VoIP Pentesting (W47)

(1 customer review)


20 items sold

Courses Included

Out of stock

Product Description

The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription

This course gives students a practical chance of assessing the security of a VoIP infrastructure by securely trying to exploit vulnerabilities that exist. In this course, we’ll look for active VoIP user accounts, record ongoing conversations and then simulate a fake VoIP call using a SIP account of any valid user (or tag the ID of the fake call to be coming from the “CEO”).

VoIP is one of the fastest growing technologies and is receiving lots of attention from service providers and users due to its cost and flexibility. Students who enroll in this course will get an understanding of how to setup a VoIP network and then analyze it for vulnerabilities.

When you join, you will be given access to code used in the course. The workshop will also present clear steps required to install labs, configure them, test and then observe results.

In this course:

  • You will be given an introduction to VoIP and then practice with hands-on labs on how to identify vulnerabilities within the VoIP network.
  • You will learn how to setup an asterisk server, install softphones and analyze data captured using Wireshark.
  • We will cover the preparation of a bootable drive for the Debian OS, Kali Linux and the installation of the Android OS as guests in a virtual box that sits on a Windows base.

Course benefits:

What skills will you gain?

  • Configuring an asterisk/trixbox VoIP server and test it with softphones.
  • Performing VoIP vulnerability testing.
  • Identifying vulnerabilities in a VoIP network.
  • Using the DOS tool inviteflood and sending SIP invite messages which flood udp.
  • Using tools such as inviteflood to tweak display names for VoIP calls.
  • Troubleshooting network connectivity issues between an asterisk server and SIP phones.
  • Configuring Wireshark and use it to gather data about a VoIP network.
  • Exploiting networks and servers to gain access to VoIP systems.  

You will learn about:

  • Configuration required for asterisk/trixbox VoIP server - which is a big name in open source PBX software.
  • Configuration required to setup an SIP VoIP phone.
  • Wireshark’s ability to eavesdrop VoIP calls and playback audio from RTP.
  • Appropriate security measures (vlan tagging, shutting all unused ports, etc.) for VoIP networks.

Only open source tools will be used:

  • Kali Linux OS
  • VirtualBox to house guest OS
  • Android OS
  • inviteflood tool
  • Wireshark
  • asterisk server
  • linphone (VoIP application tool)
  • trixbox, formerly known as "Asterisk@Home", is a CentOS Linux distribution that provides an open source telephony package based on the famous Asterisk Voice-over-IP PBX even though it is no longer updated

Course general information: 

DURATION: 18 hours

CPE POINTS: On completion you get a certificate granting you 18 CPE points. 

Course available on demand

Course format: 

  • Self-paced
  • Pre-recorded
  • Accessible even after you finish the course
  • No preset deadlines
  • Materials are video, labs, and text
  • All videos captioned

What will you need?

  • Latest VirtualBox source file
  • 1 PC - Windows 7 32/64 Bits
  • Hard disk: Minimum 50GB of free space
  • RAM: 6GB Minimum but 8GB recommended
  • Minimum dual core CPU (Intel prefered, i3, i5 or i7)
  • 2 free USB ports
  • Source of internet to download up to 5GB data

What should you know before you join?

  • TCP/IP and networking fundamentals
  • Basic knowledge of command line tools for Windows and Linux
  • Foundation in IT and Networking

Your instructor: Richard Azu

Richard has a Diploma in Telecommunications Engineering from the Multimedia University – Malaysia and a Bsc. Engineering Physics from the University of Cape Coast, Ghana.

He’s currently a member of the Institution of Engineering and Technology (IET  - UK).

With over 16 years of experience in Network/Telecom Engineering, he’s experienced in the deployment of voice and data over the media; radio, copper and fibre.

He is currently looking for ways to derive benefit from the WDM technology in Optics. Using Kali as a springboard, he has developed an interest in digital forensics and penetration testing.



Module 0: Before the course

  • Introduction to POTS (Plain Old Telephone Service)
  • Circuit and Packet-switched networks
  • OSI model
  • IP based networks

Module 1: Overview on The Voice over Internet Protocol

In this module you will build a strong foundation towards setting up VoIP networks and troubleshooting related incidents, broaden your understanding of the structure of VoIP, its protocols, and how they depend on TCP/IP.

  • You will build the key foundation required to grasp the nature of VoIP.
  • You will gain the foundational knowledge and fundamental concepts required to test a VoIP infrastructure.
  • You will configure a VoIP server (trixbox) and a softphone.
  • You will start to understand how to secure vulnerable protocols and features of VoIP that allow calls to be eavesdropped.

Covered topics:

  • Fundamentals of VoIP
  • Benefits of VoIP
  • Basic structure and fundamentals of VoIP
  • Relevant protocols in VoIP
  • Configuring VoIP
  • Lab – setting up trixbox and softphone

Module 1 exercises:

Lab 1- setting up of trixbox VoIP server and Zoiper/Linphone softphone

  • You will be presented with three scenarios to configure a unique VoIP server setup and then observe the outcome using a softphone.
  • Simulations testing theory on VoIP structure and its protocols.

How do the exercises reinforce the module?

  • You will have a chance to experiment with real-life scenarios and imitate actual skills of setting up VoIP.
  • You will gain a real-life experience of setting up VoIP.
  • You will get the confidence to make their own choices, from the various options available, based on their own understanding of the situation.

What “proof of work” will the students need to provide?

