Real Name | Fatih Ozavci |
---|---|
Email address | private |
Website | www.viproy.com/fozavci |
First Active | 2007-05-17 |
Last Active | 2015-12-01 |
This archive includes presentation slides for the talk VoIP Wars: Destroying Jar Jar Lync along with the Viproxy tool used to perform the attack.
7c10f7a577fbea0fc76921b0346d6dd57980d6c5773f75f34712eadc6b092e2e
Viproy Voip Penetration and Exploitation Kit is developed to improve quality of SIP penetration testing. It provides authentication and trust analysis features that assists in creating simple tests.
7adcb6181b4f32dd3c5611997d9af5ccec5f78decd8a67ca1dc7faf38e23b1bc
This set of slide is from "The Art of VoIP Hacking", a workshop that was held at Defcon 23.
ef720563f84090601b556006b1294eb24450124db43e13dabccb9df654d51dc0
Viproy Voip Penetration and Exploitation Kit is developed to improve quality of SIP penetration testing. It provides authentication and trust analysis features that assists in creating simple tests.
dd2aee754acd9cdcd4184af9508f9a6f1c6510444a5f6485807f4ac9ebf5000f
These are the slides from the presentation "VoIP Wars: Attack of the Cisco Phones" from the talk given at Defcon 22 and Blackhat USA 2014.
720ddb24a662b21cf705390762e270841f4e60b42dfbc2cfb78cf7cff84316a9
Viproy Voip Penetration and Exploitation Kit is developed to improve quality of SIP penetration testing. It provides authentication and trust analysis features that assists in creating simple tests.
804f9b4c83d5ccb2b408d8d927fe6b3a91923b84aafe53f383b2a42e494bb041
These are the presentation slides from "VoIP Wars: Return of the SIP" as presented at Defcon 21 in Las Vegas.
b8a1c2dd94a7b8b91a355e18362e46e83c30a286f91570bba6af13abe725558f
These are the presentation slides for the Hacking SIP Like A Boss presentation given at Athcon 2013.
53fbc30333acdeadc3874c962abbe40c92f1c1e844a6354e73fd3df90a47f6f4
Viproy Voip Penetration and Exploitation Kit is developed to improve quality of SIP penetration testing. It provides authentication and trust analysis features that assists in creating simple tests.
8c765de8ebd06f2a12c1e1ff3be3e4e5f33bb6e44daa21085344559c1f80ada4
NGN (Next Generation Networks) operators provide SIP services for their customers. Customers can call other operator's customers via SIP services and SIP gateways. SIP gateways use SIP Trunks for trusted call initiation and cdr/invoice management. In this paper, a new method will be explained. The technique describes how you can detect trusted 3rd party SIP Trunks and initiate a call.
33bea19376a276f1f48990e88237092dbdee4f0b66b893ce188d683dae1156c5
SIP library for Metasploit is developed to help SIP Penetration Tests. It provides authentication feature that helps to create simple tests. It includes 5 different modules with authentication support: options tester, brute forcer, enumerator, invite tester and registration tester. All attacks could perform before and after authentication to fuzz SIP services and value added services.
41632950e1dfb5c8f4747d0ec339c406fcdc45963d3dde7254720e67bc738c64
This 250+ page document is a pentesting guide to using the Metasploit Framework. Written in Turkish.
b8f6fe8232b3bf30116e8fff2bb7ebd7f7879704c84e5874d496fd7ab235874c
Secunia Security Advisory - Fatih Ozavci and Caglar Cakici have reported some vulnerabilities in RSA KEON Registration Authority, which can be exploited by malicious people to conduct cross-site scripting attacks.
2a78f18e1de140d32f2b878fcd997505ecb3af1c092a4cb6fb1ded04361aeb3f
The RSA KEON Registration Authority Web Interface suffers from multiple cross site scripting vulnerabilities. Version 1.0 is susceptible.
26c310be669771da1384f9cf1a2df0bcb062948b01a68a3476d898341ac35511
Various HTTP content scanning systems fail to properly scan full-width/half-width Unicode encoded traffic. This may allow malicious content to bypass HTTP content scanning systems. Systems affected include Checkpoint Web Intelligence and IBM ISS Proventia Series systems.
ed7d99c4b0c8cf924026804e5a72dd264e34e794211f2f18d66d3c41fdd46077