Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-rtc-hacking
a list of awesome resources related to security and hacking of VoIP, WebRTC and VoLTE
https://github.com/EnableSecurity/awesome-rtc-hacking
Last synced: 4 days ago
JSON representation
-
Papers
- Billing Attacks on SIP-Based VoIP Systems
- Performance Analysis of SIP Based VoIP Networks
- Abusing SIP Authentication
- Multiple Design Patterns for Voice over IP (VoIP) Security
- Adaptive VoIP Steganography forInformation Hiding within Network Audio Streams
- Realtime Steganography with RTP
- A Lossless Steganography Technique for G.711 Telephony Speech
- CallRank: Combating SPIT Using Call Duration, SocialNetworks and Global Reputation
- Steganography of VoIP streams
- Steganalysis of compressed speech to detect covert VoIP channels
- Securing Voice over Internet Protocol
- Protecting SIP Proxy Servers from Ringing-based Denial-of-Service Attacks
- An ontology description for SIP security flaws
- Analysis of DDoS Attacks in Heterogeneous VoIP Networks: A Survey
- Change Point Detection for Monitoring SIP Networks
- Network security systems to counter SIP-based denial-of-service attacks
- Multilayer Secured SIP Based VoIP Architecture
- Battling Against DDoS in SIP
- Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems
- An Analysis of Security Threats and Tools in SIP-Based VoIP Systems
- Fast Detection of Denial-of-ServiceAttacks on IP Telephony
- VoIP Security: Threat Analysis & Countermeasures
- Voice Over IP - Security and SPIT
- Battling Against DDoS in SIP
- Realtime Steganography with RTP
- Multilayer Secured SIP Based VoIP Architecture
- Steganography of VoIP streams
-
Newsletters
-
Presentation Slides
-
Videos
- OpenSSL DoS (CVE-2022-0778) versus WebRTC infrastructure
- TAD Summit EMEA Americas 2020: Getting offensive: a different approach to RTC security - Sandro Gauci
- HITBHaxpo D1: VoLTE Phreaking - Ralph Moonen
- Kamailio World 2019: The Various Ways Your RTC May Be Crushed - Sandro Gauci
- Kamailio World 2018: A tale of two RTC fuzzing approaches - Sandro Gauci
- Kamailio World 2017: Listening By Speaking - Security Attacks On Media Servers And RTP Relays - Sandro Gauci
- Kamailio World 2016: 9 Years Of Friendly Scanning And Vicious SIP - Sandro Gauci
- Kamailio World 2015: VoIP Security – Bluebox ng Continuous Pentesting - Sergio García Ramos
- Kamailio World 2013: VoIP Security Tools - Anton Roman
- Blackhat EU 2019: Mobile network hacking - All-over-IP edition - Karsten Nohl, Luca Melette & Sina Yazdanmehr
- Jailbreak Brewing Company Security Summit: Whatsup with WhatsApp: A Detailed Walk Through of Reverse Engineering CVE-2019-3568 - Maddie Stone
- RhurSec 2016: Eavesdropping on WebRTC Communication - Martin Johns
- Hak5 1813: SSL Hack Workarounds and WebRTC Flaws
- media.ccc.de: WebRTC Security - Stephan Thamm
- OpenSSL DoS (CVE-2022-0778) versus WebRTC infrastructure
- Kamailio World 2015: VoIP Security – Bluebox ng Continuous Pentesting - Sergio García Ramos
- Hak5 1813: SSL Hack Workarounds and WebRTC Flaws
-
Advisories
- Cisco IOS and IOS XE SIP Protocol Denial of Service Vulnerability
- Polycom Phones SIP Registration Credential Abuse
- Cisco IOS XE Software NAT SIP Application Layer Gateway Denial of Service Vulnerability
- Cisco TelePresence Video Communication Server SIP DoS Vulnerability
- Voice over LTE implementations contain multiple vulnerabilities
- Asterisk RTP Bleed
- Asterisk pjSIP CSeq Overflow
- Juniper Junos Router OS DoS
- OpenScape Desk Phones HFA and SIP CSRF and Privilege Escalation
- Remote Access VPN and SIP Vulnerabilities in Cisco PIX and Cisco ASA
- Interaction SIP Proxy Buffer Overflow in SIPParser() Leads to DoS
- Asterisk Stack Corruption in `subscribe` Message
- Asterisk Segfault with Invalid SDP `fmtp` Attribute
- Asterisk Segfault with Invalid Media Format Descriptiom
- Asterisk Segfault with `INVITE` Replay Attack
- Kamalio Off-By-One Heap Overflow
- New RCS technology exposes most mobile users to hacking
- Zoom Communications user enumeration
- Asterisk Skinny Memory Exhaustion
-
Open-source tools
- SIP Proxy - A VoIP security testing tool.
