No matter how seasoned an engineer you are, it’s a magic feeling to reach the end of a Cisco UC upgrade. The systems are up, devices are registered, you've dodged all the bugs in the code that threatened to throw your little upgrade train off the rails of your cut plan and burning into the canyon of despair. Things are working and its time to start testing. Its at this point, that you or more specifically I in this case, noticed an interesting all circuits busy message when I attempted to dial inbound from the outside. After some quick investigation, my curiosity turned to surprise when I discovered that the customer's voicemail system had not only been compromised but, was being used to place hundreds of outbound calls to international numbers per minute. This is toll fraud. A well-known attack among voice engineers who have spent some time in the field but, largely a mystery to victims who only learn about it when they receive massive phone bills for seemingly no reason. In a nut shell, the attack leverages compromised voicemail boxes on your system to allow attackers to make unlimited international calls at your expense. While simple in theory, I thought I would try to share the details and origins of this hack below. Enjoy!
In my last post in the series I introduced you to the four architectural components that control and enable our SD-WAN fabric. In that post I had promised that in our next installment we would take a closer look at our fabric bring up sequence, but if you will indulge me I would like to hold off on that topic for the next post. In its place I would like to use this post to introduce you to the lab environment that I have built for this series and take you through the process of deploying and registering a virtual vEdge router into our lab.
LookingPoint is an advanced IT infrastructure solution provider founded with one goal in mind: to enable businesses to achieve improved productivity, growth, and business empowerment through the use of technology. We strive to stay at the forefront of technology and to share our knowledge to help businesses run more efficiently. Our team is always looking for new ways to improve the efficiency of our customers’ technology infrastructures, whether it’s in the data center, or for collaboration and networking solutions. Last month we started up a new technology video series designed to share technology basics with IT professionals (and anyone interested in learning about different network technologies). Our Back to Basics series covers everything from what is cloud computing to different routing protocols you can use to optimize your network traffic flow.
In this Fireside Chat, CEO - Sean Barr, sits down with Senior Solutions Architect - Marshall Hill, to discuss hyperconverged infrastructure and Cisco Hyperflex. Sit back, relax, and enjoy this Fireside
Over the past year I have been fortunate enough to work on several Cisco SD-WAN (formally Viptela) deployments. These projects have ranged from small three or four site implementations here in the bay area, right through to large scale international rollouts incorporating hundreds of sites spread-out across the globe with regional POPs providing branch services and backbone connectivity.
The last day of Cisco Live 2018 started with a Security Innovation Showcase with Bret Hartman, Cisco VP and CTO of Security. He discussed best case security for worst case scenarios. In the last year we have seen cyber attack after cyber attack from Nyetya in July 2017 to VPNFilter which was detected last month.
Subscribe to the informative Newsletter to be Notified Updates in the Technology world.