[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <46F18AD6.6070605@secniche.org>
Date: Wed, 19 Sep 2007 13:47:18 -0700
From: Aditya K Sood <zeroknock@...niche.org>
To: full-disclosure@...ts.grok.org.uk
Subject: [Mlabs] Scrutinising SIP Payloads : Traversing
Attack Vectors in VOIP and IM
Hi
I have released core research paper on SIP comprising of Payload
problems and Attack vectors.
This research paper lays stress on the potential weaknesses present in
the SIP which make it vulnerable to stringent attacks. The point of
discussion is to understand the weak spots in the protocol. The payloads
constitute the request vectors. The protocol inherits well defined
security procedures and implementation objects. The security model is
hierarchical and is diverged in every working layer of SIP from top to
bottom. SIP features can be exploited easily if definitive attack base
is subjugated. We will discuss about inherited flaws and methods to
combat against predefined attacks. The payloads have to be scrutinized
at the network level. It is critical because payloads are
considered as infection bases to infect networks . The pros and cons
will be enumerated from security perspective.
You can download paper at:
http://mlabs.secniche.org
Regards
Aks aka 0kn0ck
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists