Security for SIP and VoIP Infrastructure
I'll give an overview about some scenarios you might encounter when putting a SIP Service on the internet. There is a huge amount of people who benefit from insecure systems as well there are lots of people who want's to press money on DOS Attacks. The methods which are used to search the internet for vulnerabilities are mainly pretty simple to protect for. I built a Honey Pot and searched for ways to protect the system. There are ways for protection and I'll show some of them.
Видео Security for SIP and VoIP Infrastructure канала Official Asterisk YouTube Channel
Видео Security for SIP and VoIP Infrastructure канала Official Asterisk YouTube Channel
Показать
Комментарии отсутствуют
Информация о видео
3 января 2017 г. 19:23:49
00:36:50
Другие видео канала
![](https://i.ytimg.com/vi/pAzthOxRQCE/default.jpg)
![Introduction to Voice Over IP](https://i.ytimg.com/vi/2x3Ie6VZ_sg/default.jpg)
![When Should You Use Kamailio?](https://i.ytimg.com/vi/IaYOboZQEw0/default.jpg)
![How To Prevent Telecom Fraud in Real-Time](https://i.ytimg.com/vi/QxFQIx3M-bA/default.jpg)
![Tools for Offensive RTC security. Introducing SIPVicious PRO and the demo server, Sandro Gauci](https://i.ytimg.com/vi/FRUdqXqNaMc/default.jpg)
![What is SIP?](https://i.ytimg.com/vi/erICfPV8-Lg/default.jpg)
![secure VoIP Demo](https://i.ytimg.com/vi/XTbUvaZfuv4/default.jpg)
![Crestron Flex Install and Set Up](https://i.ytimg.com/vi/LnpYmp1U2Do/default.jpg)
![SSL/TLS handshake Protocol](https://i.ytimg.com/vi/sEkw8ZcxtFk/default.jpg)
![TR19: We are Listening – Common Flaws in Encrypted VoIP: SIP-over-TLS and sRTP.](https://i.ytimg.com/vi/v3HtmDMKvQw/default.jpg)
![Stateful Inspection | Security Basics](https://i.ytimg.com/vi/QFeW5ySMeFI/default.jpg)
![Security 101 Workshop: IoT Security](https://i.ytimg.com/vi/KkUvujq8nEI/default.jpg)
![SOUTENANCE MASTER 2 SYSTEMS RESEAUX TELECOMS , Presente et soutenu par BAKARAMOKO KABA](https://i.ytimg.com/vi/XwDHNVDNJsc/default.jpg)
![Refarming: 5G-Ausbau im ländlichen Raum](https://i.ytimg.com/vi/Ng79b87D-DA/default.jpg)
![Carrier "SCAM LIKELY" Phone Call Flagging – Matt Florell](https://i.ytimg.com/vi/L8iqgZ5bLaw/default.jpg)
![VOIP Architecture](https://i.ytimg.com/vi/CEn7qno_XS4/default.jpg)
![SIP over TLS + SRTP: Decrypting Two Caller Traffic with Tshark](https://i.ytimg.com/vi/J4Mam3RyxNs/default.jpg)
![Asterisk Conversational AI – Diego Gosmar](https://i.ytimg.com/vi/powlfFQbws0/default.jpg)
![ISDN-PRI vs SIP Trunking](https://i.ytimg.com/vi/uB9vl29EZEQ/default.jpg)
![What is an SBC?](https://i.ytimg.com/vi/efY1suir-0o/default.jpg)