Enviar búsqueda
Cargar
VoIPER: Smashing the VoIP stack while you sleep
•
Descargar como PPT, PDF
•
3 recomendaciones
•
966 vistas
G
guestad6e9e
Seguir
Tecnología
Empresariales
Denunciar
Compartir
Denunciar
Compartir
1 de 38
Descargar ahora
Recomendados
Участник получит представление об основе IP-телефонии, а также базовые навыки поиска уязвимостей на примере распространенных IP-PBX и абонентских устройств. Рассматриваются как типовые сетевые уязвимости, так и сложные случаи, обнаруживаемые в ходе анализа защищенности реальных сетей.
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Priyanka Aash
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
Priyanka Aash
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Priyanka Aash
Introduce TEE of ARM's TrustedZone on Android
ARM: Trusted Zone on Android
ARM: Trusted Zone on Android
Kan-Han (John) Lu
F AV
Fortinet av
Fortinet av
Lan & Wan Solutions
Advanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip space
UltraUploader
Enterprise companies are using consumer and IoT devices to complete (or expand) their services such as broadband, IPTV, media streaming, satellite, voice and 3G/4G services. Although the devices are owned by the service providers, subscribers have limited (or full) access to them with service agreements. In addition to that, some of consumer devices also have roles on corporate communications, environment security or employee services. Consumer devices are located at subscriber premises; therefore, the traditional security testing approach only covers backend services security, not the devices. Consumer and IoT devices are susceptible to hardware hacking based attacks such as firmware dumping, re-flashing with a custom firmware, and getting low level access using the physical management interfaces such as SPI, JTAG and UART. Low level access obtained can be used to modify device behaviours or their initial states. This helps attackers to debug consumer devices and operator services, to find new vulnerabilities, and to obtain the device configuration which may contain credentials for the service infrastructure. Embedded device and hardware hacking is a rising skill set for penetration testers. It is required to understand targeted attacks which may include hardware implants, modified hardware attacking their own infrastructure or compromised devices that target the human factor. Some of advanced testing examples to be discussed are preparing a custom hardware for persistent access during a red teaming exercise, preparing a compromised consumer device for human factor pen-testing, attacking TR-069 services of a provider using smart home modems or altering the security controls of a device to abuse the service. The presentation focuses on how the existing security testing techniques should be evolved with hardware and IoT hacking, and how service providers can make their infrastructure secure for cutting-edge attacks. Essential hardware hacking information, identifying and using physical management interfaces, hardware hacking toolset, well-known hardware attacks and hardware testing procedure will be presented in a road map for consumer devices security testing. Also a security testing approach will be explained to develop new security testing services and to improve existing ones such as red teaming, human factor pen-testing and infrastructure pen-testing.
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Fatih Ozavci
Recomendados
Участник получит представление об основе IP-телефонии, а также базовые навыки поиска уязвимостей на примере распространенных IP-PBX и абонентских устройств. Рассматриваются как типовые сетевые уязвимости, так и сложные случаи, обнаруживаемые в ходе анализа защищенности реальных сетей.
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Priyanka Aash
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
Priyanka Aash
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Priyanka Aash
Introduce TEE of ARM's TrustedZone on Android
ARM: Trusted Zone on Android
ARM: Trusted Zone on Android
Kan-Han (John) Lu
F AV
Fortinet av
Fortinet av
Lan & Wan Solutions
Advanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip space
UltraUploader
Enterprise companies are using consumer and IoT devices to complete (or expand) their services such as broadband, IPTV, media streaming, satellite, voice and 3G/4G services. Although the devices are owned by the service providers, subscribers have limited (or full) access to them with service agreements. In addition to that, some of consumer devices also have roles on corporate communications, environment security or employee services. Consumer devices are located at subscriber premises; therefore, the traditional security testing approach only covers backend services security, not the devices. Consumer and IoT devices are susceptible to hardware hacking based attacks such as firmware dumping, re-flashing with a custom firmware, and getting low level access using the physical management interfaces such as SPI, JTAG and UART. Low level access obtained can be used to modify device behaviours or their initial states. This helps attackers to debug consumer devices and operator services, to find new vulnerabilities, and to obtain the device configuration which may contain credentials for the service infrastructure. Embedded device and hardware hacking is a rising skill set for penetration testers. It is required to understand targeted attacks which may include hardware implants, modified hardware attacking their own infrastructure or compromised devices that target the human factor. Some of advanced testing examples to be discussed are preparing a custom hardware for persistent access during a red teaming exercise, preparing a compromised consumer device for human factor pen-testing, attacking TR-069 services of a provider using smart home modems or altering the security controls of a device to abuse the service. The presentation focuses on how the existing security testing techniques should be evolved with hardware and IoT hacking, and how service providers can make their infrastructure secure for cutting-edge attacks. Essential hardware hacking information, identifying and using physical management interfaces, hardware hacking toolset, well-known hardware attacks and hardware testing procedure will be presented in a road map for consumer devices security testing. Also a security testing approach will be explained to develop new security testing services and to improve existing ones such as red teaming, human factor pen-testing and infrastructure pen-testing.
