VOIP and Video Conferencing devices Pen Testing

Similar to Flash, Microsoft voip is a "thick client" application interface used to enhance users' experience. Underlying web services calls made by Silverlight are vulnerable and it is important to map those in terms of vulnerabilities and create fixes.

Specialized Pen Testing

Cloud Security

Cross site scripting (CSS) vulnerabilities

SQL injection faults

Most of the web applications are moving to cloud technology. While this enhances the appliaction functionality, it also introduces security issues. Since everything is virtual in case of a cloud hosting, it is difficult to gain fine grain control of the "data at rest" and "data in transit"

Read More

Why penetration of VOIP and Video Conferencing based applications is essential?

Many firms deploy cutting edge VOIP (Voice Over IP) and video conferencing equipments to improve their intra-office and inter-office communications. While these devices are helping to increase productivity, unfortunately very few firms know how to secure these devices and how to create secure network design around these devices from deployment standpoint.

How the VOIP and Video Conferencing devices are penetration tested?

Valency Networks has years of experience in dealing with communicatiosn devices and it comes handy with cyber security being firm's main business theme. These communication devices use custom built TCP/IP stacks and network communication styles and hence pose tons of vulnerabilites. Valency Networks' security experts are capable to perform vulnerability scannings of the device for a wide range of manufacturers and models. This information is further used to see if and how, intruding into such a device can help attacker get into corporate network. These tests are mostly performed manually, and can take good amount of time, depending upon make and model of the equipment being tested.