CEH.V6.-.Module.38.VoIP.Hacking

CEH.V6.-.Module.38.VoIP.Hacking - Ethical Hacking and...

Info icon This preview shows pages 1–14. Sign up to view the full content.

View Full Document Right Arrow Icon
E hi l H ki d Ethical Hacking and Countermeasures V i 6 Version 6 Module XXXVIII VoIP Hacking
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.itbusinessedge.com/
Image of page 2
Module Objective This module will familiarize you with: • VoIP VoIP Hacking Steps • Footprinting • Scanning E ti • Enumeration • Exploiting The Network Covering The Tracks EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Module Flow What is VoIP Enumeration Exploiting The Network VoIP Hacking Steps Footprinting Scanning Covering The Tracks EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Image of page 4
What is VoIP Voice Over Internet Protocol (VoIP) refers to transmission of voice over IP based networks Also known as “packet telephony” Also known as packet telephony Uses IP protocol to route voice traffic Voice is compressed using CODECS-hence bandwidth is tili d ffi i tl utilized efficiently Renowned for its low cost and advantageous to customers i f l di ll EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited in case of long distance calls
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
VoIP Hacking Steps EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Image of page 6
VoIP Hacking Steps Footprinting Scanning Enumeration Exploiting the Network EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Footprinting EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Image of page 8
Information Sources Public Web site research Google hacking WHOIS and DNS analysis EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Unearthing Information Information includes: Organizational structure and corporate locations Help and tech support Job listings Domain name lookup Phone numbers and extensions VoIP vendor press releases and case studies Resumes Mailing lists and local user group postings EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Web-based VoIP logins
Image of page 10
Organizational Structure and Corporate Locations Hacker can guess names of employees working in an organization Check for the location information for branch offices and corporate headquarters to know the traffic flow between two VoIP call participants EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Help Desk Check the sites that hold information Phone type from the help desks: Default PIN numbers for voicemail Links to web administration EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Image of page 12
Job Listings b i b li i h i l d h Corporate web sites open up Job listings that include the information on the technologies used within an organization EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 14
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern