Sunday, September 13, 2009
Steganography meets VoIP in hacker world
An excellent way to hide messages or malicious payloads, making use of the unused UDP-RTP bits on a voice stream. I bet I can see the malformed or modified part of the RTP stream on Wireshark! Back to the lab for some tests!
Complete details on the link below.
Steganography meets VoIP in hacker world
Posted using ShareThis
Have fun inserting stuff on those unused bits!
Ron
Subscribe to:
Post Comments (Atom)
A playground for network security enthusiasts, innovators and early adoptors
Welcome to my blog, this is me thinking out loud about Voice over IP security (VoIP), managing and optimizing converged networks, Metasploit Framework, Cloud Computing, general security and privacy concerns, grappling adventures, and tuning my MKIV VW Jetta.
All inputs, feedbacks and violent reactions are welcome.
Packet Boy Perseus
Helping spread a positive image why we hack things.
About Me
- Ron
- I am an InfoSec Innovator, a Blue Ocean Seafarer and a Paul Graham Pupil.
No comments:
Post a Comment