NEW!!! Industry s only Comprehensive VoIP Security Boot Camp

Similar documents
Session Initiation Protocol (SIP) Vulnerabilities. Mark D. Collier Chief Technology Officer SecureLogix Corporation

Basic Vulnerability Issues for SIP Security

hackers 2 hackers conference III voip (in)security luiz eduardo cissp, ceh, cwne, gcih

Protect Yourself Against VoIP Hacking. Mark D. Collier Chief Technology Officer SecureLogix Corporation

The SIP School- 'Mitel Style'

Troubleshooting Voice Over IP with WireShark

Voice Over IP (VoIP) Denial of Service (DoS)

Security issues in Voice over IP: A Review

VoIP Security regarding the Open Source Software Asterisk

PENTEST. Pentest Services. VoIP & Web.

VOIP TELEPHONY: CURRENT SECURITY ISSUES

Telephony Denial of Service (TDoS) Attacks. Dan York, CISSP Chair, VoIP Security Alliance

An outline of the security threats that face SIP based VoIP and other real-time applications

2- Technical Training (9 weeks) 3- Applied Project (3 weeks) 4- On Job Training (OJT) (4 weeks)

Application Notes Rev. 1.0 Last Updated: February 3, 2015

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

VoIP Security Methodology and Results. NGS Software Ltd

Application Notes Rev. 1.0 Last Updated: January 9, 2015

VOICE OVER IP SECURITY

EarthLink Business SIP Trunking. Switchvox SMB 5.5 & Adtran SIP Proxy Implementation Guide

Enumerating and Breaking VoIP

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week

A Model-based Methodology for Developing Secure VoIP Systems

How to make free phone calls and influence people by the grugq

HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION

Threat Mitigation for VoIP

How To Implement A Cisco Vip From Scratch

VOIP Attacks On The Rise

PETER CUTLER SCOTT PAGE. November 15, 2011

Voice over IP Security

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security

VoIP Phreaking Introduction to SIP Hacking. Hendrik Scholz 22C3, Berlin, Germany

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Ingate Firewall/SIParator SIP Security for the Enterprise

The Trivial Cisco IP Phones Compromise

Recommended IP Telephony Architecture

Malicious Behavior in Voice over IP Infrastructure

WHITE PAPER. Testing Voice over IP (VolP) Networks

Formación en Tecnologías Avanzadas

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf (Team Lead) Imran Bashir Khadija Akram

Conducting an IP Telephony Security Assessment

Avaya IP Office 8.1 Configuration Guide

SIP Security Controllers. Product Overview

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Security & Reliability in VoIP Solution

Storming SIP Security

Securing Enterprise VoIP. VoIP Vulnerabilities Patrick Young CEO Arlinx Inc.

The SIP School- 'Mitel Style'

SIP Trunking Configuration with

Chapter 2 PSTN and VoIP Services Context

Hosted PBX Platform-asa-Service. Offering

Securing SIP Trunks APPLICATION NOTE.

SIP Trunking with Microsoft Office Communication Server 2007 R2

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

Manual. ABTO Software

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

Security and Risk Analysis of VoIP Networks

Ram Dantu. VOIP: Are We Secured?

SS7 & LTE Stack Attack

Voice over IP Basics for IT Technicians

Course 4: IP Telephony and VoIP

VoIP SPAM and a Defence against this Type of Threat

Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment

Challenges and opportunities for Open Source solutions

SIP Penetration Testing in CESNET Best Practice Document

DEPLOYING VoIP SECURELY

Voice over IP (VoIP) Basics for IT Technicians

How to Configure the Avaya IP Office 6.1 for use with Integra Telecom SIP Solutions

Best Practices for Securing IP Telephony

Voice over IP Fundamentals

VoIP Security Threats and Vulnerabilities

An Overview on Security Analysis of Session Initiation Protocol in VoIP network

Hands on VoIP. Content. Tel +44 (0) Introduction

Voice Over IP and Firewalls

IP PBX using SIP. Voice over Internet Protocol

Threats to be considered (1) ERSTE GROUP

How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions

General Guidelines for SIP Trunking Installations

EarthLink Business SIP Trunking. NEC SV8100 IP PBX Customer Configuration Guide

SIP A Technology Deep Dive

SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference

Application Note Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking

SIP Proxy Robustness against DoS Attacks

EarthLink Business SIP Trunking. NEC SV8300 IP PBX Customer Configuration Guide

Frequently Asked Questions about Integrated Access

IP Telephony Deployment Models

How to Configure the NEC SV8100 for use with Integra Telecom SIP Solutions

Cisco Advanced Services for Network Security

VmSat (VoIP monitoring & Security assessment tool)

IP Phone Security: Packet Filtering Protection Against Attacks. Introduction. Abstract. IP Phone Vulnerabliities

Functional Specifications Document

Transcription:

NEW!!! Industry s only Comprehensive VoIP Security Boot Camp IP 3, Inc. the nation s leading trainer for Securing Emerging Technologies has partnered with Salare Security to launch one of the most intense VoIP Security Boot Camp in the industry. We have combined Online Learning + Self Study + Hands-on Labs to provide the most powerful learning experience. Course Description: VoIP deployments are entering the enterprise at a rapid rate every day. Many industry leaders are considering the advantages of data and telecommunications convergence, but have overlooked the concept of adequate security and vulnerability issues which comes with deployment. Every segment of the market and every technology professional will find themselves in need of a greater understanding of VoIP and the tools to keep the network safe from intruders. This course consists of 3 hours of Pre Course Webinars that will lay the foundation of Telephony and Cyber Security for the non telephony professional. You will then attend 2 full days of Hands-on Labs at the Illinois Institute of Technology. The following is a sample of the lab Assessment Tools: SIP Assesment Tools ithink Test FlowCoder: SiPCPE n-evaluate SIP infrastructure protocol using inserted SIP messages. Media Stream Assessment Tools vunneler exploit-exfiltrate non-voice information through the VoIP media channel. RTP Assessment Tools Vo-2IP-with Vo2IP, you can establish a hidden conversation by embedding further compressed voice data into regular PCM-based voice traffic (i.e. G.711 codec). To complete the Boot Camp you will participate in 2 hours of Post Course Webinars that will cover what you will need to conduct assessments and implement security elements on your network.

What you will receive: 3 hours of Pre Course Online Webinar training. Self Study Kit containing over 1000 pages of critical reading. 2 days of hard hitting Hands-on Labs. 2 hours of Post Course Online Webinar training. 120GB Apple ipod Classic or an 8GB ipod Touch loaded with valuable content from our VoIP Security Library. Certification of completion to use toward your CPE credits. What you will learn: Understand VoIP technology from top-to-bottom. Get clear view of the vulnerabilities of IP-based voice service, how they vulnerabilities are exploited and how the vulnerabilities can be mitigated or remediated. Conduct you own VoIP security assessment the very next day. Who should attend: Data Security Professionals that need to know about voice and how to handle voice security. Voice Professionals that need to understand Data Security Issues and how they interact with VoIP. Unique critical content Auditing and risk assessment for VoIP A Guide based on the Internet Security Alliance s VoIP Security Project s VoIP Threat Risk Analysis. VoIP and covert channels Special focus on an area of greatly increasing concern to US- CERT the use of VoIP transmissions to bypass data network security measures. Open source VoIP tools UCsniff Redirectpoison Teardown Vunneler Inviteflood Udpflood Wireshark Cain and Abel Rtpflood Rtpinsertsound Rtpmixsound Reghijacker

Event Details: Location: Illinois Institute of Technology (Rice Campus) 201 E. Loop Rd., Wheaton, IL 60189 Pre Course Online Webinar Dates: February 11, 2010 10:30-11:30 CST February 16, 2010 10:30-11:30 CST February 18, 2010 10:30-11:30 CST Boot Camp Dates: February 22-23, 2010 Post Course Online Webinar Dates: March 9, 2010 10:30-11:30 CST March 11, 2010 10:30-11:30 CST Register now seats are filling fast: VoIP Security Boot Camp with ipod $1,795 VoIP Security Boot Camp w/o an ipod $1,595 Be sure to ask about our Group and Association discounts. To reserve your seat today contact: Debby Fairchild Phone: 636-485-3895 dfairchild@ip3inc.com IP3, Inc. 1320 N. Michigan Ave., Suite #6 Saginaw, MI 48602 1-800-473-5181 Enroll by January 29 th and receive a copy of Hacking VoIP Exposed By David Endler and Mark Collier

