Thank you for letting me hacking your PBX/UC network!

Brute force attack against voice systems is a real, and growing, problem. In a denial-of-service (DoS) attack, the goal is to make a resource unavailable to its intended users, usually in a temporary interruption or suspension of services. DoS attacks are well known in data systems and networks, but can also happen to a telecom Read more about Thank you for letting me hacking your PBX/UC network![…]

How to prevent vulnerabilities threaten VoIP deployments

Data breaches can bring businesses to their knees – disrupting services and tarnishing the reputations of brands. VoIP services aren’t immune to data theft. Just last year, a breach at Secures Technologies compromised 70 million records across 37 states. The company provides phone services to prisons, and the breach raised privacy concerns because it affected Read more about How to prevent vulnerabilities threaten VoIP deployments[…]

Designing Networks for Unified Communications

Many networks are designed for data traffic. Real-time traffic like voice and video add new requirements for network design, operation, and troubleshooting. Was your network designed for data traffic and then modified to handle UC&C traffic? If so, you’re not alone. Most networks are primarily designed for data. Support for real-time traffic like voice, video, Read more about Designing Networks for Unified Communications[…]

VoIP Hacking—What’s in it for the Attacker?

With so many high profile data breaches making the headlines, it’s easy to forget that IP Communications systems are routinely targeted for attack. While it may be clear what the criminals were looking for when they stole credit card data or government employee data, it may not be as obvious as to why hackers are Read more about VoIP Hacking—What’s in it for the Attacker?[…]

How the button bar in SecureCRT can help

A lot of people use SecureCRT as default telnet/ssh program. The developers of SecureCRT has built in some usefull tricks that helps you to automate your work. An example is the Button Bar.   View/Hide the Button Bar SecureCRT’s button bar is a customizable row of buttons you can use for quick access to saved Read more about How the button bar in SecureCRT can help[…]

Conditional Logging – ACME Packet

Since the release of 7.x there have been a number of new enhancements. One of the most useful new features is Advanced Logging. This is like getting debug output in a log file without having to enable full debug. By setting a condition (or set of conditions) the SBC will capture the interesting traffic to Read more about Conditional Logging – ACME Packet[…]

Audiocodes E-SBC: howto remove ;ext= from INVITE header

Sometimes PBX platforms doesn’t like INVITE headers that has an element included that contains ;ext=. In order to remove this aspect from an INVITE the ;ext= element needed to be stripped from the INVITE header using a Message Manipulation on the AudioCodes E-SBC. On an AudioCodes devices running version 6.8 of the firmware, the following Read more about Audiocodes E-SBC: howto remove ;ext= from INVITE header[…]

Acme Packet ACLI – Useful Commands to Know

Recently someone asked what some of the most useful commands are on the ACME Packet Session Director after performing a fresh install/configuration of an SD. The following was provided by one of the Acme Packet Systems Engineers in response to the inquiry. show sipd sessions all – Will display all of the active SIP sessions Read more about Acme Packet ACLI – Useful Commands to Know[…]