VoIP security: Implementation and Protocol Problems

S
VoIP Security 

Implementa3on and Protocol Problems  

        Sean Heelan, ISSA Seminar, May 2009 
Overview 
•  VoIP background info 
•  Finding and exploi3ng implementa3on related 
   bugs 
•  Finding and exploi3ng protocol related bugs 
•  Ques3ons! 




                 VoIP Security ‐ Implementa3on and 
5th May 2009                                          2 
                         Protocol Problems 
Who am I 
•  Graduate student in Computer Science 
•  Primarily interested in soNware verifica3on 
   and program analysis 




                 VoIP Security ‐ Implementa3on and 
5th May 2009                                          3 
                         Protocol Problems 
VoIP Background Info 




                     VoIP Security ‐ Implementa3on and 
5th May 2009                                              4 
                             Protocol Problems 
Popularity of VoIP 
•  Why bother looking for security problems? 
•  ~50% of American businesses using it in some 
   form in 2008 (src. Computer Economics) 
•  Anyone here today? 
•  Home users – Skype, Gizmo, Blueface etc. 




                    VoIP Security ‐ Implementa3on and 
5th May 2009                                             5 
                            Protocol Problems 
Ambiguous graph 3me 




                     VoIP Security ‐ Implementa3on and 
5th May 2009                                              6 
                             Protocol Problems 
Protocols 
•  SIP  
•  SCCP 
•  H.225 
•  H.239 
•  H.245 
•  RTCP 
•  SDP  
•  MGCP 
                VoIP Security ‐ Implementa3on and 
5th May 2009                                         7 
                        Protocol Problems 
Protocols 
•  IAX2  
•  Skype 
•  H.460 
•  H.450 
•  RTP 
•  STUN 
•  RSVP 
•  SS7 
•  ….and so on 
                  VoIP Security ‐ Implementa3on and 
5th May 2009                                           8 
                          Protocol Problems 
Protocols 
•  Why so many? 
•  Call setup, signalling, data transfer, route 
   nego3a3on, PSTN interoperability 
•  Each requiring a different protocol and a 
   different implementa3on 
•  Usually in C or C++ 



                   VoIP Security ‐ Implementa3on and 
5th May 2009                                            9 
                           Protocol Problems 
Protocols 
•  More protocols == More ahack vectors 
•  Heterogeneous networks are good for an 
   ahacker and bad for an administrator 
•  Tes3ng efforts are diluted across devices and 
   protocols 
•  No public tes3ng tools available for the 
   majority of the protocols men3oned  


                  VoIP Security ‐ Implementa3on and 
5th May 2009                                           10 
                          Protocol Problems 
VoIP: A hackers dream 
•  Integrates the voice communica3ons of an 
   organisa3on into an environment the ahacker 
   is familiar with 
•  Same protocols, tools and environments 
•  Open standards and accessible devices 
•  Scary as hell when you think about it – you 
   just moved your en3re comms infrastructure 
   to our playground 
•  Cheers! 
                      VoIP Security ‐ Implementa3on and 
5th May 2009                                               11 
                              Protocol Problems 
Ahacking the implementa3on 




                 VoIP Security ‐ Implementa3on and 
5th May 2009                                          12 
                         Protocol Problems 
Good ol’ memory corrup3on 
    Servers running on Windows, Linux or other 
    Unix   
+ Phones running on a tradi3onal OS or oNen 
     embedded Linux 
+ Wrihen in C/C++ 
= Buffer overflows, NULL pointers, infinite loops 
     and all their friends 


                      VoIP Security ‐ Implementa3on and 
5th May 2009                                               13 
                              Protocol Problems 
Finding the bugs 
•  Fuzzing ‐ a rather effec3ve hammer for many a 
   nail 
•  Automa3cally genera3on/sending semi‐valid 
   requests to a target in the hope of crashing it 
•  Requires no understanding of the applica3on/
   device internals 
•  Responsibly for the detec3on of a huge 
   percentage of security bugs 
                   VoIP Security ‐ Implementa3on and 
5th May 2009                                            14 
                           Protocol Problems 
Fuzzing in 2 minutes 
•  Genera3on based 
•  Muta3on based 
•  Extensions – Binary analysis, feedback loops, 
   debuggers 




