Today we can easily say that SIP is the leading protocol on the VoIP systems. The success of SIP is certainly result of simple and robust architecture of this protocol. However, like every other protocol SIP has several weaknesses.
Some may know that I really enjoy working on wireless security. However, pentesting tools for wireless systems usually are not so mobile as it should be.
For one of my projects, I was having need of a SIP scanner. This SIP scanner should not only use SIP OPTIONS but also use unimplemented SIP messages to scan a network. I’ve checked such a tool on the web […]
Companies are demanding more and more security for their systems on nowadays. Depending on the IT budget and awareness of security threats on the management level, they track new vulnerabilities to keep their software up-to-date, hire more information security engineers, […]
Another introduction level training of mine about XSS and SQL injections. If you need some presentation material for your about to do training then you can use mine as you wish.
I gave a brief training about cryptography last week. For anyone who need the presentation files, you can find them here.
Yesterday, I had some time to write a Turkish keyboard layout file for Rubber Ducky so that I can use it easily on TR(Q) keyboards. You can download it from the following link.
Last week Melih Taş (@artinscience) and I made a brief introduction about VoIP networks and security issues on these networks at Siber Guvenlik Dernegi. Presentation files can be downloaded from the below link (unfortunately both of them are only in […]