VoIP Wars: Destroying Jar Jar Lync
|
|
|
- Jason Lane
- 9 years ago
- Views:
Transcription
1 VoIP Wars: Destroying Jar Jar Lync Fatih Ozavci 25 October 2015 Compliance, Protection & Business Confidence Sense of Security Pty Ltd Sydney Melbourne T: Level 8, 66 King Street Level 15, 401 Docklands Drv T: +61 (0) Sydney NSW 2000 Australia Docklands VIC 3008 Australia F: +61 (0) ABN:
2 Speaker Fatih Ozavci, Principal Security Consultant VoIP & phreaking Mobile applications and devices Network infrastructure CPE, hardware and IoT hacking Author of Viproy, Viproxy and VoIP Wars research series Public speaker and trainer Blackhat USA, Defcon, HITB, AusCert, Troopers, Ruxcon 2
3 Previously on VoIP Wars 3
4 Current research status This is only the first stage of the research Analysing the security requirements of various designs Developing a tool to assess communication and voice policies in use drive official client to attack other clients and servers debug communication for further attacks Watch this space Viproy with Skype for Business authentication support Potential vulnerabilities to be released 4
5 Agenda 1. Modern threats targeting UC on Skype for Business 2. Security requirements for various implementations 3. Security testing using Viproxy 4. Demonstration of vulnerabilities identified CVE , CVE , CVE
6 Security requirements for UC Corporate Communication Commercial Services Messaging MITM VLAN Hopping Trust Relationships Skinny SIP CDP/DTP Attacks Voic Proxy Call Spoofing DHCP Snooping Physical Security Botnets File/Screen Sharing Device Tampering Encryption Mobile/Desktop Clients DDoS Authentication Hosted VoIP Toll Fraud Call Centre Competitors Sandbox Mobile/Desktop Clients Isolation Federation SSO WebRTC Encryption 6 Management Hosted & Distributed Networks
7 7 Modern threats targeting UC
8 Skype for Business Microsoft Live Communications 2005 Microsoft Office Communicator 2007 Microsoft Lync Microsoft Skype for Business
9 UC on Skype for Business Active Directory, DNS (SRV, NAPTR/Enum) and SSO Extensions to the traditional protocols SIP/SIPE, XMPP, OWA/Exchange PSTN mapping to users Device support for IP phones and teleconference systems Mobile services Not only for corporate communication Call centres, hosted Lync/Skype services Office 365 online services, federated services 9
10 VoIP basics 1- REGISTER OK Client A 2- INVITE Trying Skype for Business 2015 SRTP (AES) 4- ACK OK 3- INVITE OK RTP Proxy SRTP (AES) RTP Proxy SRTP (AES) Client B 10
11 Corporate communication Windows 2012 R2 Domain Controller Windows 2012 R2 Exchange & OWA Mobile Devices Skype for Business 2015 SIP/TLS? Laptops Phones & Teleconference Systems PSTN Gateway SIP Trunk Services: Voice and video calls Instant messaging Presentation and collaboration File and desktop sharing Public and private meetings 11
12 Federated communication Mobile ABC Federation communication SIP/TLS? Mobile XYZ Laptop ABC Skype for Business 2015 ABC Enterprise Skype for Business 2015 Edge Server ABC Enterprise Skype for Business 2015 XYZ Enterprise Services: Federation connections (DNS, Enum, SIP proxies) Skype for Business external authentication Connecting the users without individual setup Public meetings, calls and instant messaging DNS & Enum Services DNS Server 12
13 Supported client features 13
14 Supported client features Give control? Give control? 14
15 Security of Skype for Business SIP over TLS is enforced for clients by default SRTP using AES is enforced for clients by default SIP replay attack protections are used on servers Responses have a signature of the critical SIP headers Content itself and custom headers are not in scope Clients validate the server response signatures SIP trunks (PSTN gateway) security TLS enabled and IP restricted No authentication support 15
