Project LOG

advertisement
TEL 500
VOICE COMMUNICATIONS
Project LOG
SUBMITTED BY: MAHIDHAR PENIGI
LOG
The SIP is an open software and is a text based protocol, there is no proper security design
and so that's the reason there are some vulnerability's in SIP. Basically SIP is a signaling
protocol and the designing part is very complex . By adding the extensions it becomes very
complex and also it becomes more complicated VoIP protocol.
Here in the project we are planning to use packet tracer or the GNS3 for showing some of the
SIP attacks.
09/26/2013
Project Proposal
10/05/13
Research on SIP basics
10/10/13
Research on SIP vulnerabilities
10/15/13
11/2/13
Learn and Implement SIP session process on CISCO packet tracer
5.0 or the GNS 3
Implemented few attacks
11/15/13
Completed document ready for submission
11/20/13
Complemented power point ready for presenting
11/25/13
Implemented the IP spoofing
In the second class I learnt about what is SIP and what are the functions of the SIP, working and
the features of the SIP.
In the third class we learnt about the vulnerabilities in the SIP like IP Spoofing, Registration
attacks, DOS (Denial of service attacks), DDOS (Distributed Denial of Service Attacks).
In the fourth class I learnt about how can we implement attacks in the packet tracer and started
working on IP spoofing and man in the middle attacks in the lab.
In the fifth and the sixth class I prepared the documentation and the presentation.
In the seventh class successfully implemented the IP Spoofing attack.
Download