCEED
Microsoft Exchange Server 2007 Unified Messaging PBX Configuration Note: Inter-Tel 5000 with the Mediant 2000 Gateway using T1-CAS (In-band DTMF) By : AudioCodes Updated Since : 2007-05-28 READ THIS BEFORE
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
Detecting SQL Injection Vulnerabilities in Web Services
Detecting SQL Injection Vulnerabilities in Web Services Nuno Antunes, {nmsa, mvieira}@dei.uc.pt LADC 2009 CISUC Department of Informatics Engineering University of Coimbra Outline n Web Services n Web
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
IPPBX FAQ. For Firmware Version: V2.0/V3.0 2013-12-11
For Firmware Version: V2.0/V3.0 2013-12-11 Contents 1. IPPBX Access... 3 1.1 How to access IPPBX via SSH?... 3 1.2 How to access IPPBX if I forget the IP of WAN?... 4 1.3 How to retrieve WEB password via
Envox Call Information Manager
Envox Call Information Manager Are you a developer looking for a way to integrate telephone call management and associated customer information into your existing applications? Have your customers expressed
V o i c e Processing S y s t e m
V o i c e Processing S y s t e m Bursting with new and improved messaging features for the Networking age, Panasonic introduces and - two voice processing systems (VPS) with knockout features designed
4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19
4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software
SIP Trunking using Optimum Business SIP Trunk Adaptor and ShoreTel IP PBX Phone System
SHORETEL SIP Trunking using Optimum Business SIP Trunk Adaptor and ShoreTel IP PBX Phone System Goal The purpose of this configuration guide is to describe the steps needed to configure the ShoreTel IP
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
locuz.com Professional Services Security Audit Services
locuz.com Professional Services Security Audit Services Today s Security Landscape Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System layer.
Configuration guide for Switchvox and Cbeyond.
Configuration guide for Switchvox and Cbeyond. This document will guide a Switchvox administrator through configuring the system to utilize Cbeyond s BeyondVoice with SIPconnect service. After you have
Quick Start Guide CREATING A NEW SITE
IVY is our complete control panel for managing you or your customers SIP trunks and hosted PBX settings. This guide will help you get up and running with IVY as quickly as possible. First thing we need
Workforce Management IVR. A multi-service voice platform
WFM Workforce Management IVR Information Sheet Introduction High Level Overview Features Solution Components Industries Applications Call Flows Reporting Implementation and Deployment About Syntellect
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
Deploying Cisco Unified Contact Center Express Volume 1
Deploying Cisco Unified Contact Center Express Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional References Your Training Curriculum General Administration
Inbound Routing with NetSatisFAXTion
Inbound Routing with NetSatisFAXTion Routing Terms DID Direct Inward Dialing (DID) is a service of a local phone company (or local exchange carrier) that provides a block of telephone numbers for calling
Compromising Voice Messaging Systems
Compromising Voice Messaging Systems Kingpin @Stake, Inc. 196 Broadway, Cambridge, MA 02139, USA. http://www.atstake.com E-mail: [email protected] Revision: 1.0 Abstract. Voice mail systems and answering
Configuration Notes 290
Configuring Mediatrix 41xx FXS Gateway with the Asterisk IP PBX System June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 About Mediatrix 41xx Series FXS Gateways...
Enabling Users for Lync services
Enabling Users for Lync services 1) Login to collaborate.widevoice Server as admin user 2) Open Lync Server control Panel as Run As Administrator 3) Click on Users option and click Enable Users option
Enterprise Communication Suite
Enterprise Communication Suite Media Routes is a Canadian company incorporated in the province of Ontario and having head office in Vancouver, British Columbia, Canada. Media Routes is an in-house developer
Metasploit The Elixir of Network Security
Metasploit The Elixir of Network Security Harish Chowdhary Software Quality Engineer, Aricent Technologies Shubham Mittal Penetration Testing Engineer, Iviz Security And Your Situation Would Be Main Goal
To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:
To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: Firewall Settings - you may need to check with your technical department Step 1 Install Hardware Step
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
FOR COMPANIES THAT WANT TO EXPAND AND IMPROVE THEIR TELEPHONE SYSTEM
IP PBX VH-500 FOR COMPANIES THAT WANT TO EXPAND AND IMPROVE THEIR TELEPHONE SYSTEM IP PBX VH-500 The Virtual IP PBX VH-500 is an unified communication system hosted in the cloud, and it's an excellent
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
KX-NS. Cellular Phone as Extension
KX-NS Cellular Phone as Extension Introduction Cellular phone can work as extension. Even when your important customer calls your office phone number and you are out of office, you can answer the call
IP PBX SH-500N WWW.HIPERPBX.COM