16 Research and vulnerabilities related Defcon 20 The end of the PSTN as you know it Jason Ostrom, William Borskey, Karl Feinauer Federation fundamentals, Enumerator, Lyncspoof Remote command execution through vulnerabilities on the font and graphics libraries (MS15-080, MS15-044) Targeting Microsoft Lync users with malwared Microsoft Office files Denial of service and XSS vulnerabilities (MS14-055) 16
17 Security testing 3 ways to conduct security testing Compliance and configuration analysis MITM analysis (Viproxy 2.0) Using a custom security tester (Viproy 4.0 is coming soon) Areas to focus on Identifying design, authentication and authorisation issues Unlocking client restrictions to bypass policies Identifying client and server vulnerabilities Testing business logic issues, dial plans and user rights 17
18 Discovering Skype for Business Autodiscovery features Autodiscovery web services Subdomains and DNS records (SRV, NAPTR) Web services Authentication, Webtickets and TLS web services Meeting invitations and components Skype for Business web application Active Directory integration Information gathering via server errors 18
19 Corporate communication policy Design of the communication infrastructure Phone numbers, SIP URIs, domains, federations, gateways Client type, version and feature enforcements Meeting codes, security, user rights to create meetings Open components such as Skype for Business web app Feature restrictions on clients File, content and desktop sharing restrictions User rights (admin vs user) Encryption design for signalling and media 19
20 Corporate communication policy The default/custom policies should be assigned to users and groups 20
21 Corporate communication policy Meeting rights to be assigned by users Policies assigned are in use 21
22 SRTP AES implementation SRTP using AES is enforced for clients (No ZRTP) SIP/TLS is enforced for clients SIP/TLS is optional for SIP trunks and PSTN gateways Compatibility challenges vs Default configuration SIP/TCP gateways may leak the SRTP encryption keys a=ice-ufrag:x30m a=ice-pwd:ow7iyhxiaor19uh05bao7bmj a=crypto:2 AES_CM_128_HMAC_SHA1_80 inline:gu +c81xctwoahro7cj9un6wqw7qpjndjxfzsofl8 2^31 1:1 22
23 MITM analysis using Viproxy Challenges SIP/TLS is enabled by default Microsoft Lync clients validate the TLS cert Compression is enabled, not easy to read Viproxy 2.0 A standalone Metasploit module Supports TCP/TLS interception with TLS certs Disables compression Modifies the actions of an official client Provides a command console for real-time attacks 23
24 Viproxy test setup Debugging the protocol and collecting samples Basic find & replace with fuzzing support Unlocking restricted client features Bypassing communication policies in use Injecting malicious content Windows 10 Skype for Business Clients MS Lync for Mac 2011 Client to be used for attacks Viproxy 2.0 Windows 2012 R2 Skype for Business 2015 Server 24
25 Analysing the corporate policy Instant Messaging (IM) restrictions File type filters for the file transfers URL filters for the messaging Set-CsClientPolicy (DisableEmoticons, DisableHtmlIm, DisableRTFIm) Call forwarding rights Meeting rights Federated attendees Public attendees Clients default meeting settings Insecure client versions allowed 25
26 Attack surfaces on IM and calls Various content types (HTML, JavaScript, PPTs) File, desktop and presentation sharing Limited filtering options (IIMFilter) File Filter (e.g. exe, xls, ppt, psh) URL Filter (e.g. WWW, HTTP, call, SIP) Set-CsClientPolicy (DisableHtmlIm, DisableRTFIm) Clients process the content before invitation Presence and update messages Call and IM invitation requests Mass compromise via meetings and multiple endpoints 26
27 Parsing errors and exceptions to be shared later 27
28 Bypassing URL filter in IM to be shared later 28
29 URL filter bypass Reverse browser visiting Windows 10 Skype for Business Clients MS Lync for Mac 2011 Client to be used for attacks Viproxy 2.0 Windows 2012 R2 Skype for Business 2015 Server 29
30 Sending INVITEs w/ HTML/XSS to be shared later 30
31 31 Fake Skype update via INVITE