                     VoIP Security ‐ Implementa3on and 
5th May 2009                                              15 
                             Protocol Problems 
Fuzzing example 1 
INVITE sip:201@192.168.3.102 SIP/2.0
CSeq: 536870905 INVITE
Via: SIP/2.0/UDP 192.168.3.104:6060;branch=z9hG4bKmj1079uq
Content-Type: application/sdp
Content-Length: 378


s_static(“INVITE quot;)
s_string(“sip:201@192.168.3.102”)
s_static(” SIP/2.0 rnquot;)


INVITE AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA SIP/2.0
CSeq: 536870905 INVITE
Via: SIP/2.0/UDP 192.168.3.104:6060;branch=z9hG4bKmj1079uq
Content-Type: application/sdp
Content-Length: 378



                              VoIP Security ‐ Implementa3on and 
5th May 2009                                                       16 
                                      Protocol Problems 
Fuzzing example 2 
INVITE sip:201@192.168.3.102 SIP/2.0
CSeq: 536870905 INVITE
Via: SIP/2.0/UDP 192.168.3.104:6060;branch=z9hG4bKmj1079uq
Content-Type: application/sdp
Content-Length: 378


s_static(quot;Content-Length: quot;)
s_dword(378, fuzzable=True, format=“ascii”)
s_static(quot;rnquot;)


INVITE sip:201@192.168.3.102 SIP/2.0
CSeq: 536870905 INVITE
Via: SIP/2.0/UDP 192.168.3.104:6060;branch=z9hG4bKmj1079uq
Content-Type: application/sdp
Content-Length: 4294967296



                               VoIP Security ‐ Implementa3on and 
5th May 2009                                                        17 
                                       Protocol Problems 
Building your own fuzzer 
•  Genera3onal fuzzing frameworks available – 
   Peach, Sulley, Fusil, Spike etc 
•  Map out the protocol in a high level 
   descrip3on language  
•  Auxiliary tools for crash detec3on and logging 




                       VoIP Security ‐ Implementa3on and 
5th May 2009                                                18 
                               Protocol Problems 
Feeling lazy? 
•  Free fuzzers for SIP – PROTOS, VoIPER 
•  Commercial fuzzers ‐ Codenomicon, 
   MuDynamics 
•  Use a generic fuzzer like GPF – takes a packet 
   capture and mutates it 




                  VoIP Security ‐ Implementa3on and 
5th May 2009                                           19 
                          Protocol Problems 
Does it work? 




                 VoIP Security ‐ Implementa3on and 
5th May 2009                                          20 
                         Protocol Problems 
And the award for epic fail goes to…. 




                VoIP Security ‐ Implementa3on and 
5th May 2009                                         21 
                        Protocol Problems 
Memory corrup3on summary 
•  Fuzzers make it simple to find bugs 
•  Trivial to find DoS condi3ons 
•  Currently no public exploits that remotely 
   execute malicious code on hard‐phones 
•  Exploi3ng vulnerabili3es in soN‐phones is 
   much easier, diho for servers running on 
   tradi3onal opera3ng systems 


                  VoIP Security ‐ Implementa3on and 
5th May 2009                                           22 
                          Protocol Problems 
So hard‐phones are safe then? 
•  Not quite … 
•  Run a variety of services along with the VoIP 
   core 
•  Web server, TFTP server/client, terminal 
   admin console 
•  Introduces every ahack vector available 
   against these services 


                  VoIP Security ‐ Implementa3on and 
5th May 2009                                           23 
                          Protocol Problems 
Web service ahacks 
•  Most hard‐phones provide a web based admin 
   interface, as do many servers 
•  Notoriously security agnos3c 
•  XSS, CSRF, SQL injec3on, default/no passwords, 
   authen3ca3on bypass 

  “Cisco Unified Communica7ons Manager is vulnerable to 
   a SQL Injec7on aBack in the parameter key of the 
   admin and user interface pages. A successful aBack 
   could allow an authen7cated aBacker to access 
   informa7on such as usernames and password hashes 
   that are stored in the database.” – Cisco 2008 
                     VoIP Security ‐ Implementa3on and 
5th May 2009                                              24 
                             Protocol Problems 
Web ahack example 
•  Snom 320  VoIP phones 
•  Admin interface accepts unauthorized POST 
   data 
•  Admin interface can also be used to make calls 
•  GNUCi3zen.org combined the above two 
   ‘features’ for remote surveillance 



                    VoIP Security ‐ Implementa3on and 
5th May 2009                                             25 
                            Protocol Problems 
GNUCi3zen.org – Snom 320 ahack 
•  Ahacker scans for vulnerable devices by 
   checking for remotely accessible signature 
   files 
•  Ahacker sends POST to vic3m’s IP with data: 
   NUMBER=ATTACKERNUM 
•  Ahacker answers the incoming call 
•  Vulnerable device uses inbuilt receiver to 
   capture ambient sound and send to the 
   ahacker 
                 VoIP Security ‐ Implementa3on and 
5th May 2009                                          26 
                         Protocol Problems 
Finding web service bugs 
•  Simple to automate 
•  Standard tools for finding SQL, CSRF and XSS 
   bugs – w3af ahack framework 
•  Using SIP packets as an injec3on vector – XSS 
   in log data  
•  Far easier to find and exploit a bug in a web 
   interface than to create a reliable memory 
   corrup3on exploit 
                       VoIP Security ‐ Implementa3on and 
5th May 2009                                                27 
                               Protocol Problems 
Ahacking the protocols 




                      VoIP Security ‐ Implementa3on and 
5th May 2009                                               28 
                              Protocol Problems 
Ahacking the protocols 
•  Authen3ca3on 
•  Authoriza3on 
•  Encryp3on 
•  Same approach as every TCP/IP based service 




                      VoIP Security ‐ Implementa3on and 
5th May 2009                                               29 
                              Protocol Problems 
Ahacking the protocols ‐ discovery 
•  Many VoIP protocols are TCP based and run on 
   standard ports – nmap 
•  Specialist tools available for certain protocols 
   – SIPVicious, iaxscan – Can scan thousands of 
   hosts an hour 
•  Scanning random hosts turns up hoards of 
   easily accessible servers 


                  VoIP Security ‐ Implementa3on and 
5th May 2009                                           30 
                          Protocol Problems 
Ahacking the protocols ‐ 
                    authen3ca3on 
•  SIP and IAX2 – 2 step authen3ca3on by default 
•  What does that mean? – We can enumerate valid 
   accounts first and then crack passwords 
•  Account discovery search space 
      – Two step auth = X*X 
      – Single step auth = XX 
          Where X is the size of the username/password pool 
•  We’d shoot a web developer that did this but 
   apparently it’s OK for VoIP 
                        VoIP Security ‐ Implementa3on and 
5th May 2009                                                   31 
                                Protocol Problems 
Ahacking the protocols ‐ 
                    authen3ca3on 
•  Many networks s3ll use 3 or 4 digit usernames 
   and passwords 
•  SIPVicious/iaxscan can check all possible 
   combina3ons in minutes 




                      VoIP Security ‐ Implementa3on and 
5th May 2009                                               32 
                              Protocol Problems 
Ahacking the protocols ‐ sniffing 
•  Not en3rely a protocol level problem 
•  Intercepted communica3ons can be easily 
   reconstructed into audio/video files – 
   wireshark, UCSniff 
•  VLAN hopping – exploi3ng networks that rely 
   on layer 2 protocols to allow access to the 
   voice LAN – Voip Hopper 


                 VoIP Security ‐ Implementa3on and 
5th May 2009                                          33 
                         Protocol Problems 
Taking the trunk 
•  Stealing individual accounts is fun and all but 
   how about stealing the phone company? 
•  Requires admin access to an accessible router 
   or switch 
•  How?  
•  Straight through the front door 



                   VoIP Security ‐ Implementa3on and 
5th May 2009                                            34 
                           Protocol Problems 
Taking the trunk 
•  Robert Moore – 2007, stole 10 million minutes 
   worth of talk 3me 
•  Step 1: Bought informa3on on corporate IP 
   addresses for $800 
•  Step 2: Scanned for accessible VoIP routers and 
   switches 
•  Step 3: Scanned for default passwords and 
   unpatched Cisco boxes 
•  Step 4: Profit! (Or jail in Mr. Moore’s case) 

