{"id":382,"date":"2014-05-21T12:14:29","date_gmt":"2014-05-21T12:14:29","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=382"},"modified":"2023-03-24T12:53:10","modified_gmt":"2023-03-24T07:23:10","slug":"voip-penetration-testing-exploitation","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/","title":{"rendered":"VoIP Penetration Testing Part -I"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2014\/06\/voip-Copy-1024x600.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"voip Copy - Varutra Consulting\"><\/p>\n<h3><b>Abstract\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/b><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/Screen-Shot-2014-05-21-at-4.15.15-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-444 size-medium\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/Screen-Shot-2014-05-21-at-4.15.15-PM-300x120.png\" alt=\"VOIP\" width=\"253\" height=\"101\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/Screen-Shot-2014-05-21-at-4.15.15-PM-300x120.png 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/Screen-Shot-2014-05-21-at-4.15.15-PM.png 367w\" sizes=\"(max-width: 253px) 100vw, 253px\" \/><\/a><\/h3>\n<p style=\"text-align: justify\">Voice over Internet Protocol (VoIP) has seen rapid implementation over the past few years. Most of the organizations which have implemented VoIP are either unaware or ignore the security issues with VoIP and its implementation. Like every other network, a VoIP network is also susceptible to abuse. This document details, step by step, how to install and configure trixbox. It includes information on how to set up extensions, incoming and outgoing phone calls, VoIP penetration Testing, Caller ID Spoofing.<\/p>\n<p style=\"text-align: justify\">This is a four parts series tutorial detailing on how to conduct Penetration Testing on VoIP. For practical we will set up our own LAB with VoIP setup and attack against it.<\/p>\n<p style=\"text-align: justify\">In first tutorial, we will go through step-by-step instructions on how to install trixbox and understand various terms in VoIP.<\/p>\n<p>&nbsp;<\/p>\n<h3><b>What is trixbox?<\/b><\/h3>\n<p style=\"text-align: justify\">trixbox CE is an easy to install, VoIP Phone System based on the Asterisk PBX. trixbox is designed for home or office use. trixbox CE includes CentOS, Linux, MySQL, and all the tools needed to run a business quality phone system.<\/p>\n<p style=\"text-align: justify\">In October of 2006, the Asterisk@Home project was renamed to &#8220;trixbox&#8221; in order to get away from the being the small basement project that Andrew Gillis started back in 2004. Today it is known as trixbox CE (Community Edition) to differentiate itself from the trixbox Pro product that is available from Fonality, the company that sponsors the trixbox CE project. With over 100,00 installed systems, trixbox CE is the most popular full-featured, open source PBX distribution available.<\/p>\n<p>&nbsp;<\/p>\n<h3><b>What is VoIP?<\/b><\/h3>\n<p style=\"text-align: justify\">VoIP is a technology that allows telephone calls to be made over computer networks like the Internet. VoIP converts analog voice signals into digital data packets and supports real-time, two-way transmission of conversations using Internet Protocol (IP).&gt;<\/p>\n<p style=\"text-align: justify\">VoIP calls can be made on the Internet using a VoIP service provider and standard computer audio systems. Alternatively, some service providers support VoIP through ordinary telephones that use special adapters to connect to a home computer network. Many VoIP implementations are based on the H.323 technology standard.<\/p>\n<p>Here are some terms that you probably want to know:<br \/>\n<span style=\"font-family: Georgia;font-size: 14px\"><br \/>\n<b>SIP<\/b>: Session Initiation Protocol is one of the most widely used VoIP protocols. <\/span><br \/>\n<span style=\"font-family: Georgia;font-size: 14px\"><br \/>\n<b>H.323<\/b>: An ITU standard protocol.<\/span><br \/>\n<span style=\"font-family: Georgia;font-size: 14px\"><br \/>\n<b>IAX<\/b>: A new VoIP protocol introduced by Asterisk (Digium).<\/span><br \/>\n<span style=\"font-family: Georgia;font-size: 14px\"><br \/>\n<b>Codec:<\/b> Short for Coder-Decoder, algorithms used to convert audio into data. <\/span><br \/>\n<span style=\"font-family: Georgia;font-size: 14px\"><br \/>\n<b>DID<\/b>: Direct Inward Dial. A phone number mapped to VoIP.<\/span><br \/>\n<span style=\"font-family: Georgia;font-size: 14px\"><br \/>\n<b>CDR<\/b>: Call Detail Records.<\/span><br \/>\n<span style=\"font-family: Georgia;font-size: 14px\"><br \/>\n<b>PDD<\/b>: Post dial delay, delay after a number is dialed until the call is connected.<\/span><br \/>\n<span style=\"font-family: Georgia;font-size: 14px\"><br \/>\n<b>IP Phone<\/b>: Phone that connects to a network instead of a regular phone line.<\/span><br \/>\n<span style=\"font-family: Georgia;font-size: 14px\"><br \/>\n<b>ATA<\/b>: Analog Telephone Adapter.<\/span><br \/>\n<span style=\"font-family: Georgia;font-size: 14px\"><br \/>\n<b>Rate center<\/b>: Numbers within the same area code.<\/span><br \/>\n<span style=\"font-family: Georgia;font-size: 14px\"><br \/>\n<b>IVR<\/b>: Interactive voice recording that interacts with the caller via menus.<\/span><br \/>\n<span style=\"font-family: Georgia;font-size: 14px\"><br \/>\n<b>PBX<\/b>: Private branch exchange systems that interconnect extensions and phone lines.<\/span><br \/>\n<span style=\"font-family: Georgia;font-size: 14px\"><br \/>\n<b>Asterisk<\/b>: The most widely used open source PBX.<\/span><br \/>\n<span style=\"font-family: Georgia;font-size: 14px\"><br \/>\n<b>Direct route<\/b>: Channels to route calls to a specific destination.<\/span><br \/>\n<span style=\"font-family: Georgia;font-size: 14px\"><br \/>\n<b>Softphone<\/b>: Software based phone.<\/span><\/p>\n<p>For this tutorial, I have used following lab setup to demonstrate various security issues in VoIP.<\/p>\n<p>&nbsp;<\/p>\n<h3><b>Lab Setup for VoIP Testing:<\/b><\/h3>\n<p>1. Virtual Machine with following specification<\/p>\n<p>&#8211; Hard Disk &#8211; 10GB<\/p>\n<p>&#8211; RAM &#8211; 256MB<\/p>\n<p>2. Trixbox CE 2.6.2 (Stable)<\/p>\n<p><b>Steps to Install :<\/b><\/p>\n<ol>\n<li style=\"list-style-type: none\">\n<ol>\n<li>Download the trixbox CE 2.6.2 (Stable) ISO image from <a href=\"http:\/\/sourceforge.net\/projects\/asteriskathome\/files\/\">http:\/\/sourceforge.net\/projects\/asteriskathome\/files\/<\/a>. Burn this image into DVD.<\/li>\n<li>Start the virtual machine. You will see a cool green screen of trixbox installation. Now press <b>ENTER<\/b> to install trixbox.<\/li>\n<li>It will ask you to select the language, so select the language of your choice. \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00a0 <a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-383 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/1.jpg\" alt=\"Select the language of your choice\" width=\"628\" height=\"353\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/1.jpg 628w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/1-300x169.jpg 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/a><\/li>\n<li>Select appropriate timezone.<\/li>\n<li>Now it will ask for <b>root Password<\/b>. Enter the password of your choice and confirm it by pressing <strong>OK<\/strong><b>.\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0<\/b> \u00a0\u00a0\u00a0 <a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-384 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/2.jpg\" alt=\"root password\" width=\"628\" height=\"353\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/2.jpg 628w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/2-300x169.jpg 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/a><\/li>\n<li>After installation, machine will be restarted and you will see following welcome screen.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-385 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/3.jpg\" alt=\"trickbox\" width=\"532\" height=\"318\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/3.jpg 532w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/3-300x179.jpg 300w\" sizes=\"(max-width: 532px) 100vw, 532px\" \/><\/a><\/li>\n<li>At this point you will be asked to enter username and password. \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Login:<em>root<\/em>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Password: <em>Enter the one you have gave during the installation. \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0 <a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-386 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/4.jpg\" alt=\"Welcom to trickbox\" width=\"561\" height=\"266\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/4.jpg 561w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/4-300x142.jpg 300w\" sizes=\"(max-width: 561px) 100vw, 561px\" \/><\/a><br \/>\n<\/em><\/li>\n<li>After assigning IP address you can login to GUI. Open your browser and enter the server IP. In our case it is\u00a0 http:\/\/192.168.0.126 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-387 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/5.jpg\" alt=\"login to GUI\" width=\"628\" height=\"353\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/5.jpg 628w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/5-300x169.jpg 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/a><\/li>\n<li>Click on the &#8220;<b>switch<\/b>&#8221; web link at the upper right corner of the screen to enter into the Admin mode. \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-388 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/6.jpg\" alt=\"Switch web link\" width=\"628\" height=\"242\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/6.jpg 628w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/6-300x116.jpg 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/a><\/li>\n<li>When a popup appears, enter the following default credentials.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>User Name: <em>maint<\/em><br \/>\nPassword: <em>password<\/em>\u00a0 \u00a0\u00a0<em> \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/em><\/p>\n<p><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0 <em><br \/>\n<a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/7.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-389 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/7.jpg\" alt=\"Authentication\" width=\"628\" height=\"353\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/7.jpg 628w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/7-300x169.jpg 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/a><\/em><\/em>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 11.\u00a0 After successful login you will see the\u00a0 trixbox platform as shown below.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/8.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-390 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/8.jpg\" alt=\"trixbox platform\" width=\"628\" height=\"285\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/8.jpg 628w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/8-300x136.jpg 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/a><\/p>\n<p>We have successfully installed trixbox platform and lets move ahead to understand about security issues on VoIP. Let us start with the Information Gathering phase of Penetration Testing.<\/p>\n<p>&nbsp;<\/p>\n<h3><b><span style=\"text-decoration: underline\">VoIP Google Hacking<\/span><\/b><\/h3>\n<p>Google Hacking uses search engine like Google to find vulnerable web server and websites. Google Hacking makes use of special search queries to locate servers and web application running with inadequate security or with no security.<\/p>\n<p>For detail information on Google Hacking please visit:<\/p>\n<p><a href=\"http:\/\/en.wikipedia.org\/wiki\/Google_hacking\">http:\/\/en.wikipedia.org\/wiki\/Google_hacking<\/a><\/p>\n<p><a href=\"http:\/\/mkbonlinereputatie.nl\/wp-content\/uploads\/2014\/02\/Google-advanced-search.pdf\">http:\/\/mkbonlinereputatie.nl\/wp-content\/uploads\/2014\/02\/Google-advanced-search.pdf<\/a><\/p>\n<p>In this tutorial we will try to learn how to use Google Dorks for getting as much information as possible about the target.<\/p>\n<p>Some of the dorks related to VoIP are mentioned below.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/9.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-391 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/9.jpg\" alt=\"dorks related to VoIP\" width=\"628\" height=\"221\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/9.jpg 628w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/9-300x106.jpg 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/a><\/p>\n<p>You can also use Google to find several web management front end i.e. web based login of Asterisk.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/10.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-392 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/10.jpg\" alt=\"web based login of Asterisk\" width=\"625\" height=\"111\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/10.jpg 625w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/10-300x53.jpg 300w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/a><\/p>\n<p><span style=\"text-decoration: underline\"><b>Enumerating TFTP Server<\/b><\/span><\/p>\n<p style=\"text-align: justify\">Many VoIP phones use a <a href=\"http:\/\/en.wikipedia.org\/wiki\/Trivial_File_Transfer_Protocol\">Trivial File Transfer Protocol<\/a> (TFTP) server to download configuration settings each time they power on. TFTP does not require any authentication to upload or download files, so one of the easiest way for an attacker to compromise a VoIP network is to attack the TFTP server which uses UDP port 69. Attackers can simply looking for listening services on UDP port 69 find out TFTP service running.<\/p>\n<p style=\"text-align: justify\">TFTP is insecure, as it requires no authentication to upload or fetch a file. Many phones first try to download a configuration file. Sometimes this configuration file is a derivative of the phone&#8217;s MAC address.<\/p>\n<p>In this tutorial, I have used below mentioned Google Dork to enumerate TFTP.<\/p>\n<p><em><b>inurl:&#8221;NetworkConfiguration&#8221; cisco<\/b><\/em><\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/11.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-393 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/11.jpg\" alt=\"Network Configuration\" width=\"628\" height=\"390\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/11.jpg 628w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/11-300x186.jpg 300w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/a><\/p>\n<p>Now lets carry out enumeration on target TFTP IP using BackTrack Pentest Tools:<\/p>\n<ol>\n<li style=\"list-style-type: none\">\n<ol>\n<li style=\"text-align: left\">\u00a0Go to <b>\/pentest\/cisco\/tftp-bruteforce.<\/b> To run this tool you have to enter below command.<br \/>\n<em><strong>.\/tftp-bruteforce.pl TFTP Server IP Address brutefile.txt 10<\/strong><b> <\/b>brutefile.txt<b> <\/b><\/em>file contains names of the configuration file.<br \/>\n<a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/12.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-394 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/12.jpg\" alt=\"configuration file\" width=\"624\" height=\"257\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/12.jpg 624w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/12-300x124.jpg 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><\/li>\n<li>Use <b>tftp <\/b>command to retrieve the configuration file.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/13.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-395 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/05\/13.jpg\" alt=\"tftp command\" width=\"621\" height=\"78\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/13.jpg 621w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/05\/13-300x38.jpg 300w\" sizes=\"(max-width: 621px) 100vw, 621px\" \/><\/a><\/p>\n<p style=\"text-align: justify\">There are three essential steps that a pentester needs to perform to get a good picture of an organization\u2019s network layout.<\/p>\n<p>In next tutorial<a href=\"https:\/\/www.varutra.com\/blog\/?p=477\"> VoIP Penetration Testing Part-II<\/a> we will learn on these steps such as Footprinting, Scanning and Enumeration.<\/p>\n<p>Written By,<\/p>\n<p><em>Attack &amp; PenTest Team,<\/em><\/p>\n<p><em>Varutra Consulting<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Abstract\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Voice over Internet Protocol (VoIP) has seen rapid implementation over the past few years. Most of the organizations which have implemented VoIP are either&#8230;<\/p>\n","protected":false},"author":3,"featured_media":3259,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[261,273,274,275,57],"tags":[571,63],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"VoIP has seen rapid implementation over the past few years. Learn how to do Information Gathering and identify the target IP address of the TFTP server.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"VoIP Penetration Testing - Info Gathering &amp; identify IP\" \/>\n\t\t<meta property=\"og:description\" content=\"VoIP has seen rapid implementation over the past few years. Learn how to do Information Gathering and identify the target IP address of the TFTP server.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/06\/voip-Copy.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/06\/voip-Copy.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t\t<meta property=\"article:section\" content=\"Ethical Hacking\" \/>\n\t\t<meta property=\"article:tag\" content=\"voip\" \/>\n\t\t<meta property=\"article:tag\" content=\"voip penetration testing\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2014-05-21T12:14:29+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2023-03-24T07:23:10+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"VoIP Penetration Testing - Info Gathering &amp; identify IP\" \/>\n\t\t<meta name=\"twitter:description\" content=\"VoIP has seen rapid implementation over the past few years. Learn how to do Information Gathering and identify the target IP address of the TFTP server.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/06\/voip-Copy.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-exploitation\\\/#article\",\"name\":\"VoIP Penetration Testing - Info Gathering & identify IP\",\"headline\":\"VoIP Penetration Testing Part -I\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2014\\\/06\\\/voip-Copy.png\",\"width\":1280,\"height\":750,\"caption\":\"voip - Copy\"},\"datePublished\":\"2014-05-21T12:14:29+05:30\",\"dateModified\":\"2023-03-24T12:53:10+05:30\",\"inLanguage\":\"en-US\",\"commentCount\":7,\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-exploitation\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-exploitation\\\/#webpage\"},\"articleSection\":\"Ethical Hacking, Security Best Practices, Security Hardening, VoIP Penetration Testing, Vulnerability Disclosure, VOIP, VoIP Penetration Testing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-exploitation\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-exploitation\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-exploitation\\\/#listItem\",\"position\":2,\"name\":\"VoIP Penetration Testing Part -I\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-exploitation\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-exploitation\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-exploitation\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-exploitation\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-exploitation\\\/\",\"name\":\"VoIP Penetration Testing - Info Gathering & identify IP\",\"description\":\"VoIP has seen rapid implementation over the past few years. Learn how to do Information Gathering and identify the target IP address of the TFTP server.