IP PBX SH-500N COMPANIES THAT WANT TO EXPAND AND IMPROVE THEIR TELEPHONE SYSTEM IP PBX SH-500N The IP PBX SH-500N is designed for companies that want to expand and improve their telephone system, and/or
MAGIC TH6. System Configuration SW Version 2.000
MAGIC TH6 System Configuration SW Version 2.000 1 Basic Settings Starting the Windows PC Software Line interface settings Operating Mode Audio lines Hold Signal Signal Processing Database Connection 2
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
OfficeServ 7100 IP-PBX. SIP Trunking using the Optimum Business Sip Trunk Adaptor and the Samsung
SIP Trunking using the Optimum Business Sip Trunk Adaptor and the Samsung OfficeServ 7100 IP-PBX 1 Table of Contents 1. Overview 3 2. Prerequisites 3 3. OfficeServ 7100 PBX Configuration 3 3.1 Network
Application Notes Rev. 1.0 Last Updated: January 9, 2015
SBC 1000/2000 Series Configuration Guide with Cisco Unified Call Manager v9.1 for Level 3 Voice Complete SM SIP Trunk Deployments Application Notes Rev. 1.0 Last Updated: January 9, 2015 Contents 1 Document
How Inbound Fax Routing Can Help Reduce Document Distribution Costs and Improve Productivity
Inbound Fax Routing How Inbound Fax Routing Can Help Reduce Document Distribution Costs and Improve Productivity Page 2 Introduction Claims, Collections, Contracts, Invoices, Licenses and Permits, Purchase
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Analogue Telephone User Guide
Analogue Telephone User Guide IP COMMUNICATIONS PLATFORM FOR THE SMALL BUSINESS Specifications subject to change without notice. Facilities described may or may not be supported by your network. This documentation
Voice Over Internet Protocol(VoIP)
Voice Over Internet Protocol(VoIP) By Asad Niazi Last Revised on: March 29 th, 2004 SFWR 4C03 Major Project Instructor: Dr. Kartik Krishnan 1. Introduction The telecommunications companies around the world
Optimizing Converged Cisco Networks (ONT)
Optimizing Converged Cisco Networks (ONT) Module 2: Cisco VoIP Implementations (Deploy) Calculating Bandwidth Requirements for VoIP Objectives Describe factors influencing encapsulation overhead and bandwidth
SIP Trunking using the Optimum Business SIP Trunk adaptor and the AltiGen Max1000 IP PBX version 6.7
SIP Trunking using the Optimum Business SIP Trunk adaptor and the AltiGen Max1000 IP PBX version 6.7 Goal The purpose of this configuration guide is to describe the steps needed to configure the AltiGen
Table of Contents GETTING STARTED... 3. Enter Password Dialog...3 Using Online Help...3 System Configuration Menu...4
Table of Contents DV2000 Configuration - Service Release 3.0 GETTING STARTED... 3 Enter Password Dialog...3 Using Online Help...3 System Configuration Menu...4 SYSTEM CONFIGURATION OVERVIEW... 5 Using
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
2N OfficeRoute. 2N OfficeRoute & Siemens HiPath (series 3000) connected via SIP trunk. Quick guide. www.2n.cz. Version 1.00
2N OfficeRoute 2N OfficeRoute & Siemens HiPath (series 3000) connected via SIP trunk Quick guide Version 1.00 www.2n.cz 1 2N OfficeRoute has these parameters: IP address 192.168.1.120 Incoming port: 5060
COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM
COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM SECURITY MANAGER FEATURE SUPPLEMENT Document No. 6700-A2-GB41-30 February 1998 Copyright 1998 Paradyne Corporation. All rights reserved. Printed in U.S.A.
Overview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
Applications between Asotel VoIP and Asterisk
Applications between Asotel VoIP and Asterisk This document is describing the configuring manner of registering and communicating with Asterisk only. Please visit the official WEB of Asterisk http://www.asterisk,
E I M S - Interactive Voice Response System
E I M S - Interactive Voice Response System Redox Technologies is a pioneer in computer telephony development and IVR service bureaus. We have developed, implemented and maintain no. of applications currently
1Building Communications Solutions with Microsoft Lync Server 2010
1Building Communications Solutions with Microsoft Lync Server 2010 WHAT S IN THIS CHAPTER? What Is Lync? Using the Lync Controls to Integrate Lync Functionality into Your Applications Building Custom Communications
Dial Peer. Example: Dial-Peer Configuration
Configuring Dial Peers Understanding Dial Peers This topic describes dial peers and their applications. Understanding Dial Peers A dial peer is an addressable call endpoint. Dial peers establish logical
Automatic Routing of Inbound Faxes With Castelle Network Fax Servers. Fractional T1, Full T1, Fractional E1, Full E1, ISDN, DID and PBX Integration
Automatic Routing of Inbound Faxes With Castelle Network Fax Servers Fractional T1, Full T1, Fractional E1, Full E1, ISDN, DID and PBX Integration TABLE OF CONTENTS Benefits of Automatic Fax Routing 3
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Step into the next level of office communication
Step into the next level of office communication Agenda ConVox Hosted IP-PBX Hosted IP-PBX v/s PBX comparison Setup comparison Comprehensive Features Admin Features Screen shot Summary of benefit comparison
Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard
Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard August 2014 Table of Contents Introduction... 1 PCI Data Security Standard...
