🤖
Guides
  • Introduction
  • Beginners
    • Getting Started
  • Guides
    • SQLi Walkthrough
    • My First BoF
    • OSCP Buffer Overflow Guide (Windows)
    • Parrot OS customisation
    • Terminal Customisation
    • Video Guides
  • Cheat Sheets
    • Reverse Shells
    • Tunnelling, Pivoting and Proxies
    • SQL Injection
      • WAF Bypass
      • SQLMap
      • DBMS Cheatsheets
        • MSSQL
        • MySQL
        • Oracle
        • SQLite
        • PostgreSQL
      • References
    • Bash Cheat Sheets
      • Terminal
      • Find
      • Grep
      • Sed
      • Awk
      • Xargs
      • System
      • Download
      • Networking
      • Hardware
      • Variable
      • Math
      • Data Manipulation
      • Random
      • Time
      • Condition and Loop
      • Other
    • OSINT
    • Ping Sweeps
  • Methodologies
    • VOIP Checklist
    • OWASP v4 Checklist
    • External Inf
    • Internal Infrastructure
  • Linux
    • Checklist - Linux Priv Esc
  • Windows
    • Checklist - Windows Priv Esc
  • Things to do/look at
Powered by GitBook
On this page

Was this helpful?

  1. Methodologies

VOIP Checklist

  • VoIP-001 – VLAN hopping from data network to voice network

  • VoIP-002 – Extension Enumeration & Number Harvesting

  • VoIP-003 – Capturing SIP Authentication

  • VoIP-004 – Eavesdropping Calls

  • VoIP-005 – CallerID spoofing

  • VoIP-006 – RTP injection

  • VoIP-007 – Signaling Manipulation

  • VoIP-008 – Identification of insecure services

  • VoIP-009 – Testing for Default Credentials

  • VoIP-010 – Application level vulnerabilities

  • VoIP-011 – Voice Mail Attacks

  • VoIP-012 – Phone Firmware Analysis

PreviousPing SweepsNextOWASP v4 Checklist

Last updated 4 months ago

Was this helpful?