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-exploitation\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2014\\\/06\\\/voip-Copy.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-exploitation\\\/#mainImage\",\"width\":1280,\"height\":750,\"caption\":\"voip - Copy\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-exploitation\\\/#mainImage\"},\"datePublished\":\"2014-05-21T12:14:29+05:30\",\"dateModified\":\"2023-03-24T12:53:10+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>VoIP Penetration Testing - Info Gathering &amp; identify IP<\/title>\n\n","aioseo_head_json":{"title":"VoIP Penetration Testing - Info Gathering & identify IP","description":"VoIP has seen rapid implementation over the past few years. Learn how to do Information Gathering and identify the target IP address of the TFTP server.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"VoIP Penetration Testing - Info Gathering &amp; identify IP","og:description":"VoIP has seen rapid implementation over the past few years. Learn how to do Information Gathering and identify the target IP address of the TFTP server.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/06\/voip-Copy.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/06\/voip-Copy.png","og:image:width":"1280","og:image:height":"750","article:section":"Ethical Hacking","article:tag":["voip","voip penetration testing"],"article:published_time":"2014-05-21T12:14:29+00:00","article:modified_time":"2023-03-24T07:23:10+00:00","twitter:card":"summary_large_image","twitter:title":"VoIP Penetration Testing - Info Gathering &amp; identify IP","twitter:description":"VoIP has seen rapid implementation over the past few years. Learn how to do Information Gathering and identify the target IP address of the TFTP server.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/06\/voip-Copy.png","twitter:label1":"Written by","twitter:data1":"kalpadmin","twitter:label2":"Est. reading time","twitter:data2":"5 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/#article","name":"VoIP Penetration Testing - Info Gathering & identify IP","headline":"VoIP Penetration Testing Part -I","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/06\/voip-Copy.png","width":1280,"height":750,"caption":"voip - Copy"},"datePublished":"2014-05-21T12:14:29+05:30","dateModified":"2023-03-24T12:53:10+05:30","inLanguage":"en-US","commentCount":7,"mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/#webpage"},"articleSection":"Ethical Hacking, Security Best Practices, Security Hardening, VoIP Penetration Testing, Vulnerability Disclosure, VOIP, VoIP Penetration Testing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/#listItem","position":2,"name":"VoIP Penetration Testing Part -I","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/","name":"VoIP Penetration Testing - Info Gathering & identify IP","description":"VoIP has seen rapid implementation over the past few years. Learn how to do Information Gathering and identify the target IP address of the TFTP server.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/06\/voip-Copy.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/#mainImage","width":1280,"height":750,"caption":"voip - Copy"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/#mainImage"},"datePublished":"2014-05-21T12:14:29+05:30","dateModified":"2023-03-24T12:53:10+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"382","title":"VoIP Penetration Testing - Info Gathering &amp; identify IP","description":"VoIP has seen rapid implementation over the past few years. Learn how to do Information Gathering and identify the target IP address of the TFTP server.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"VOIP\",\"score\":100,\"analysis\":{\"keyphraseInTitle\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInURL\":{\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/06\/voip-Copy.png","og_image_width":"1280","og_image_height":"750","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Ethical Hacking","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"Article","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:18:10","updated":"2023-03-24 07:31:35"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/ethical-hacking\/\" title=\"Ethical Hacking\">Ethical Hacking<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tVoIP Penetration Testing Part -I\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Ethical Hacking","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/ethical-hacking\/"},{"label":"VoIP Penetration Testing Part -I","link":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-exploitation\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/382"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=382"}],"version-history":[{"count":6,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/382\/revisions"}],"predecessor-version":[{"id":21207,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/382\/revisions\/21207"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/3259"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}