32 Multi endpoint communication Meeting requests Private meetings, Open meetings, Web sessions Multi callee invitations and messages Attacks do not need actions from the attendees/callees Injecting endpoints to the requests XML conference definitions in the INVITE requests INVITE headers Endpoint headers 3 rd party SIP trunk, PSTN gateway or federation 32
33 Sending messages w/ HTML/XSS to be shared later 33
34 Mass compromise of clients BEEF Framework Waiting for the XSS hooks Reverse browser hooks Windows 10 Skype for Business Clients SIP Trunk PSTN Gateway Viproy 4.0 CentOS Linux Freeswitch Windows 2012 R2 Skype for Business 2015 Server 34
35 35 Mass compromise of clients
36 Second stage of the research Analysis of mobile clients and SFB web app SFB meeting security and public access federation security and trust analysis Further analysis of the crashes and parsing errors identified for exploitation Social engineering templates for Viproxy and Viproy Viproy 4.0 with Skype for Business authentication, fuzzing and discovery support 36
37 Securing Unified Communications Secure design is always the foundation Physical security of endpoints (e.g. IP phones, teleconference rooms) should be improved Networks should be segmented based on their trust level Authentication and encryption should be enabled Protocol vulnerabilities can be fixed with secure design Disable unnecessary IM, call and meeting features Software updates should be reviewed and installed 37
38 Previously on VoIP Wars VoIP Wars I: Return of the SIP (Defcon, Cluecon, Ruxcon, Athcon) Modern VoIP attacks via SIP services explained SIP trust hacking, SIP proxy bounce attack and attacking mobile VoIP clients demonstrated VoIP Wars II : Attack of the Cisco phones (Defcon, Blackhat USA) 30+ Cisco HCS vulnerabilities including 0days Viproy 2.0 with CUCDM exploits, CDP and Skinny support Hosted VoIP security risks and existing threats discussed The Art of VoIP Hacking Workshop (Defcon, Troopers, AusCERT, Kiwicon) Live exploitation exercises for several VoIP vulnerabilities 3 0day exploits for Vi-vo and Boghe VoIP clients New Viproy 3.7 modules and improved features 38
39 References Viproy VoIP Penetration and Exploitation Kit Author : Homepage : Github : VoIP Wars : Attack of the Cisco Phones VoIP Wars : Return of the SIP 39
40 40
41 41 Questions
42 Thank you Head office is level 8, 66 King Street, Sydney, NSW 2000, Australia. Owner of trademark and all copyright is Sense of Security Pty Ltd. Neither text or images can be reproduced without written permission. T: T: +61 (0) F: +61 (0) [email protected] 42
A Brief Security Analysis of Microsoft Skype for Business
A Whitepaper Prepared by Sense of Security A Brief Security Analysis of Microsoft Skype for Business Version No: 1.0 Document No: SFB-Tech-1215 Author: Fatih Ozavci 17 December 2015 Sense of Security is
VOIP WARS: THE PHREAKERS AWAKEN. Fatih Ozavci @fozavci Managing Consultant Context Information Security
VOIP WARS: THE PHREAKERS AWAKEN Fatih Ozavci @fozavci Managing Consultant Context Information Security Fatih Ozavci, Managing Consultant VoIP & phreaking Mobile applications and devices Network infrastructure
Viproy Reloaded 2.0. Compliance, Protection & Business Confidence. Melbourne Level 10, 401 Docklands Drv
Viproy Reloaded 2.0 Compliance, Protection & Business Confidence Sense of Security Pty Ltd Sydney Level 8, 66 King Street Melbourne Level 10, 401 Docklands Drv T: 1300 922 923 T: +61 (0) 2 9290 4444 [email protected]
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco Phones Compliance, Protection & Business Confidence Sense of Security Pty Ltd Sydney Level 8, 66 King Street Melbourne Level 10, 401 Docklands Drv T: 1300 922 923 T: +61
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco Phones Compliance, Protection & Business Confidence Sense of Security Pty Ltd Sydney Level 8, 66 King Street Melbourne Level 10, 401 Docklands Drv T: 1300 922 923 T: +61
Practical VoIP Hacking with Viproy
Practical VoIP Hacking with Viproy 9 December 2014 Compliance, Protection & Business Confidence Sense of Security Pty Ltd Sydney Level 8, 66 King Street Sydney NSW 2000 Australia Melbourne Level 10, 401
VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP Fatih Özavcı Security Consultant @ Sense of Security (Australia) www.senseofsecurity.com.au @fozavci # whois Security Consultant @ Sense of Security (Australia) 10+ Years
VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP Fatih Özavcı Information Security Researcher & Consultant fatih.ozavci at viproy.com viproy.com/fozavci # whois Information Security Consultant @ Viproy / Turkey 10+ Years
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
Hacking SIP Services Like a Boss. Fatih Özavcı Information Security Researcher & Consultant
Hacking SIP Services Like a Boss Fatih Özavcı Information Security Researcher & Consultant fatih.ozavci at viproy.com viproy.com/fozavci #direngezi 2 #direngezi 3 #direngezi 4 About Me Information Security
PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com
PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure
Cconducted at the Cisco facility and Miercom lab. Specific areas examined
Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
Module 6. Designing and Deploying External Access. MVA Jump Start
Module 6 Designing and Deploying External Access MVA Jump Start Module Overview Conferencing and External Capabilities of Lync Server 2013 Planning for IM and Presence Federation Designing Edge Services
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
Quick Setup Guide. Integration of Aastra MX-ONE / Aastra 700 and Microsoft Lync Server 2010
Quick Setup Guide Integration of Aastra MX-ONE / Aastra 700 and Microsoft Lync Server 2010 Aastra MX-ONE TM and Aastra 700 running Telephony Server software V.4.1 SP3 and later Aastra Telecom Sweden AB
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
Polycom RealPresence Access Director System
Release Notes 3.1 January 2014 3725-78700-001C Polycom RealPresence Access Director System Polycom announces the release of the Polycom RealPresence Access Director system, version 3.1. This document provides
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
UC and SIP Trunking Luncheon. Sponsored by:
UC and SIP Trunking Luncheon Sponsored by: Speakers and Agenda Topic Presenter Opening comments, introductions and Jeff Neikirk (Verizon) market updates Verizon Managed Services for Enterprise Brent Carter
Penetration Testing SIP Services
Penetration Testing SIP Services Using Metasploit Framework Writer Version : 0.2 : Fatih Özavcı (fatih.ozavci at viproy.com) Introduction Viproy VoIP Penetration Testing Kit Sayfa 2 Table of Contents 1
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
4xx High Definition IP Phones. Deployment Guide. AudioCodes 420HD Compatible IP Phone Tested and Qualified for Microsoft Lync. Document #: LTRT-21920
AudioCodes 4xx High Definition IP Phones Deployment Guide AudioCodes 420HD Compatible IP Phone Tested and Qualified for Microsoft Lync Document #: LTRT-21920 Deployment Guide Contents Table of Contents
How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack
DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014 Protecting the Information that Secures the Homeland This page
Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems
Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems VOIP Components Common Threats How Threats are Used Future Trends Provides basic network connectivity and transport
Avaya SBCE 6.3 Security Configuration and Best
Avaya SBCE 6.3 Security Configuration and Best Practices Guide Release 6.3 Issue 1.0 October 2014 1 2014 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information
Application Note. Onsight Connect Network Requirements V6.1
Application Note Onsight Connect Network Requirements V6.1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview... 3 1.2 Onsight Connect Servers... 4 Onsight Connect Network
Building the Lync Security Eco System in the Cloud Fact Sheet.
Building the Lync Security Eco System in the Cloud Fact Sheet. [Type text] The need to secure all entries to the fastest growing Unified Communication application (UC) and allow for complete inter-operability
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Threats to be considered (1) ERSTE GROUP
VoIP-Implementation Lessons Learned Philipp Schaumann Erste Group Bank AG Group IT-Security [email protected] http://sicherheitskultur.at/ Seite 1 Threats to be considered (1) Eavesdropping
Acano solution. Third Party Call Control Guide. March 2015 76-1055-01-E
Acano solution Third Party Call Control Guide March 2015 76-1055-01-E Contents Contents 1 Introduction... 3 1.1 How to Use this Guide... 3 1.1.1 Commands... 4 2 Example of Configuring a SIP Trunk to CUCM...
Hacking Trust Relationships of SIP Gateways
Hacking Trust Relationships of SIP Gateways Author : Fatih Özavcı Homepage : gamasec.net/fozavci SIP Project Page : github.com/fozavci/gamasec-sipmodules Version : 0.9 Hacking Trust Relationship Between
StarLeaf Connectivity Services. Deployment Guide
StarLeaf Connectivity Services Deployment Guide 31 July 2015 Contents Terminology 4 Why are Connectivity Services needed? 4 What are Connectivity Services? 4 Calling scenarios 5 Architecture 7 Security
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Introducing Cisco Voice and Unified Communications Administration Volume 1
Introducing Cisco Voice and Unified Communications Administration Volume 1 Course Introduction Overview Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your
Voice over IP Security
Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with
hackers 2 hackers conference III voip (in)security luiz eduardo cissp, ceh, cwne, gcih
luiz eduardo cissp, ceh, cwne, gcih who am I? networking guy security guy employed by Aruba Networks wlan network for defcon, blackhat & ccc regular speaker at cons founder, dc55.org and... agenda intro
Oracle Communications WebRTC Session Controller: Basic Admin. Student Guide
Oracle Communications WebRTC Session Controller: Basic Admin Student Guide Edition 1.0 April 2015 Copyright 2015, Oracle and/or its affiliates. All rights reserved. Disclaimer This document contains proprietary
The SIP School- 'Mitel Style'
The SIP School- 'Mitel Style' Course Objectives This course will take delegates through the basics of SIP into some very technical areas and is suited to people who will be installing and supporting SIP
Cisco Expressway Series
Data Sheet Cisco Expressway Series Advanced Collaboration Gateways for Simple and Secure Unified Communications Product Overview Cisco Expressway Series gateways for Cisco Unified Communications Manager
Whitepaper: Microsoft Office Communications Server 2007 R2 and Cisco Unified Communications Manager Integration Options
Whitepaper: Microsoft Office Communications Server 2007 R2 and Cisco Unified Communications Manager Integration Options Document Summary This document provides information on several integration scenarios
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
Microsoft 70-336 Exam-Osler
Microsoft 70-336 Exam-Osler Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 ht t p:/ / w w w.gratisexam.com/ Exam A QUESTION 1 You have a Lync Server 2013 infrastructure that contains
Unified Communications in RealPresence Access Director System Environments
[Type the document title] 3.0 October 2013 3725-78704-001B1 Deploying Polycom Unified Communications in RealPresence Access Director System Environments Polycom Document Title 1 Trademark Information Polycom
Polycom Unified Communications Deployment Guide for Microsoft Environments
Polycom Unified Communications Deployment Guide for Microsoft Environments Wave 4 February 2011 3725-00000-003C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated
Version 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)
Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................