Enhanced VoIP Based Virtual PC Troubleshooting
International Journal of Scientific & Engineering Research, Volume 3, Issue 4, April-2012 1 Enhanced VoIP Based Virtual PC Troubleshooting U.K.D.S.N. Dayananda, W.N.K.L. Abeyrathna, S.M.C.D. Samarakoon,
Verifone Terminal FAQs (version D413):
Verifone Terminal FAQs (version D413): Processing Transactions: 1. Why can t I find the product that I want to sell? To view your products on your terminal: a. Enter your clerk ID b. Choose the product
Release Notes for NeoGate TA410/TA810 41.18.0.X
Release Notes for NeoGate TA410/TA810 41.18.0.X ===Firmware Version: V41.18.0.11==== Applicable Model: NeoGate TA410/TA810 Release Date: January 15th, 2015 http://www.yeastar.com1/6 1. New Features 1.
13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access
The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning
SIP Trunking using the Optimum Business SIP Trunk Adaptor and the NEC DSX-40 IP-PBX
SIP Trunking using the Optimum Business SIP Trunk Adaptor and the NEC DSX-40 IP-PBX Table of Contents Overview 3 Prerequisites 3 NEC DSX-40 Configuration 4 Network Settings 4 SIP Programming 5 Extensions/DID
Direct IP Calls. Quick IP Call Mode
Unicorn3112 Tips Direct IP Calls...1 Quick IP Call Mode...1 PSTN Pass Through...2 VoIP-to-PSTN Calls...2 PSTN-to-VoIP Calls...3 Route Calls to PSTN...4 Forward Calls to PSTN...4 Forward Calls to VoIP...4
PBX Fraud Educational Information for PBX Customers
PBX Fraud Educational Information for PBX Customers Telephone Hackers Hit Where It Hurts: Your Wallet Telephone hacking is unauthorized or fraudulent activities that can affect your telephone system, and
IVR (Interactive Voice Response) Operation Manual. Copyright 2012 Agile Networks, Inc. All Rights Reserved.
IVR (Interactive Voice Response) Operation Manual Copyright 2012 Agile Networks, Inc. All Rights Reserved. Table of Contents ddw Settings (Setting User Information) An Agile Cloud PBX Option feature. This
VIDEO IVR VAS & Customer Care
Marketing Overview Plan Overview VIDEO IVR VAS & Customer Care January 26, 2011 April 2010 xx, APEX 2010 Voice / Page Communications, 1 Inc. All rights reserved. Marketing Who Plan is APEX? Overview VIDEO
Manual. ABTO Software
Manual July, 2011 Flash SIP SDK Manual ABTO Software TABLE OF CONTENTS INTRODUCTION... 3 TECHNICAL BACKGROUND... 6 QUICK START GUIDE... 7 FEATURES OF FLASH SIP SDK... 10 2 INTRODUCTION Trends indicate
Integration of GSM Module with PC Mother Board (GSM Trunking) WHITE/Technical PAPER. Author: Srinivasa Rao Bommana (srinivasrao.bommana@wipro.
(GSM Trunking) WHITE/Technical PAPER Author: Srinivasa Rao Bommana ([email protected]) Table of Contents 1. ABSTRACT... 3 2. INTRODUCTION... 3 3. PROPOSED SYSTEM... 4 4. SOLUTION DESCRIPTION...
SIP SOFTPHONE SDK Microsoft Windows Desktop OS
SIP SOFTPHONE SDK Microsoft Windows Desktop OS TECHNICAL DOCUMENTATION VERSION 2.2 June 2015 Page 1 of 187 CONTENTS INTRODUCTION AND QUICK START... 6 EXPORTED FUNCTIONS... 7 InitializeEx()... 7 RegisterToProxy()...
This module explains the Microsoft Dynamics NAV architecture and its core components.
MICROSOFT DYNAMICS NAV COURSE OUTLINE 1) MICROSOFT DYNAMICS NAV INSTALLATION & CONFIGURATION Module 1: Architecture This module explains the Microsoft Dynamics NAV architecture and its core components.
VoiceXML Tutorial. Part 1: VoiceXML Basics and Simple Forms
VoiceXML Tutorial Part 1: VoiceXML Basics and Simple Forms What is VoiceXML? XML Application W3C Standard Integration of Multiple Speech and Telephony Related Technologies Automated Speech Recognition
SIP Trunk Configuration for Broadvox
Document version: 1.0 Modification date: December 09, 2009 Prerequisites The Broadvox customer service provides the following communication parameters: Parameter Example Explanation BTN & Username: 4801234560
