Re: VOIP Pen TEST

From: Elad Shapira (eladexposed@gmail.com)
Date: Mon Nov 26 2007 - 16:38:39 EST


Hello,

you can start by checking out the following links:

http://www.vopsecurity.org/

http://www.voipsa.org/

there're more others for VOIP evaluation and pen tests. if you need
more info pls tell me.

Kind Regards,

Elad Shapira ("Zest" )

"Security, however, is an art, not a science." - RFC 3631

On Nov 26, 2007 7:32 AM, <harshad.mengle@wipro.com> wrote:
>
>
> Hi All:
>
> I am looking for a Information on VOIP Pen Test. If anybody has worked
> on it.
>
> Pls share his experience.
>
> Regards,
>
> Harshad
>
> -----Original Message-----
> From: listbounce@securityfocus.com [mailto:listbounce@securityfocus.com]
> On Behalf Of Gleb Paharenko
> Sent: Sunday, November 25, 2007 4:23 PM
> To: Attari Attari
> Cc: pen-test@securityfocus.com
> Subject: Re: Pen Test Success Factors
>
> Hi.
>
> The question seems be deeply related to "what is security?".
>
> In my opinion there is an important factor except vulnerabilities -
> information disclosure about network topology, versions of installed
> software which are discovered using black box testing.
>
> In case information leaks were not found, you can show your methodology
> of security testing, checklists. For each application you can define the
> vector of possible attacks and methods how to check if an application is
> vulnerable. Checklists for hardening software also show that system is
> secure enough.
>
>
>
> 2007/11/21, Attari Attari <c70n3@yahoo.co.in>:
> > Hi List,
> >
> > For a client to evaluate success of a pen test what would go down as
> > Key Success Factors. I spoke to one client and he opined that more
> > issues a pen tester finds the more successful it is for them and
> > highlights the quality of tester. They also feel that if tester has
> > found few or no vulnerabilities, the testers are simply no good. I
> > know majority of testers on this list would disagree with this, and
> > right so.
> >
> > In such a case what we as testers could communicate acceptable success
>
> > factors to the client, in priority order?
> >
> > Clone
> >
> >
> > Save all your chat conversations. Find them online at
> > http://in.messenger.yahoo.com/webmessengerpromo.php
> >
> >
> > ----------------------------------------------------------------------
> > --
> > This list is sponsored by: Cenzic
> >
> > Need to secure your web apps NOW?
> > Cenzic finds more, "real" vulnerabilities fast.
> > Click to try it, buy it or download a solution FREE today!
> >
> > http://www.cenzic.com/downloads
> > ----------------------------------------------------------------------
> > --
> >
> >
>
>
> --
> Best regards.
> Gleb Pakharenko.
>
> ------------------------------------------------------------------------
> This list is sponsored by: Cenzic
>
> Need to secure your web apps NOW?
> Cenzic finds more, "real" vulnerabilities fast.
> Click to try it, buy it or download a solution FREE today!
>
> http://www.cenzic.com/downloads
> ------------------------------------------------------------------------
>
>
>
> The information contained in this electronic message and any attachments to this message are intended for the exclusive use of the addressee(s) and may contain proprietary, confidential or privileged information. If you are not the intended recipient, you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately and destroy all copies of this message and any attachments.
>
> WARNING: Computer viruses can be transmitted via email. The recipient should check this email and any attachments for the presence of viruses. The company accepts no liability for any damage caused by any virus transmitted by this email.
>
> www.wipro.com
>
> ------------------------------------------------------------------------
> This list is sponsored by: Cenzic
>
> Need to secure your web apps NOW?
> Cenzic finds more, "real" vulnerabilities fast.
> Click to try it, buy it or download a solution FREE today!
>
> http://www.cenzic.com/downloads
> ------------------------------------------------------------------------
>
>

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:13 EDT