Alcatel OmniPCX Enterprise R11 Supported SIP RFCs
Alcatel OmniPCX Enterprise R11 Supported SIP RFCs Product & Offer Large & Medium Enterprise Ref: 8AL020033225TCASA ed3 ESD/ Mid & Large Enterprise Product Line Management October 2013 OmniPCX Enterprise
How to make free phone calls and influence people by the grugq
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth
CyberData VoIP V2 Speaker with VoIP Clock Kit Configuration Guide for OmniPCX Enterprise
CyberData VoIP V2 Speaker with VoIP Clock Kit Configuration Guide for OmniPCX Enterprise CyberData Corporation 2555 Garden Road Monterey, CA 93940 T:831-373-2601 F: 831-373-4193 www.cyberdata.net 2 Introduction
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Integrating Avaya Aura Presence Services with Microsoft OCS
Integrating Avaya Aura Presence Services with Microsoft OCS 6.1 Service Pack 5 December 2012 Contents Chapter 1: Introduction... 5 Overview - OCS/Lync integration... 5 The Presence Services server and
April 11, 2011. (Revision 2)
Passive Vulnerability Scanning Overview April 11, 2011 (Revision 2) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of
KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60
SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION Page 54 of 60 UNIFIED COMMUNICATION SYSTEM (VOIP) PROPOSAL FOR KISUMU JUDICIARY COURTS. 1.0 PARTICULARS
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
Fabrizio Volpe. MVP Directory Services MCITP Lync 2010. @Fabriziovlp. [email protected]. http://www.linkedin.com/in/fabriziov
Fabrizio Volpe MVP Directory Services MCITP Lync 2010 @Fabriziovlp [email protected] http://www.linkedin.com/in/fabriziov Agenda Intro to Lync Server Lync Features : Presence Integration with Sharepoint,
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
Application Security Testing
Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the
IM and Presence. Skype for Business 2015 users. Legend. Skype for Business 2015 users. Active Directory Domain Services.
TP: 443 HTTP: 80 SIP/TLS: 5061 SIP/TLS: 5061 HTTPS: 443 IM and Presence SIP traffic: signaling and IM XMPP traffic HTTPS traffic MSMQ traffic LS traffic HTTPS: 4443 Director proxies Web traffic to destination
SIP Proxy. SIP Proxy. Bicom SYSTEMS. SIP Proxy... Advanced Simplicity
Session border controller solution offering high performance, security and SIP compliance connectivity. 1 DIAGRAM : Registration SIP Client registration for all users (, Business, Hosted PBXware and Wholesale)
Sense of Security VoIP Security Testing Training
Sense of Security VoIP Security Testing Training Fatih Ozavci Christos Archimandritis 8 August 2015 Compliance, Protection & Business Confidence Sense of Security Pty Ltd Sydney Level 8, 66 King Street
Firewall Testing Methodology W H I T E P A P E R
Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness
SIP A Technology Deep Dive
SIP A Technology Deep Dive Anshu Prasad Product Line Manager, Mitel June 2010 Laith Zalzalah Director, Mitel NetSolutions What is SIP? Session Initiation Protocol (SIP) is a signaling protocol for establishing
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Secured Communications using Linphone & Flexisip
Secured Communications using Linphone & Flexisip Solution description Office: Le Trident Bat D 34, avenue de l Europe 38100 Grenoble France Tel. : +33 (0)9 52 63 65 05 Headquarters: 12, allée des Genêts
How To Implement A Cisco Vip From Scratch
Overview of Cisco VoIP Infrastructure Solution for SIP The Cisco VoIP Infrastructure Solution for SIP implements a voice-over-packet network design using SIP to provide telephony services. It lays the
SIP Trunking with Microsoft Office Communication Server 2007 R2
SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic
TraceSim 3.0: Advanced Measurement Functionality for Secure VoIP Networks and Simulation of Video over IP No part of this brochure may be copied or published by means of printing, photocopying, microfilm
Infrastructure developments to build on AARNet s VoIP and Video services. Leon Li. Overview. Enterprise UC Network. Beta program.
Infrastructure developments to build on AARNet s VoIP and Video services Leon Li IT Engineer QUESTnet, Gold Coast July 2009 Overview Enterprise UC Network Demonstration Beta program What we have today
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
SIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
VoIP Security: How Secure is Your IP Phone?
VoIP Security: How Secure is Your IP Phone? Dan York, CISSP Director of IP Technology, Office of the CTO Chair, Mitel Product Security Team Member, Board of Directors, VoIP Security Alliance (VOIPSA) ICT
Configuring SIP Support for SRTP
Configuring SIP Support for SRTP This chapter contains information about the SIP Support for SRTP feature. The Secure Real-Time Transfer protocol (SRTP) is an extension of the Real-Time Protocol (RTP)
Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
Deployment Guide. Microsoft Lync 2013 and Citrix NetScaler Deployment Guide. citrix.com
Deployment Guide Microsoft Lync 2013 and Citrix NetScaler Deployment Guide Table of contents Introduction 3 Overview of Microsoft Lync 2013 3 Lync Server Roles 3 Standard Edition Server 3 Front-End Server
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Sense of Security VoIP Security Testing Training
Sense of Security VoIP Security Testing Training Fatih Ozavci Christos Archimandritis 8 August 2015 Compliance, Protection & Business Confidence Sense of Security Pty Ltd Sydney Level 8, 66 King Street
How To Test For Security On A Vlan Vlan On A Cell Phone At A Hotel Room (For A Hotel)
VoIP Penetration Testing Lessons learned, tools, techniques Presented to: SANS WhatWorks in Penetration Testing & Web Application Attacks 2009 Jason Ostrom Director, VIPER Lab Agenda Introduction About
ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS
ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ALCATEL-LUCENT OPENTOUCH SESSION BORDER CONTROLLER A SECURE SOLUTION FOR BORDERLESS CONVERSATIONS APPLICATION
LifeSize Transit Deployment Guide June 2011
LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Implementing Cisco Collaboration Applications **Part of the CCNP Collaboration certification track**
Course: Duration: Price: $ 3,795.00 Learning Credits: 38 Certification: Implementing Cisco Collaboration Applications Implementing Cisco Collaboration Applications**Part of the CCNP Collaboration certification
Avaya Aura SIP Trunking Training
Avaya Aura SIP Trunking Training 5 Day Course Lecture & Demo WHO NEEDS TO ATTEND This class is suited to those who are new to administering Avaya systems and would like to know more about the SIP protocol.
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or
Web Request Routing. Technical Brief. What s the best option for your web security deployment?
Web Request Routing and Redirection What s the best option for your web security deployment? Choosing the right method for redirecting traffic to your secure web gateway is absolutely essential to maximize
640-461: Introducing Cisco Voice and Unified Communications Administration (ICOMM) v8.0 Course Introduction
640-461: Introducing Cisco Voice and Unified Communications Administration (ICOMM) v8.0 Course Introduction Course Introduction Module 01 - Overview of Cisco Unified Communications Solutions Understanding
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent
GSN Cloud Contact Centre Voice & Telephony Datasheet
GSN Cloud Contact Centre Voice & Telephony Datasheet Commercial in Confidence Reference: GSN CCC - Voice & Telephony Version: 1.1 Global Speech Networks Pty Ltd Level 8, 636 St Kilda Road Melbourne, Victoria
Cisco EXAM - 300-075. Implementing Cisco IP Telephony and Video, Part 2 (CIPTV2) Buy Full Product. http://www.examskey.com/300-075.
Cisco EXAM - 300-075 Implementing Cisco IP Telephony and Video, Part 2 (CIPTV2) Buy Full Product http://www.examskey.com/300-075.html Examskey Cisco 300-075 exam demo product is here for you to test the
Preparatory Meeting for Phase 2 of Philippine National ENUM Trial
Preparatory Meeting for Phase 2 of Philippine National Trial IP Telephony Group Advanced Science and Technology Institute Department of Science and Technology December 12, 2005 NCC-CICT Dialing Scheme