                   VoIP Security ‐ Implementa3on and 
5th May 2009                                            35 
                           Protocol Problems 
Taking the trunk 
•  “70% of all the companies he scanned were 
   insecure, and 45% to 50% of VoIP providers were 
   insecure” 
•  “I'd say 85% of them were misconfigured routers. 
   They had the default passwords on themquot; 
•  “The telecoms we couldn't get into had access 
   lists or boxes we couldn't get into because of 
   strong passwords.” 
  ‐ Source: http://www.informationweek.com
                   VoIP Security ‐ Implementa3on and 
5th May 2009                                            36 
                           Protocol Problems 
Ahacking the protocols ‐ summary 
•  Essen3ally the same offence/defence we’ve 
   had for years 
•  Discovery, enumera3on and exploita3on 
   follow roughly the same paherns as most 
   other TCP/IP services 
•  Protec3ng against these problems is the same 
   struggle with password management, access 
   lists and updates 

                 VoIP Security ‐ Implementa3on and 
5th May 2009                                          37 
                         Protocol Problems 
Ques3on Time! 
                http://seanhn.wordpress.com 




                     VoIP Security ‐ Implementa3on and 
5th May 2009                                              38 
                             Protocol Problems 
1 of 38

Recommended

VoIP – vulnerabilities and attacks by
VoIP – vulnerabilities and attacksVoIP – vulnerabilities and attacks
VoIP – vulnerabilities and attacksn|u - The Open Security Community
16.8K views30 slides
Voip security by
Voip securityVoip security
Voip securityShethwala Ridhvesh
787 views46 slides
The Art of VoIP Hacking - Defcon 23 Workshop by
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopFatih Ozavci
57.9K views160 slides
VoIP Wars : Return of the SIP by
VoIP Wars : Return of the SIP VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP Fatih Ozavci
99K views37 slides
Hacking and Attacking VoIP Systems - What You Need To Know by
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowDan York
3.8K views32 slides
Introduction to VoIP Security by
Introduction to VoIP SecurityIntroduction to VoIP Security
Introduction to VoIP Securityn|u - The Open Security Community
2.3K views16 slides

More Related Content

What's hot

Hardware Hacking Chronicles: IoT Hacking for Offence and Defence by
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceFatih Ozavci
1.7K views51 slides
VoIP Security by
VoIP SecurityVoIP Security
VoIP SecurityDayanand Prabhakar
5.4K views22 slides
Hacking SIP Like a Boss! by
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Fatih Ozavci
22K views35 slides
VoIP Wars: Attack of the Cisco Phones by
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesFatih Ozavci
72.1K views60 slides
Departed Communications: Learn the ways to smash them! by
Departed Communications: Learn the ways to smash them!Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!Fatih Ozavci
1.3K views40 slides
VoIP Wars: The Phreakers Awaken by
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenFatih Ozavci
26.6K views42 slides

What's hot(20)

Hardware Hacking Chronicles: IoT Hacking for Offence and Defence by Fatih Ozavci
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Fatih Ozavci1.7K views
Hacking SIP Like a Boss! by Fatih Ozavci
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!
Fatih Ozavci22K views
VoIP Wars: Attack of the Cisco Phones by Fatih Ozavci
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco Phones
Fatih Ozavci72.1K views
Departed Communications: Learn the ways to smash them! by Fatih Ozavci
Departed Communications: Learn the ways to smash them!Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!
Fatih Ozavci1.3K views
VoIP Wars: The Phreakers Awaken by Fatih Ozavci
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers Awaken
Fatih Ozavci26.6K views
VoIP Wars: Destroying Jar Jar Lync (Filtered version) by Fatih Ozavci
VoIP Wars: Destroying Jar Jar Lync (Filtered version)VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
Fatih Ozavci6.1K views
Encrypted Voice Communications by sbwahid
Encrypted Voice CommunicationsEncrypted Voice Communications
Encrypted Voice Communications
sbwahid688 views
BlackHat Hacking - Hacking VoIP. by Sumutiu Marius
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
Sumutiu Marius1.2K views
Asterisk PBX Presentation, 2006 by Erkhembaatar M.
Asterisk PBX Presentation, 2006Asterisk PBX Presentation, 2006
Asterisk PBX Presentation, 2006
Erkhembaatar M.2.5K views
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System by Syuan Wang
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Syuan Wang623 views