Pre Course Online Webinar Details: February 11, 2010 10:30-11:30 CST VoIP Technology and Security Boot Camp Introduction Meet the instructors, learn about the unique integrated content delivery behind the course so you know what to expect and how to be prepared to capture the most value from our webinars, hands on labs, lectures and background literature and tools February 16, 2010 10:30-11:30 CST Foundations of Telephony for the non-telephony Professional If your career has brought you to the heights of Data Security and you ve now been asked to manage voice in a converge network, this webinar is designed to cover the important topics you need to understand about voice and how voice works on an IP-network. February 18, 2010 10:30-11:30 CST Foundations of Cyber Security for the Telephony Professional If you have spent your career entrenched in the world of traditional voice communications, and now are being asked to provide a secure, reliable voice server via voice over internet protocol, this webinar is designed to introduce you to the important concepts of data security and how traditional data security can be used in a VoIP network. Post Course Online Webinar Details: March 9, 2010 10:30-11:30 CST Assessing the Security of a VoIP Network Get the basic knowledge and a list of questions that you need to answer as you begin to assess the security of your very own VoIP system. March 11, 2010 10:30-11:30 CST Implementing Security on a VoIP Network Understand the major controls that are necessary to properly manage the risks present in a VoIP Network.

Course Outline: Day 1 a. First Half Day Foundation of VoIP i. History of Telephony (Lecture) ii. Asterisk IP-PBX (Lab) 1. Overview 2. Installation 3. Step-up iii. Configure X-lite Soft Phones (Lab) iv. SIP Protocol (Lecture + Lab) b. Second Half of Day Broad VoIP Security Issues i. VoIP Security Overview ii. External Attacks on VoIP Systems 1. How do VoIP Systems connect with the External World 2. How are VoIP Systems Vulnerable to external attack 3. Some Example Exploits a. Exposed Cisco Phones (lab) b. Exposed Snom Phones (lab) iii. Caller ID Spoofing 1. How does Caller ID work in the PSTN 2. How does Caller ID work with VoIP 3. What are vulnerabilities with VoIP Caller ID 4. How Does Caller ID Spoofing works a. PSTN b. VoIP 5. The Severity of Caller ID Spoofing The Risk Impact 6. Exploits using Caller ID Spoofing a. vhishing b. swatting c. voice mail access d. credit card activation 7. Defending against Caller ID Spoofing iv. Call Redirection 1. How Call Redirection Works a. PSTN b. VoIP 2. Vulnerability of VoIP to Caller Redirection 3. Severity of Call Redirection The Risk Impact 4. Exploits Using Call Redirection a. Registration Hijacking b. ARP Poison Redirect

Day 2 c. First Half of Day - Major VoIP System Components i. VLANs 1. VLAN Overview 2. VLAN Exploits (Non-lab based) ii. TFTP Servers 1. Overview of TFTP and its use with VoIP Systems 2. Install and Configure a TFTP Server 3. Register Cisco IP Phone with TFTP Server 4. Use UCsniff/VoI 5. Phopper to spoof the Cisco IP Phone iii. Session Border Controllers and VoIP Aware Firewalls 1. Overview of Firewall Evolution 2. SBC function d. Second Half of Day - IP PBX features and Attacks of the IP-PBX and User Agents i. IP-PBXs 1. Major Functions a. Registrar b. Location Server c. Proxy 2. Other Functions a. Voice Mail b. Conference Services 3. Configure voice mail on Asterisk 4. Configure Conference Services on Asterisk ii. DOS attacks on IP-PBX 1. INVITE Flood 2. REGISTER Flood iii. DOS attacks on Phones 1. SIP Bye iv. VoIP Media 1. Overview of RTP/SRTP, Media Gateways, Codecs, UDP issues 2. Media Exploits a. Sound injection b. Sound Mixing c. Vunneling d. SPIT