CIP Cyber

VoIP Hopper Video Tutorials

Table of Contents

As we have discussed before about VoIP hopper the IP based phone VLAN (virtual LAN) hopper, in the previous tutorial we have seen the theoretical background and the feature of VoIP hopper but in this article we will share three videos of VoIP hopper in which you will see the functionality of voip hopper.





Tutorial 1:  Assessment Mode video tutorial for VoIP Hopper

A tutorial demonstrating the new, exciting features for Assessment mode.  Until I can integrate DHCP spoofing for Avaya/Nortel into assessment mode, I’ve also shown how to do both Avaya and Nortel VLAN discovery at the end of the video.

Tutorial 2:  LLDP-MED features of VoIP Hopper

A tutorial demonstrating the new LLDP-MED capabilities.

Tutorial 3:  Hotel Exploit Demo ~ When DHCP is disabled

A tutorial demonstrating the same live demo showed at DefCon 19, in which DHCP was disabled on the VoIP VLAN subnet.  VoIP Hopper can still VLAN Hop and spoof the IP and MAC address of an IP Phone, as selected by the user.  This is a demonstration of the “s” option of Assessment mode.




Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

Do Hackers Really use Metasploit? NO!

Undoubtedly, Metasploit is one of the most organized, well-developed tools in the pen-testers toolbox. But, do hackers use it? Some of them, but not the

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings