TEL 500 VOICE COMMUNICATIONS Project LOG SUBMITTED BY: MAHIDHAR PENIGI LOG The SIP is an open software and is a text based protocol, there is no proper security design and so that's the reason there are some vulnerability's in SIP. Basically SIP is a signaling protocol and the designing part is very complex . By adding the extensions it becomes very complex and also it becomes more complicated VoIP protocol. Here in the project we are planning to use packet tracer or the GNS3 for showing some of the SIP attacks. 09/26/2013 Project Proposal 10/05/13 Research on SIP basics 10/10/13 Research on SIP vulnerabilities 10/15/13 11/2/13 Learn and Implement SIP session process on CISCO packet tracer 5.0 or the GNS 3 Implemented few attacks 11/15/13 Completed document ready for submission 11/20/13 Complemented power point ready for presenting 11/25/13 Implemented the IP spoofing In the second class I learnt about what is SIP and what are the functions of the SIP, working and the features of the SIP. In the third class we learnt about the vulnerabilities in the SIP like IP Spoofing, Registration attacks, DOS (Denial of service attacks), DDOS (Distributed Denial of Service Attacks). In the fourth class I learnt about how can we implement attacks in the packet tracer and started working on IP spoofing and man in the middle attacks in the lab. In the fifth and the sixth class I prepared the documentation and the presentation. In the seventh class successfully implemented the IP Spoofing attack.