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Fatih Ozavci
"No More Fraud" Presentation at Cluecon2014 Chicago VoIP Security Training: Enroll here: http://bit.ly/2GL5MCT
No More Fraud Cluecon2014
No More Fraud Cluecon2014
Flavio Eduardo de Andrade Goncalves
Ce hv6 module 41 hacking usb devices
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testing
Vi Tính Hoàng Nam
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
Fatih Ozavci
Presentation given at 4SICS conference in Stockholm, Sweden about using Windows built-in solutions like Software Restriciton Policies/App Locker, EMET and other minor things.
Reducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutions
Jan Seidl
Palestra Cluecon e 4KConf VoIP Security Training on Udemy Enroll here: http://bit.ly/2GL5MCT
Number one-issue-voip-today-fraud
Number one-issue-voip-today-fraud
Flavio Eduardo de Andrade Goncalves
Presentation regarding VoIP Fraud and PBX hacking at Astricon 2014 VoIP Security Training: Enroll here: http://bit.ly/2GL5MCT
No More Fraud, Astricon, Las Vegas 2014
No More Fraud, Astricon, Las Vegas 2014
Flavio Eduardo de Andrade Goncalves
Self Contained Encrypted Voice solution for business and government. Central server + iphone and android app, high level of encrypted voice and text message capability that resides completely onsite, works anywhere from one enabled comms device to another on the same network
Encrypted Voice Communications
Encrypted Voice Communications
sbwahid
Networking, Sensing and Control, 2008. ICNSC 2008. IEEE International Conference H.F. Qi, X.H. Yang, R. Jiang, B. Liang and S.J. Zhou
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Syuan Wang
>PrivateGSM Security Overview >PrivateGSM Voice Encryption Standards: - Signaling Encryption - Media Encryption - End-to-End key exchange - End-to-Site key exchange
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical Overview
PrivateWave Italia SpA
Intrusion Detection and Prevention overview
Idps technology starter v2.0
Idps technology starter v2.0
Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS
Voice encryption for gsm using arduino
Voice encryption for gsm using arduino
iruldaworld
Enterprise companies are increasingly using Microsoft Lync 2010/2013 (a.k.a Skype for Business 2015) services as call centre, internal communication, cloud communication and video conference platform. These services are based on the VoIP and instant messaging protocols, and support multiple client types such as Microsoft Office 365, Microsoft Lync, Skype for Business, IP phones and teleconference devices. Also the official clients are available for mobile devices (e.g. Windows phone, Android and iOS), desktops (Mac, Linux and Windows) and web applications developed with .NET framework. Although the Microsoft Lync platform has been developed along with the new technologies, it still suffers from old VoIP, teleconference and platform issues. Modern VoIP attacks can be used to attack Microsoft Lync environments to obtain unauthorised access to the infrastructure. Open MS Lync frontend and edge servers, insecure federation security design, lack of encryption, insufficient defence for VoIP attacks and insecure compatibility options may allow attackers to hijack enterprise communications. The enterprise users and employees are also the next generation targets for these attackers. They can attack client soft phones and handsets using the broken communication, invalid protocol options and malicious messaging content to compromise sensitive business assets. These attacks may lead to privacy violations, legal issues, call/toll fraud and intelligence collection. Attack vectors and practical threats against the Microsoft Lync ecosystem will be presented with newly published vulnerabilities and Microsoft Lync testing modules of the Viproy VoIP kit developed by the speaker. This will be accompanied by live demonstrations against a test environment. • A brief introduction to Microsoft Lync ecosystem • Security requirements, design vulnerabilities and priorities • Modern threats against commercial Microsoft Lync services • Demonstration of new attack vectors against target test platform
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
Fatih Ozavci
Брошюра FortiGate-200B (англ)
FortiGate-200B
FortiGate-200B
Компания ИНТРО
System designers and project managers look at the project procurement, installation and deployment costs when they price a project. However, the costs of an automation system spread over the life cycle of the plant and should include maintenance, faultfinding and health-checking. Perhaps most important is the cost in terms of loss of production should faults develop during the lifetime of the plant. Spending a little more at procurement time can repay many times over. Good fault tolerant design need not be more expensive. Sometimes fault tolerance can be achieved with just a little thought at no additional cost.
Profinet system design - Andy Verwer
Profinet system design - Andy Verwer
PROFIBUS and PROFINET InternationaI - PI UK
Forti Gate Virtual Appliances Sales 201010
Forti Gate Virtual Appliances Sales 201010
Alvaro Roldan Peral
SlingSecure is the most secure encrypted messaging provider for Blackberry & Android mobile devices on the market. SlingSecure secure messaging was designed specifically for encrypting mobile-to-mobile, mobile-to-landline communication via Blackberry / Android smartphones. Our multiple security features and protocols ensure safe, anonymous and highly secure transmission between Blackberry & Android devices for users who may deal with sensitive information and anyone who wants their peace of mind. Features: Blackberry to Android Encryption Mobile to Landline Encryption Landline to Landline Encryption Private SMS Encryption Email Encryption Blackberry to Android. Visit us today at www.slingsecure.com
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Encryption
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
Suhas Desai
SEARAN dotstack product brief
Dotstack product brief 2014 11-26
Dotstack product brief 2014 11-26
Satya Harish
The 640-554 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification. This exam tests a candidate's knowledge of securing Cisco routers and switches and their associated networks. http://www.pass4surebraindumps.com/640-554.html
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
Hecrocro
FIREWALLS how to secure networks.... with examples...
Firewalls
Firewalls
junaid15bsse
Authetication ppt
Authetication ppt
Pranav Doshi
SOC Foundation
SOC Foundation
Masoud Ostad
Más contenido relacionado
La actualidad más candente
"No More Fraud" Presentation at Cluecon2014 Chicago VoIP Security Training: Enroll here: http://bit.ly/2GL5MCT
No More Fraud Cluecon2014
No More Fraud Cluecon2014
Flavio Eduardo de Andrade Goncalves
Ce hv6 module 41 hacking usb devices
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testing
Vi Tính Hoàng Nam
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
Fatih Ozavci
Presentation given at 4SICS conference in Stockholm, Sweden about using Windows built-in solutions like Software Restriciton Policies/App Locker, EMET and other minor things.
Reducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutions
Jan Seidl
Palestra Cluecon e 4KConf VoIP Security Training on Udemy Enroll here: http://bit.ly/2GL5MCT
Number one-issue-voip-today-fraud
Number one-issue-voip-today-fraud
Flavio Eduardo de Andrade Goncalves
Presentation regarding VoIP Fraud and PBX hacking at Astricon 2014 VoIP Security Training: Enroll here: http://bit.ly/2GL5MCT
No More Fraud, Astricon, Las Vegas 2014
No More Fraud, Astricon, Las Vegas 2014
Flavio Eduardo de Andrade Goncalves
Self Contained Encrypted Voice solution for business and government. Central server + iphone and android app, high level of encrypted voice and text message capability that resides completely onsite, works anywhere from one enabled comms device to another on the same network
Encrypted Voice Communications
Encrypted Voice Communications
sbwahid
Networking, Sensing and Control, 2008. ICNSC 2008. IEEE International Conference H.F. Qi, X.H. Yang, R. Jiang, B. Liang and S.J. Zhou
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Syuan Wang
>PrivateGSM Security Overview >PrivateGSM Voice Encryption Standards: - Signaling Encryption - Media Encryption - End-to-End key exchange - End-to-Site key exchange
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical Overview
PrivateWave Italia SpA
Intrusion Detection and Prevention overview
Idps technology starter v2.0
Idps technology starter v2.0
Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS
Voice encryption for gsm using arduino
Voice encryption for gsm using arduino
iruldaworld
Enterprise companies are increasingly using Microsoft Lync 2010/2013 (a.k.a Skype for Business 2015) services as call centre, internal communication, cloud communication and video conference platform. These services are based on the VoIP and instant messaging protocols, and support multiple client types such as Microsoft Office 365, Microsoft Lync, Skype for Business, IP phones and teleconference devices. Also the official clients are available for mobile devices (e.g. Windows phone, Android and iOS), desktops (Mac, Linux and Windows) and web applications developed with .NET framework. Although the Microsoft Lync platform has been developed along with the new technologies, it still suffers from old VoIP, teleconference and platform issues. Modern VoIP attacks can be used to attack Microsoft Lync environments to obtain unauthorised access to the infrastructure. Open MS Lync frontend and edge servers, insecure federation security design, lack of encryption, insufficient defence for VoIP attacks and insecure compatibility options may allow attackers to hijack enterprise communications. The enterprise users and employees are also the next generation targets for these attackers. They can attack client soft phones and handsets using the broken communication, invalid protocol options and malicious messaging content to compromise sensitive business assets. These attacks may lead to privacy violations, legal issues, call/toll fraud and intelligence collection. Attack vectors and practical threats against the Microsoft Lync ecosystem will be presented with newly published vulnerabilities and Microsoft Lync testing modules of the Viproy VoIP kit developed by the speaker. This will be accompanied by live demonstrations against a test environment. • A brief introduction to Microsoft Lync ecosystem • Security requirements, design vulnerabilities and priorities • Modern threats against commercial Microsoft Lync services • Demonstration of new attack vectors against target test platform
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
Fatih Ozavci
Брошюра FortiGate-200B (англ)
FortiGate-200B
FortiGate-200B
Компания ИНТРО
System designers and project managers look at the project procurement, installation and deployment costs when they price a project. However, the costs of an automation system spread over the life cycle of the plant and should include maintenance, faultfinding and health-checking. Perhaps most important is the cost in terms of loss of production should faults develop during the lifetime of the plant. Spending a little more at procurement time can repay many times over. Good fault tolerant design need not be more expensive. Sometimes fault tolerance can be achieved with just a little thought at no additional cost.
Profinet system design - Andy Verwer
Profinet system design - Andy Verwer
PROFIBUS and PROFINET InternationaI - PI UK
Forti Gate Virtual Appliances Sales 201010
Forti Gate Virtual Appliances Sales 201010
Alvaro Roldan Peral
SlingSecure is the most secure encrypted messaging provider for Blackberry & Android mobile devices on the market. SlingSecure secure messaging was designed specifically for encrypting mobile-to-mobile, mobile-to-landline communication via Blackberry / Android smartphones. Our multiple security features and protocols ensure safe, anonymous and highly secure transmission between Blackberry & Android devices for users who may deal with sensitive information and anyone who wants their peace of mind. Features: Blackberry to Android Encryption Mobile to Landline Encryption Landline to Landline Encryption Private SMS Encryption Email Encryption Blackberry to Android. Visit us today at www.slingsecure.com
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Encryption
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
Suhas Desai
SEARAN dotstack product brief
Dotstack product brief 2014 11-26
Dotstack product brief 2014 11-26
Satya Harish
The 640-554 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification. This exam tests a candidate's knowledge of securing Cisco routers and switches and their associated networks. http://www.pass4surebraindumps.com/640-554.html
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
Hecrocro
FIREWALLS how to secure networks.... with examples...
Firewalls
Firewalls
junaid15bsse
La actualidad más candente
(20)
No More Fraud Cluecon2014
No More Fraud Cluecon2014
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testing
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
Reducing attack surface on ICS with Windows native solutions
Reducing attack surface on ICS with Windows native solutions
Number one-issue-voip-today-fraud
Number one-issue-voip-today-fraud
No More Fraud, Astricon, Las Vegas 2014
No More Fraud, Astricon, Las Vegas 2014
Encrypted Voice Communications
Encrypted Voice Communications
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical Overview
Idps technology starter v2.0
Idps technology starter v2.0
Voice encryption for gsm using arduino
Voice encryption for gsm using arduino
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
FortiGate-200B
FortiGate-200B
Profinet system design - Andy Verwer
Profinet system design - Andy Verwer
Forti Gate Virtual Appliances Sales 201010
Forti Gate Virtual Appliances Sales 201010
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice Encryption
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
Dotstack product brief 2014 11-26
Dotstack product brief 2014 11-26
Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
Firewalls
Firewalls
Destacado
Authetication ppt
Authetication ppt
Pranav Doshi
SOC Foundation
SOC Foundation
Masoud Ostad
Session initiation-protocol
Session initiation-protocol
Santhosh Somu
session initiation protocol - SIP
session initiation protocol - SIP
Mahmoud Abudaqa
H.323 protocol
H.323 protocol
Habibur Rahman
This is my Athcon 2013 slide set. I also demonstrated that attacking mobile applications via SIP Trust, scanning via SIP proxies and MITM fuzzing in Live Demo.
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!
Fatih Ozavci
At VoiceCon Orlando 2010, Voxeo's Dan York taught a 3-hour tutorial about the Session Initiation Protocol (SIP) that was attended by over 200 people. The session explained the basics of SIP, walked through the message flow, discussed SIMPLE, SIP trunking and explored issues with distributed systems and federation. http://blogs.voxeo.com/events/voicecon/ Please note that the slides were developed from a set of slides originally created by David Bryan of http://www.ethernot.org/ (used with his permission).
