Autoplay
Autocomplete
Previous Lesson
Complete and Continue
VoIP Hacking & Penetration Testing
Introduction of VoIP Penetration Testing
Introduction to Course Modules (6:09)
Difference Between Circuit Switching and Packet Switching (9:57)
Circuit-Switched Network: Public Switched Telephone Network (PSTN) (6:32)
OSI Model Layered Approach Explained (6:52)
Overview of Internet Protocol – Data Network (11:14)
What is TCP/IP and How Does it Work? (6:19)
Voice Over Internet Protocol (VoIP)
What is VoIP ? (7:51)
What VoIP Architecture Looks Like (9:42)
Overview of VoIP Protocols (17:11)
VoIP Media Protocols & Standards (6:48)
Lab Configuration - VoIP Hacking Environment
Introduction to Asterisk (3:51)
High Performance VoIP Servers (8:12)
Building a VoIP Server with Trixbox (5:06)
Building a VoIP Server with AsteriskNow IP PBX (5:19)
Configure Trixbox – Server Setup (11:50)
Configure AsteriskNow – Server Setup (6:37)
Linphone Softphone Configuration (5:36)
Zoiper Softphone Configuration (4:24)
Hacking into VoIP Network
VoIP Network: Information Gathering & Enumeration (11:58)
Information Gathering & Enumeration Techniques (22:56)
Information Gathering via Footprinting (Part A) (17:16)
Information Gathering via Footprinting (Part B) (24:13)
Using Extension Methods with Enumerations (7:20)
Concept of VoIP Authentication Cracking (13:07)
Practice Session: VoIP Authentication Cracking in Action (17:43)
Concept of Passive Man-in-the-Middle Attack (13:20)
Practice Session: Passive Man-in-the-Middle Attack in Action (26:27)
Concept of Active Man-in-the-Middle Attack (13:18)
Practice Session: Active Man-in-the-Middle Attack in Action (15:37)
Security Issues and Countermeasure for VoIP (Part A) (22:47)
Security Issues and Countermeasure for VoIP (Part B) (18:39)
Denial of service attacks on VoIP systems (31:24)
Configure AsteriskNow – Server Setup
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock