Tag: risk
-
How to spot hacker INVITE requests
•
By inspecting log reports from a number of different SIP Proxy servers, it has been possible to find some common factors across the many hacking attempts that are made against SIP servers.. The information available from these reports gives some insight into the most common SIP requests being sent by hackers to detect and probe […]
-
How secure is your Asterisk PBX? – part 2
•
Protecting your Asterisk server In part 1, we examined the techniques that are used to probe for vulnerabilities in a SIP server and reviewed the types of exploitation a would-be hacker hopes to use. In this second part, I look at the ways you can protect your Asterisk or other SIP server and guard against weaknesses […]
-
How secure is your Asterisk PBX? – part 1
•
A growing problem Like a slice of Victoria sponge cake on a summers day attracts wasps, so new technologies seem to attract the attention of cyber-criminals. The more widely used the technology, the greater the interest. It was inevitable, and widely predicted, that VoIP would become a favorite target for hackers as its popularity and uptake increased […]