SIP is the modern protocol used for voice communications over IP. In this video, learn about the ways in which SIP services can be attacked, including a packet pulsing attack which can be used to create a denial of service on a SIP server.
- [Instructor] Voice calls over the internet, … often called voice over IP or VOIP … use special phone sets or software … to convert analog voice signals to data … and then send it across the internet as data packets. … To do this, the VOIP service uses what's known … as a SIP proxy server. … SIP is the session initiation protocol … and is used to set up the data connection for a call … and another protocol, the real time transfer protocol, RTP, … is used for voice data exchange. … SIP doesn't come pre-installed … on standard operating system distributions. … There are many managed service VOIP applications, … such as Skype and Viber … or we can download and install a local service. … In this course, I'll use My VOIP App. … This can be downloaded pre-configured … for between 20 and 500 users. … I've selected the 20 user version for my Windows 10 system … as the host. … This is a simple download and installs seamlessly. … I've already downloaded and installed my VOIP service … and I've started the system. …
Author
Updated
1/8/2021Released
3/25/2019- What is denial of service?
- TCP SYN, Smurf, and UDP flooding
- Deauthenticating a wireless host
- Flooding HTTP
- Using BlackEnergy
- Flooding a SIP server
- Detecting P2P attacks with PeerShark
- Defeating DoS attacks
Skill Level Intermediate
Duration
Views
Related Courses
-
Penetration Testing: Advanced Kali Linux
with Malcolm Shore2h 22m Intermediate -
Penetration Testing Essential Training
with Malcolm Shore2h 29m Intermediate -
Ethical Hacking: Hacking IoT Devices
with Luciano Ferrari35m 22s Intermediate
-
Introduction
-
Disclaimer1m 12s
-
1. What Is a Denial of Service?
-
2. Infrastructure Denial of Service
-
UDP flooding with LOIC3m 16s
-
ARP poisoning with Ettercap5m 13s
-
Using NTP to amplify attacks5m 55s
-
3. Wireless Denial of Service
-
4. Application Denial of Service
-
Understanding BlackEnergy6m 12s
-
Killing the FTP service1m 42s
-
RangeAmp attacks on the CDN1m 10s
-
5. SIP Service Attacks
-
Flooding a SIP server6m 9s
-
-
6. Ransomware
-
Explaining ransomware3m 42s
-
Understanding Cryptolocker2m 44s
-
Understanding Petya2m 28s
-
-
7. Mitigation Techniques
-
Commercial anti-DOS services1m 49s
-
Considering IoT denial2m 53s
-
Conclusion
-
Summary1m 2s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Flooding a SIP server