UCSniff- IP Video & VoIP Sniffer

In a corporate sector network administrator and user’s has a mis-conception that the VoIP and IP video is secure and it does not going to hack, IP video conference can be easily hacked by using some free-ware tools, these tools allow to monitor and sniff the video in real time.
Normally the organisations does not use any type of encryption algorithm to measure the security of VoIP, in this article we will demonstrate a tool called UCSnif, UCSnif is a open source VoIP and IP video security assessment too.
It is allows administrator to perform a pen-testing for their VoIP, it is written in C/C++ and available for both windows and linux based operating system and it is freely available to download.
Key Features

  • Allows targeting of VoIP Users based on Corporate Directory and/or extensions
  • Support for automatically recording private IP video conversations
  • Automatically re-creates and saves entire voice conversation to a single file that can be played back by media players
  • Support for G.729, G.723, G.726, G.722, G.711 u-law, and G.711 a-law compression codecs
  • Support for H.264 Video codec
  • Automated VLAN Hop and VLAN Discovery support
  • A UC Sniffer (VoIP and Video) combined with a MitM re-direction tool
  • Monitor Mode
  • Sniffs entire conversation if only one phone is in source VLAN
  • Gratuitous ARP Disablment Bypass support
  • TFTP MitM Modification of IP Phone features
  • Realtime VoIP and Video Monitor

Video Demonstration




Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How To Create A Virtual Penetration Testing Lab At Home

In this article, I will demonstrate how to create your own virtual penetration testing lab at home. Creating a pentesting lab is must for...

The Importance of Cyber Security in The Medical Device Industry

Medical devices are a revolutionary aspect of healthcare - they connect doctors and patients, help diagnose and treat diseases. Some - like ECMO machines...

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...