- Metasploit auxiliary modules
- SIPp
- SIPp digest leak scenario
- SIPPTS - Another set of tools to audit VoIP servers and devices using SIP protocol.
- bluebox-ng - Pentesting framework using Node.js powers, focused in VoIP.
- SigPloit - Tool which covers all used SS7, GTP (3G), Diameter (4G) or even SIP protocols for IMS and VoLTE infrastructures.
- rtpnatscan - Tool which tests for [rtpbleed](http://rtpbleed.com) vulnerability.
- VIPROY - VoIP pentest framework which can be used with the metasploit-framework.
- Mr.SIP - SIP based audit and attack tool.
- VoIPShark - Open Source VoIP Analysis Platform
- Turner - PoC for tunnelling HTTP over a permissive/open TURN server.
- sipsak - SIP swiss army knife, has some features that can be used for security testing (e.g. flood more or random mode)
- turnproxy - Tool to abuse open TURN relays
- SeeYouCM Thief - download and parse configuration files from Cisco phone systems searching for SSH credentials
- stunner - a tool to test and exploit STUN, TURN and TURN over TCP servers.
- VoIP Hopper - a tool to exploit insecure VLANs that are often found in IP Telephony infrastructure.
- vsaudit - VoIP security assessment framework.
-
Blogs
- Pepelux blog
- Communication Breakdown - A blog about VoIP, WebRTC and real-time communications security by Enable Security; (formerly SIPVicious blog)
-
Notable blog posts and articles
- Understanding DTLS Usage in VoIP Communications
- Analyzing WhatsApp Calls with Wireshark, radare2 and Frida
- Adventures in Video Conferencing Part 1: The Wild World of WebRTC
- Adventures in Video Conferencing Part 2: Fun with FaceTime
- Adventures in Video Conferencing Part 3: The Even Wilder World of WhatsApp
- Adventures in Video Conferencing Part 4: What Didn't Work Out with WhatsApp
- Adventures in Video Conferencing Part 5: Where Do We Go from Here?
- Abusing Microsoft Teams Direct Routing
- Exploiting CVE-2022-0778, a bug in OpenSSL vis-à-vis WebRTC platforms
- Analyzing two FreeSWITCH vulnerabilities – CVE-2021-41157 & CVE-2021-37624
- Kamailio’s exec module considered harmful
- How we abused Slack's TURN servers to gain access to internal services
-
Books
-
Commercial tools
-
Vulnerabilities
-
CTFs and playgrounds
- SIPVicious PRO demo server - for testing RTC attacks
- CSAW CTF Qualification Round 2020 / Tasks / WebRTC - a CTF that featured a WebRTC related challenge
-
Related lists
Categories
Sub Categories
Keywords
voip
4
sip
3
security
3
asterisk
2
hacking
2
webrtc
2
pentest
2
shodan
1
javascript
1
voip-hacking
1
secutiry
1
security-tools
1
security-audit
1
pplsip
1
pentesting
1
pentest-tool
1
penetration-testing
1
pbx
1
password-cracker
1
hacking-tool
1
freepbx
1
sdr
1
rogue-bts
1
lte-evil-twin
1
lte
1
gsm-network
1
gsm
1
eviltwin
1
turn
1
tool
1
testing
1
stun
1
misconfiguration
1
exploit
1
command-line-tool
1
c
1
ip-spoofing
1
dos
1
ddos
1
audit
1
attack
1
scanner
1
elastix
1