fbpx

UCSniff- IP Video & VoIP Sniffer

In a corporate sector network administrator and user’s has a mis-conception that the VoIP and IP video is secure and it does not going to hack, IP video conference can be easily hacked by using some free-ware tools, these tools allow to monitor and sniff the video in real time.
Normally the organisations does not use any type of encryption algorithm to measure the security of VoIP, in this article we will demonstrate a tool called UCSnif, UCSnif is a open source VoIP and IP video security assessment too.
It is allows administrator to perform a pen-testing for their VoIP, it is written in C/C++ and available for both windows and linux based operating system and it is freely available to download.
Key Features

  • Allows targeting of VoIP Users based on Corporate Directory and/or extensions
  • Support for automatically recording private IP video conversations
  • Automatically re-creates and saves entire voice conversation to a single file that can be played back by media players
  • Support for G.729, G.723, G.726, G.722, G.711 u-law, and G.711 a-law compression codecs
  • Support for H.264 Video codec
  • Automated VLAN Hop and VLAN Discovery support
  • A UC Sniffer (VoIP and Video) combined with a MitM re-direction tool
  • Monitor Mode
  • Sniffs entire conversation if only one phone is in source VLAN
  • Gratuitous ARP Disablment Bypass support
  • TFTP MitM Modification of IP Phone features
  • Realtime VoIP and Video Monitor

Video Demonstration




Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...