Viewers also liked

VoIP Security for Dummies by
VoIP Security for DummiesVoIP Security for Dummies
VoIP Security for DummiesAvaya Inc.
7.4K views68 slides
Voip by
VoipVoip
VoipYasin Virani
7.5K views18 slides
Voip powerpoint by
Voip powerpointVoip powerpoint
Voip powerpointGW1992
22.8K views9 slides
Voice over IP (VoIP) by
Voice over IP (VoIP)Voice over IP (VoIP)
Voice over IP (VoIP)Peter R. Egli
15K views54 slides
Voice Over IP (VoIP) by
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)habib_786
71.7K views22 slides
Our Internet Connection by
Our Internet ConnectionOur Internet Connection
Our Internet ConnectionCSaC
222 views11 slides

Viewers also liked(17)

VoIP Security for Dummies by Avaya Inc.
VoIP Security for DummiesVoIP Security for Dummies
VoIP Security for Dummies
Avaya Inc.7.4K views
Voip powerpoint by GW1992
Voip powerpointVoip powerpoint
Voip powerpoint
GW199222.8K views
Voice Over IP (VoIP) by habib_786
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
habib_78671.7K views
Our Internet Connection by CSaC
Our Internet ConnectionOur Internet Connection
Our Internet Connection
CSaC222 views
How PSTN phone works? by mahipal9
How PSTN phone works?How PSTN phone works?
How PSTN phone works?
mahipal920.5K views
What is VoIP and How it works? by broadconnect
What is VoIP and How it works?What is VoIP and How it works?
What is VoIP and How it works?
broadconnect7.3K views
Voice over internet protocol (VoIP) by Namra Afzal
 Voice over internet protocol (VoIP)  Voice over internet protocol (VoIP)
Voice over internet protocol (VoIP)
Namra Afzal7.1K views
Voip introduction by daksh bhatt
Voip introductionVoip introduction
Voip introduction
daksh bhatt11.9K views
VOIP Presentation by tofael1
VOIP Presentation VOIP Presentation
VOIP Presentation
tofael115.5K views
Public Switched Telephone Network by Haither Mithath
Public Switched Telephone NetworkPublic Switched Telephone Network
Public Switched Telephone Network
Haither Mithath46.4K views
VOICE OVER INTERNET PROTOCOL by Rajan Kumar
VOICE OVER INTERNET PROTOCOLVOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOL
Rajan Kumar13.3K views
Public Switched Telephone Network (PSTN) by J.T.A.JONES
Public Switched Telephone Network (PSTN)Public Switched Telephone Network (PSTN)
Public Switched Telephone Network (PSTN)
J.T.A.JONES24.2K views

Similar to VoIP security: Implementation and Protocol Problems

Session Initiation Protocol - In depth analysis by
Session Initiation Protocol - In depth analysisSession Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysischinmaypadhye1985
1.1K views43 slides
Openmokast: The open broadcasting software stack for mobile devices by
Openmokast: The open broadcasting software stack for mobile devicesOpenmokast: The open broadcasting software stack for mobile devices
Openmokast: The open broadcasting software stack for mobile devicesJean-Michel Bouffard
1.1K views30 slides
Scanning The Intertubes For Voip by
Scanning The Intertubes For VoipScanning The Intertubes For Voip
Scanning The Intertubes For VoipSandro Gauci
872 views54 slides
Group1 Ss08 Smartphones by
Group1 Ss08 SmartphonesGroup1 Ss08 Smartphones
Group1 Ss08 SmartphonesKalun Leung
840 views60 slides
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011 by
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011Lorenzo Busatti
244 views24 slides
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011 by
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011Lorenzo Busatti
159 views24 slides

Similar to VoIP security: Implementation and Protocol Problems(20)