Sip Fundamentals and Prospects Tutorial - VoiceCon Orlando 2010
Sip Fundamentals and Prospects Tutorial - VoiceCon Orlando 2010
Voxeo Corp
A presentation given by Matt Bynum at the August 2009 NCUG Meeting
Session Initiation Protocol
Session Initiation Protocol
Matt Bynum
If you don't know what SIP is, what it is used for or why you should even care then this is the section for you. This presentation will go over the very basics of SIP and assumes no previous knowledge of SIP or really any other network experience either. Topics it will touch upon is: - What SIP is all about - SIP and sessions management - Basic call flow - Brief discussion of SIP messages - SIP and audio
SIP - The Basics
SIP - The Basics
Jonas Borjesson
SIP is a VoIP protocol in Application Layer of OSI arch
Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)
William Lee
The presentation is a compiled assembly from the SIP RFC' s, and original works of Alan Johnston and Henry Sinnreich . It contains Sip Detailed , Call flows , Architecture descriptions , SIP services , sip security , sip programming.
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
ALTANAI BISHT
VoIP attacks have evolved, and they are targeting Unified Communications (UC), commercial services, hosted environment and call centres using major vendor and protocol vulnerabilities. This workshop is designed to demonstrate these cutting edge VoIP attacks, and improve the VoIP skills of the incident response teams, penetration testers and network engineers. Signalling protocols are the centre of UC environments, but also susceptible to IP spoofing, trust issues, call spoofing, authentication bypass and invalid signalling flows. They can be hacked with legacy techniques, but a set of new attacks will be demonstrated in this workshop. This workshop includes basic attack types for UC infrastructure, advanced attacks to the SIP and Skinny protocol weaknesses, network infrastructure attacks, value added services analysis, Cdr/Log/Billing analysis and Viproy use to analyse signalling services using novel techniques. Also the well-known attacks to the network infrastructure will be combined with the current VoIP vulnerabilities to test the target workshop network. Attacking VoIP services requires limited knowledge today with the Viproy Penetration Testing Kit (written by Fatih). It has a dozen modules to test trust hacking issues, information collected from SIP and Skinny services, gaining unauthorised access, call redirection, call spoofing, brute-forcing VoIP accounts, Cisco CUCDM exploitation and debugging services using as MITM. Furthermore, Viproy provides these attack modules in the Metasploit Framework environment with full integration. The workshop contains live demonstration of practical VoIP attacks and usage of the Viproy modules. In this hands-on workshop, attendees will learn about basic attack types for UC infrastructure, advanced attacks to the SIP protocol weaknesses, Cisco Skinny protocol hacking, hacking Cisco CUCDM and CUCM servers, network infrastructure attacks, value added services analysis, Cdr/Log/Billing analysis and Viproy VoIP pen-test kit to analyse VoIP services using novel techniques. New CDP, CUCDM and Cisco Skinny modules and techniques of Viproy will be demonstrated in the workshop as well.
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
Fatih Ozavci
Call Centre Architecture
Call Centre Architecture
Call Centre Architecture
apoorva tyagi
SIP - More than meets the eye Speakers: Ofer Cohen - VOIP Group Leader, LivePerson Yossi Maimon - VOIP Technical Leader, LivePerson An Introduction to the SIP protocol. SIP Position in telecommunication networks and the content services. What is SIP: The Session Initiation Protocol (SIP) is a signaling communications protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP) networks. The protocol defines the messages that are sent between peers which govern establishment, termination and other essential elements of a call. SIP can be used for creating, modifying and terminating sessions consisting of one or several media streams. SIP can be used for two-party (unicast) or multiparty (multicast) sessions. Other SIP applications include video conferencing, streaming multimedia distribution, instant messaging, presence information, file transfer, fax over IP and online games. (Source: Wikipedia)
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
LivePerson
Destacado
(14)
Authetication ppt
Authetication ppt
SOC Foundation
SOC Foundation
Session initiation-protocol
Session initiation-protocol
session initiation protocol - SIP
session initiation protocol - SIP
H.323 protocol
H.323 protocol
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!
Sip Fundamentals and Prospects Tutorial - VoiceCon Orlando 2010
Sip Fundamentals and Prospects Tutorial - VoiceCon Orlando 2010
Session Initiation Protocol
Session Initiation Protocol
SIP - The Basics
SIP - The Basics
Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
Call Centre Architecture
Call Centre Architecture
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
Similar a VoIPER: Smashing the VoIP stack while you sleep
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
R43019698
R43019698
IJERA Editor
Conferencia de Federico Cabiddu sobre HOMER presentada en VoIP2DAY 2016. Más información: www.voip2day.com
Federico Cabiddu - VoIP2DAY 2016 | VoIP and RTC Troubleshooting using the Sip...
Federico Cabiddu - VoIP2DAY 2016 | VoIP and RTC Troubleshooting using the Sip...
VOIP2DAY
Voice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
Videoguy
VoIP Research Paper
VoIP Research Paper
Aashish Pande
Exploiting the Underlaying Network and VoIP aplications.