  • Screenshots
  • Config scripts

Module 1 workload total =  5 hours 30 minutes

Module 2: Introduction to Wireshark for VoIP pentesting

This module will guide students on how to work with Wireshark on VOiP networks, to capture live packet data from a network interface, filter packets with rules, analyze data in each bit of captured packets, and capture plaintext passwords.

  • You will study how Wireshark does a deep inspection of all packets leaving and entering a network interface and view a cross section of the minutest activities occurring in a network.
  • You’ll analyze basic and advanced features of Wireshark, and run labs.
  • You will get to use Wireshark in standard, self-defined and tweaked scenarios achieving a myriad of results. As part of this module, we’ll capture plaintext passwords for unsecured negotiations.

Module 2 covered topics:

  • Features of Wireshark
  • Protocol dissectors
  • VoIP protocols overview
  • Advanced filtering and analysis
  • Live capture from different network interfaces
  • Analysis of Telephony protocols
  • VoIP call detection, analysis and playback

Module 2 exercises:

Lab 2 – Setting up Wireshark on a host machine for basic and advanced tests, Guest OS on VirtualBox

Three Lab Questions that will require students to:

  • Detect VoIP calls, analyze and playback
  • Analyze different telephony protocols
  • Capture live traffic from network interfaces

How do the exercises reinforce the module?

  • You will experiment with real-life scenarios and imitate actual skills in running Wireshark.
  • You will gain real-life experience of running and getting results from the Wireshark tool.

What “proof of work” will the students need to provide?

  • Screenshots
  • Config scripts

Module 2 workload total = 4 hours 40 minutes

Module 3: Penetration testing tools for VoIP in Kali Linux

This module will begin with the installation of softphones on an Android OS. We’ll also look at the installation and configuration of an asterisk server in Kali Linux. And finally, analyze the inviteflood and six other tools including Metasploit embedded within Kali.

  • You will get familiar with seven tools on Kali Linux that are useful for VoIP pentesting - inviteflood, nmap, ntcat, unicornscan, openvas, nikto, metasploit. 
  • You will go through a simulation of real-world external testing where these tools are used to deny users from accessing a service, completely shut down a service or eavesdrop data from running services.

Module 3 covered topics:

Basic and advanced features of:

  • inviteflood
  • nmap
  • netcat
  • unicornscan
  • openvas
  • nikto
  • metasploit

Module 3 exercises:

Lab 3 - Setting up of  softphones and configuration of asterisk server in Kali Linux

Seven Lab Questions testing students’ ability to use the tools to scan or launch attacks.

How do the exercises reinforce the module?

  • You will experiment with real-life scenarios and use actual skills in launching attacks or scanning for vulnerabilities using the seven tools.

What “proof of work” will the students need to provide?

  • Screenshots
  • Config scripts

Module 3 workload total: 4 hours 20 minutes

Module 4: Penetration testing in action

In this module, we’ll use open source tools to identify the vulnerabilities of a VoIP network and then launch the attack by conducting a spoof call using fake ID. We’ll discuss the necessary stages required for identifying and taking advantage of the vulnerability of a VoIP.

  • You will learn about enumeration, which is the key to every successful penetration testing. 
  • You will see how a real-life VoIP attack would be launched.
  • You will expose VoIP vulnerabilities and use inviteflood to initiate a spoofed call.
  • Finally, you will tie all knowledge gained from previous modules and use it in action in the labs. 

Module 4: covered topics

  • Theory on Enumeration
  • Theory and labs on: smap, svmap, swar
  • Attack demonstration
  • Conclusion

Module 4 exercises: Simulating a spoof attack

Four Lab Questions testing students’ ability to use the tools to scan or launch attacks.

Simulations testing knowledge gained in Enumeration and theory in the basic features of the tools:

  • smap
  • svmap
  • swar

How do the exercises reinforce the module?

  • The exercises give students a chance to experiment with real-life scenarios and imitate actual skills in launching VoIP attacks.

What “proof of work” do you want the students to provide?

  • Screenshots
  • Config scripts

Module 4 total workload: 4 hours

Final exam

  • Sixty unique MCQ testing key knowledge gained from all the modules (from VoIP through Wireshark and its tools then to Enumeration)
  • Test your ability to execute a real-time attack and to capture traffic using Wireshark.
  • Create a VoIP network with specific details – setting up a VoIP server, user accounts on a softphone, run Wireshark to monitor all actions, and then launch the attack from inviteflood. Screenshots (and in some cases, config scripts) will be required for each stage.

Final exam workload total = 3 hours


If you have any questions, please contact our eLearning Manager at [email protected].


1 review for VoIP Pentesting (W47)

  1. Mr Ray

    This course is not just educational, it is also exciting because of its hands-on approach. Riding on basic networking principles, it introduces the students to VoIP networking concepts – evolution, components, configurations and modes of operation. Students then have the opportunity to set up fully functional VoIP networks within their virtual environments of choice. Various tools are then used to enumerate the vulnerabilities within the VoIP networks, and the tactics, techniques and procedures for exploiting these vulnerabilities are laid out and executed. And all these are backed by an experienced tutor and a great support team who offer help in case any student hits a brick wall. So if you’re looking to gain insight into the vulnerabilities that may exist within your VoIP network or you’re just up for a cyber adventure into the VoIP world, look no further.

Only logged in customers who have purchased this product may leave a review.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.