Session Initiation Protocol - In depth analysis by chinmaypadhye1985
Session Initiation Protocol - In depth analysisSession Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysis
chinmaypadhye19851.1K views
Openmokast: The open broadcasting software stack for mobile devices by Jean-Michel Bouffard
Openmokast: The open broadcasting software stack for mobile devicesOpenmokast: The open broadcasting software stack for mobile devices
Openmokast: The open broadcasting software stack for mobile devices
Scanning The Intertubes For Voip by Sandro Gauci
Scanning The Intertubes For VoipScanning The Intertubes For Voip
Scanning The Intertubes For Voip
Sandro Gauci872 views
Group1 Ss08 Smartphones by Kalun Leung
Group1 Ss08 SmartphonesGroup1 Ss08 Smartphones
Group1 Ss08 Smartphones
Kalun Leung840 views
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011 by Lorenzo Busatti
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Lorenzo Busatti244 views
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011 by Lorenzo Busatti
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Access point redundancy, by Lorenzo Busatti - MikroTik MUM USA Las Vegas 2011
Lorenzo Busatti159 views
wifi by Ammar WK
wifiwifi
wifi
Ammar WK2.6K views
wifi-y3dips-stmik_mdp_slides by guest1c1a9a
wifi-y3dips-stmik_mdp_slideswifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slides
guest1c1a9a351 views
nokia and opensource n800 by winsopc
nokia and opensource n800nokia and opensource n800
nokia and opensource n800
winsopc513 views
A Skype case study (2011) by Vasia Kalavri
A Skype case study (2011)A Skype case study (2011)
A Skype case study (2011)
Vasia Kalavri4.1K views
Packet Sniffer by vilss
Packet Sniffer Packet Sniffer
Packet Sniffer
vilss2.8K views
Hybrid Open Source Telephony (OST) and Proprietary Scenarios by Roberto Galoppini
Hybrid Open Source Telephony (OST) and Proprietary ScenariosHybrid Open Source Telephony (OST) and Proprietary Scenarios
Hybrid Open Source Telephony (OST) and Proprietary Scenarios
Roberto Galoppini687 views
Open Mic Webcast: IBM Sametime Audio Video Troubleshooting - 04 May 2016 by Gunawan T Wicaksono
Open Mic Webcast: IBM Sametime Audio Video Troubleshooting - 04 May 2016Open Mic Webcast: IBM Sametime Audio Video Troubleshooting - 04 May 2016
Open Mic Webcast: IBM Sametime Audio Video Troubleshooting - 04 May 2016
Top 10 most interesting vulnerabilities and attacks in SAP by ERPScan
Top 10 most interesting vulnerabilities and attacks in SAPTop 10 most interesting vulnerabilities and attacks in SAP
Top 10 most interesting vulnerabilities and attacks in SAP
ERPScan928 views
2015 02 24 lmtv baselining by Tony Fortunato
2015 02 24 lmtv baselining2015 02 24 lmtv baselining
2015 02 24 lmtv baselining
Tony Fortunato1.5K views

Recently uploaded

iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
26 views69 slides
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensorssugiuralab
15 views15 slides
Special_edition_innovator_2023.pdf by
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdfWillDavies22
16 views6 slides
Transcript: The Details of Description Techniques tips and tangents on altern... by
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...BookNet Canada
130 views15 slides
Attacking IoT Devices from a Web Perspective - Linux Day by
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day Simone Onofri
15 views68 slides
Roadmap to Become Experts.pptx by
Roadmap to Become Experts.pptxRoadmap to Become Experts.pptx
Roadmap to Become Experts.pptxdscwidyatamanew
11 views45 slides

Recently uploaded(20)

iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker26 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab15 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2216 views
Transcript: The Details of Description Techniques tips and tangents on altern... by BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada130 views
Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 views
Data-centric AI and the convergence of data and model engineering: opportunit... by Paolo Missier
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
Paolo Missier34 views
6g - REPORT.pdf by Liveplex
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdf
Liveplex9 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10209 views
Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst470 views
From chaos to control: Managing migrations and Microsoft 365 with ShareGate! by sammart93
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
sammart939 views
Black and White Modern Science Presentation.pptx by maryamkhalid2916
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptx
maryamkhalid291614 views
AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta15 views
Unit 1_Lecture 2_Physical Design of IoT.pdf by StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec11 views
Lilypad @ Labweek, Istanbul, 2023.pdf by Ally339821
Lilypad @ Labweek, Istanbul, 2023.pdfLilypad @ Labweek, Istanbul, 2023.pdf
Lilypad @ Labweek, Istanbul, 2023.pdf
Ally3398219 views
The details of description: Techniques, tips, and tangents on alternative tex... by BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada121 views

VoIP security: Implementation and Protocol Problems