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
Sumutiu Marius
A workshop by Acal BFi Nordic on project mangOH industrial open hardware running Linux/Legato open source software. Tight integration with cloud and connectivity services.
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...
Hans Andersson
This presentation contain basic knowledge about how voIP work and what are the security threat in voIP. It will also contain how we can prevent attack on voIP system.
Voip security
Voip security
Shethwala Ridhvesh
This presentation describes the summary of VoIP infrastructure and related vulnerabilities and security concerns.
VoIP Security
VoIP Security
Dayanand Prabhakar
you can be friend with me on orkut "mangalforyou@gmail.com" : i belive in sharing the knowledge so please send project reports ,seminar and ppt. to me .
Ip
Ip
mangal das
Ip
Ip
mangal das
A webinar by Siemens and IDC
The Role of a SIP Softswitch in the Enterprise
The Role of a SIP Softswitch in the Enterprise
Alok Vasudeva
Voip
Voip
Mohit Arora
A basic introduction to Session Initiation Protocol Some of the slides look strange on the screen (animated ones) but they work fine when downloaded.
Introduction To SIP
Introduction To SIP
Chris McAndrew
H.323, SIP, H460.17, ICE, DTLS-SRTP, WebRTC… different protocols for different things
2014 innovaphone different protocols for different things
2014 innovaphone different protocols for different things
VOIP2DAY
Voice over Internet Protocol (Voice over IP, VoIP and IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet telephony, broadband telephony, and broadband phone service specifically refer to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN).The steps and principals involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.
VOIP Design & Implementation
VOIP Design & Implementation
Ahmed A. Arefin
Jason Fischl The Softphone And The Pbx
Jason Fischl The Softphone And The Pbx
Carl Ford
The objective of study is to guarantee QoS for multiple service class traffic in a multiple connection environment and to examine a case of QoS deployment over a cellular WiMAX network. In particular, the thesis compares the performance how much bandwidth for voip
How does VOIP work diagram
How does VOIP work diagram
Thesis Scientist Private Limited
1 VoIP Overview[1]
1 VoIP Overview[1]
William Giba
1 Vo Ip Overview
1 Vo Ip Overview
Mohsin Fakhar
AnyFirewall Engine is a software toolkit, based on STUN, TURN, and ICE, which enables guaranteed firewall and NAT traversal for fixed and mobile applications over any fixed or mobile network, through any NAT or firewall, and to any device. AnyFirewall Engine is the world’s most widely deployed NAT and firewall traversal toolkit, having been deployed to more than 20 million subscribers by licensees including Comcast, Digital Lifeboat, Intel, Maxis, Nokia, Nokia Siemens Networks, Polycom, BlackBerry, Smartvue, and more. AnyFirewall Engine can be deployed with AnyFirewall Server and AnyFirewall Gateway for an end-to-end firewall and NAT traversal solution, or can be combined with third-party, standards-based products.
AnyFirewall Engine & Server by Eyeball Networks
AnyFirewall Engine & Server by Eyeball Networks
Eyeball Networks
Similar a VoIPER: Smashing the VoIP stack while you sleep
(20)
R43019698
R43019698
Federico Cabiddu - VoIP2DAY 2016 | VoIP and RTC Troubleshooting using the Sip...
Federico Cabiddu - VoIP2DAY 2016 | VoIP and RTC Troubleshooting using the Sip...
Voice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
VoIP Research Paper
VoIP Research Paper
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...
Voip security
Voip security
VoIP Security
VoIP Security
Ip
Ip
Ip
Ip
The Role of a SIP Softswitch in the Enterprise
The Role of a SIP Softswitch in the Enterprise
Voip
Voip
Introduction To SIP
Introduction To SIP
2014 innovaphone different protocols for different things
2014 innovaphone different protocols for different things
VOIP Design & Implementation
VOIP Design & Implementation
Jason Fischl The Softphone And The Pbx
Jason Fischl The Softphone And The Pbx
How does VOIP work diagram
How does VOIP work diagram
1 VoIP Overview[1]
1 VoIP Overview[1]
1 Vo Ip Overview
1 Vo Ip Overview
AnyFirewall Engine & Server by Eyeball Networks
AnyFirewall Engine & Server by Eyeball Networks
Último
I'm excited to share my latest predictions on how AI, robotics, and other technological advancements will reshape industries in the coming years. The slides explore the exponential growth of computational power, the future of AI and robotics, and their profound impact on various sectors. Why this matters: The success of new products and investments hinges on precise timing and foresight into emerging categories. This deck equips founders, VCs, and industry leaders with insights to align future products with upcoming tech developments. These insights enhance the ability to forecast industry trends, improve market timing, and predict competitor actions. Highlights: ▪ Exponential Growth in Compute: How $1000 will soon buy the computational power of a human brain ▪ Scaling of AI Models: The journey towards beyond human-scale models and intelligent edge computing ▪ Transformative Technologies: From advanced robotics and brain interfaces to automated healthcare and beyond ▪ Future of Work: How automation will redefine jobs and economic structures by 2040 With so many predictions presented here, some will inevitably be wrong or mistimed, especially with potential external disruptions. For instance, a conflict in Taiwan could severely impact global semiconductor production, affecting compute costs and related advancements. Nonetheless, these slides are intended to guide intuition on future technological trends.
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
Keynote at the 21st European Semantic Web Conference
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to: Create a campaign using Mailchimp with merge tags/fields Send an interactive Slack channel message (using buttons) Have the message received by managers and peers along with a test email for review But there’s more: In a second workflow supporting the same use case, you’ll see: Your campaign sent to target colleagues for approval If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team But—if the “Reject” button is pushed, colleagues will be alerted via Slack message Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors. And... Speakers: Akshay Agnihotri, Product Manager Charlie Greenberg, Host
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
When you think of a highly secure meeting environment, do you instantly think 'Microsoft Teams'!? Or do you think about some unknown application, troublesome UI and daunting login process...? If you think the latter - let's change that! In this session Femke will show you how using Teams Premium features can create secure, but also good looking meetings! PRETTY. Make sure your company's brand is represented before, during and after the meeting with Customization policies in place. SECURE. Lets utilize Meeting templates and Sensitivity Labels to protect your meeting and data to prevent sensitive information from being leaked. After this session, you will have a clear understanding of the capabilities of Teams Premium features and how to set up the perfect meeting that suits your organizational requirements!
ECS 2024 Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
Femke de Vroome
We're living the AI revolution and Salesforce is adapting and bring new value to their customers. Einstein products are evolving rapidly and navigating their limitations, language support, and use cases can be challenging. Let's make review of what Einstein product are available currently, what are the capabilities and what can be used for in CEE region and how Rossie.ai can help to learn Salesforce speak Czech. We will explore the Einstein roadmap and I will make a short live demo (based on your vote) of some Einstein feature.
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
CzechDreamin
A talk given by Julian Hyde at the San Francisco Distributed Systems Meetup on May 22, 2024.
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Julian Hyde
Generative AI architecture, at its core, revolves around the concept of machines being able to generate content autonomously, mimicking human-like creativity and decision-making processes. Unlike traditional AI systems that rely on predefined rules and data inputs, generative AI leverages deep learning techniques to produce new, original outputs based on patterns and examples it has learned from vast datasets. This capability opens up a multitude of possibilities across various domains within an enterprise.
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
alexjohnson7307
що таке продакт менеджмент? про професію і карєру продактів для світчерів та початківців.
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
Mark Opanasiuk
Unlock the mysteries of successful Salesforce interviews in this insightful session hosted by Hugo Rosario (Salesforce Customer), a seasoned hiring manager that leads the Salesforce Department of multinational company with over 100 interviews under their belt. Step into the manager's chair and gain exclusive behind-the-scenes insights into what makes a Salesforce consultant stand out during the interview process. From deciphering the unspoken cues to mastering key strategies, we'll explore the intricacies of the interview process and provide practical tips for consultants looking to not only pass interviews but also thrive in their roles. Whether you're a seasoned professional or just starting your Salesforce journey, this session is your backstage pass to the secrets that hiring managers wish you knew.
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
CzechDreamin
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
In this session, we will showcase how to revolutionize automated testing for your software, automation, and QA teams with UiPath Test Suite. In part 1 of UiPath test automation using UiPath Test Suite – developer series, we will cover, Software testing overview What is software testing Why software testing is required Typical test types and levels Continuous testing and challenges Introduction to UiPath Test Suite UiPath Test Suite family of products Speaker: Atul Trikha, Chief Technologist & Solutions Architect, Peraton and UiPath MVP Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
DianaGray10
ScyllaDB has the potential to deliver impressive performance and scalability. The better you understand how it works, the more you can squeeze out of it. But before you squeeze, make sure you know what to monitor! Watch our experienced Postgres developer work through monitoring and performance strategies that help him understand what mistakes he’s made moving to NoSQL. And learn with him as our database performance expert offers friendly guidance on how to use monitoring and performance tuning to get his sample Rust application on the right track. This webinar focuses on using monitoring and performance tuning to discover and correct mistakes that commonly occur when developers move from SQL to NoSQL. For example: - Common issues getting up and running with the monitoring stack - Using the CQL optimizations dashboard - Common issues causing high latency in a node - Common issues causing replica imbalance - What a healthy system looks like in terms of memory - Key metrics to keep an eye on This isn’t “Death-by-Powerpoint.” We’ll walk through problems encountered while migrating a real application from Postgres to ScyllaDB – and try to fix them live as well.
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
ScyllaDB
This presentation focuses on the challenges and strategies of connecting problem definitions within product development. Key Points Covered: - Kayak's mission since its inception in 2004 to simplify travel by enabling easy comparisons of flights through technological solutions. - Discussion of the complexities within the travel industry, including the high expectations for personalized user experiences and the various stakeholder influences. - Emphasis on the necessity of maintaining agility and innovation within a mature company through continuous reassessment of processes. - An explanation of the importance of disciplined problem definition to prevent project failures and team inefficiencies. - Introduction of strategies for effective communication across teams to ensure alignment and comprehension at all levels of project development. - Exploration of various problem-solving methodologies, including how to handle conflicts within team settings regarding problem definitions and project directions.
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
UXDXConf
Designing inclusive products is not only a social responsibility but also a business imperative. This talk delves into the journey of creating accessible hardware products that cater to diverse user needs. Key Topics Covered: 1. Introduction to Inclusive Design - Importance of accessibility in product design - Overview of Comcast's commitment to making products accessible to a wide audience 2. Case Study: Xfinity Large Button Voice Remote - Initial challenges and the evolution of the product - User research and feedback that shaped the design - Key features of the final product and their benefits 3. Designing for Diverse Needs - Understanding human-centered design and its historical context - The impact of designing for people with disabilities on overall product quality - Examples from other industries, such as architecture and industrial design 4. Integrating Accessibility from the Beginning - The cost and efficiency benefits of designing for accessibility from the start - The process of embedding accessibility as a core trait rather than an optional feature 5. Real-World Impact and Continuous Improvement - Insights from in-home studies with users having assistive needs - How continuous feedback and iterative design lead to better products - The role of inclusive research and development practices
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
UXDXConf
Intrigued by why some of the world's largest companies (Netflix, Google, Cisco, Twitter, Uber etc) are using gRPC? In this demo based talk we delve into the world of gRPC in .Net, what it does and why we should use it. We compare the interface with both Rest and graphQL. We will show you how to implement grpc server-side in .net and in the web. Finally, I will show you how the tooling helps you deliver powerful interfaces and interact with them quickly and simply.
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
John Staveley
A recap of interesting points and quotes from the May 2024 WSO2CON opensource application development conference. Focuses primarily on keynotes and panel sessions.
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
Jennifer Lim
This is the official company presentation of IoT Analytics GmbH, a leading global provider of market insights and strategic business intelligence for the IoT, AI, Cloud, Edge, and Industry 4.0. We are trusted by 1000+ leading companies around the world for our market insights, including globally leading software, telecommunications, consulting, semiconductor, and industrial players.
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
IoTAnalytics
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application. In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics. Length: 30 minutes Session Overview ------------------------------------------- During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana: - What out-of-the-box solutions are available for real-time monitoring JMeter tests? - What are the benefits of integrating InfluxDB and Grafana into the load testing stack? - Which features are provided by Grafana? - Demonstration of InfluxDB and Grafana using a practice web application To view the webinar recording, go to: https://www.rttsweb.com/jmeter-integration-webinar
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
This talk offers actionable insights at an executive level for enhancing productivity and refining your portfolio management approach to propel your organization to greater heights. Key Points Covered: 1. Experience Transformation: - The core challenge remains consistent across organizations: converting budget into user-centric designs. - Strategies for deploying design resources effectively in both startups and large enterprises. 2. Strategic Frameworks: - Introduction to the "Ziggurat of Impact" model, detailing layers from basic system interactions to comprehensive customer experiences. - Practical insights on creating frameworks that scale with organizational complexity. 3. Organizational Impact: - Real-world examples of navigating design in large settings, focusing on the synthesis of consumer products and customer experiences. - Emphasis on the importance of designing systems that directly influence customer interactions. 4. Design Execution: - Detailed walkthrough of organizational layers affecting design execution, from touchpoints and customer activities to shared capabilities. - How to ensure design influences both the micro and macro aspects of customer interactions. 5. Measurement and Adaptation: - Techniques for measuring the impact of design decisions and adapting strategies based on data-driven insights. - The critical role of continuous improvement and feedback in refining customer experiences.
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
This is a powerpoint that features Microsoft Teams Devices and everything that is new including updates to its software and devices for April 2024
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
Stephanie Beckett
Último
(20)
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
ECS 2024 Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
VoIPER: Smashing the VoIP stack while you sleep
1.
Finding VoIP vulnerabilities
while you sleep
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
Descargar ahora