<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://blog.sipvicious.org/2020/</loc><lastmod>2020-03-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.sipvicious.org/</loc><lastmod>2020-03-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.sipvicious.org/2020/03/30-sipvicious-oss-0.3.0/</loc><lastmod>2020-03-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.sipvicious.org/2017/</loc><lastmod>2017-05-23T07:30:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2017/05/fuzzing-pjsip-and-chansccp/</loc><lastmod>2017-05-23T07:30:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2016/</loc><lastmod>2016-05-24T10:52:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2016/05/new-design-and-tshirts-and-kamailio/</loc><lastmod>2016-05-24T10:52:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2016/05/time-flies-summary-of-updates-for-past/</loc><lastmod>2016-05-13T08:09:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2012/</loc><lastmod>2012-12-10T05:16:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/asterisk-security/</loc><lastmod>2012-12-10T05:16:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/extension/</loc><lastmod>2012-12-10T05:16:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2012/12/if-sipvicious-gives-you-ring/</loc><lastmod>2012-12-10T05:16:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/</loc><lastmod>2012-12-10T05:16:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-attack/</loc><lastmod>2012-12-10T05:16:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sip-ipv6/</loc><lastmod>2012-02-22T08:01:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sip-tcp/</loc><lastmod>2012-02-22T08:01:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sip-testing/</loc><lastmod>2012-02-22T08:01:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sip-tls/</loc><lastmod>2012-02-22T08:01:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2012/02/sipvicious-027-released-and-rewrite/</loc><lastmod>2012-02-22T08:01:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sipvicious-update/</loc><lastmod>2012-02-22T08:01:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/asterisk/</loc><lastmod>2012-01-02T04:55:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2012/01/asterisk-forensics-logs-vs-attackers/</loc><lastmod>2012-01-02T04:55:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/asterisk-logs/</loc><lastmod>2012-01-02T04:55:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/pbx/</loc><lastmod>2012-01-02T04:55:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-security/</loc><lastmod>2012-01-02T04:55:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2011/</loc><lastmod>2011-01-25T09:27:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/cisco/</loc><lastmod>2011-01-25T09:27:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/cucm/</loc><lastmod>2011-01-25T09:27:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voippack/</loc><lastmod>2011-01-25T09:27:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2011/01/voippack-updated/</loc><lastmod>2011-01-25T09:27:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/12/11-million-euro-loss-in-voip-fraud-and/</loc><lastmod>2010-12-14T08:56:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/</loc><lastmod>2010-12-14T08:56:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/catalin-slate/</loc><lastmod>2010-12-14T08:56:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/cristian-ciuvat/</loc><lastmod>2010-12-14T08:56:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/free-phone-calls/</loc><lastmod>2010-12-14T08:56:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/romania/</loc><lastmod>2010-12-14T08:56:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/shadow-communication/</loc><lastmod>2010-12-14T08:56:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/toll-fraud/</loc><lastmod>2010-12-14T08:56:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-fraud/</loc><lastmod>2010-12-14T08:56:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-honeypot/</loc><lastmod>2010-12-14T08:56:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/zoiper-abuse/</loc><lastmod>2010-12-14T08:56:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/11/distributed-sip-scanning-during/</loc><lastmod>2010-11-04T10:49:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/halloween-scan/</loc><lastmod>2010-11-04T10:49:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sip-botnet/</loc><lastmod>2010-11-04T10:49:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sipvicious/</loc><lastmod>2010-11-04T10:49:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-botnet/</loc><lastmod>2010-11-04T10:49:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/3cx/</loc><lastmod>2010-10-29T06:26:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/astricon-2010/</loc><lastmod>2010-10-29T06:26:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/10/astricon-roundup-and-vendors-adding/</loc><lastmod>2010-10-29T06:26:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/brekeke/</loc><lastmod>2010-10-29T06:26:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/brucon/</loc><lastmod>2010-09-07T10:01:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/09/brucon-training-module-4-attacking/</loc><lastmod>2010-09-07T10:01:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/brussels-security/</loc><lastmod>2010-09-07T10:01:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-penetration-test/</loc><lastmod>2010-09-07T10:01:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-security-training/</loc><lastmod>2010-09-07T10:01:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/09/brucon-training-module-3-attacking/</loc><lastmod>2010-09-02T10:39:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/rtp/</loc><lastmod>2010-09-02T10:39:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-security-course/</loc><lastmod>2010-09-02T10:39:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/09/brucon-training-module-2-attacking/</loc><lastmod>2010-09-01T09:01:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/08/brucon-training-module-1-introduction/</loc><lastmod>2010-08-31T06:32:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/08/brucon-training-crashcourse-in/</loc><lastmod>2010-08-30T02:21:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/07/new-beta-of-viper-vast-released-276/</loc><lastmod>2010-07-21T01:43:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/viper-vast/</loc><lastmod>2010-07-21T01:43:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/viperlabs.-sipvicious/</loc><lastmod>2010-07-21T01:43:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/denial-of-service/</loc><lastmod>2010-06-22T06:28:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/dos/</loc><lastmod>2010-06-22T06:28:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/ec2-flood/</loc><lastmod>2010-06-22T06:28:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/06/how-to-crash-sipvicious-introducing/</loc><lastmod>2010-06-22T06:28:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sip-flood/</loc><lastmod>2010-06-22T06:28:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/svcrack/</loc><lastmod>2010-06-22T06:28:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/svcrash/</loc><lastmod>2010-06-22T06:28:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/svwar/</loc><lastmod>2010-06-22T06:28:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-flood/</loc><lastmod>2010-06-22T06:28:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/06/crashcourse-in-pentesting-voip-networks/</loc><lastmod>2010-06-08T03:17:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sip-penetration-test/</loc><lastmod>2010-06-08T03:17:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/callmanager/</loc><lastmod>2010-06-01T03:36:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/06/getting-root-access-on-cisco/</loc><lastmod>2010-06-01T03:36:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/honeynet/</loc><lastmod>2010-06-01T03:36:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/jailbreak/</loc><lastmod>2010-06-01T03:36:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/root/</loc><lastmod>2010-06-01T03:36:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/tftp-download/</loc><lastmod>2010-06-01T03:36:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/tftp-security/</loc><lastmod>2010-06-01T03:36:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/cisco-tftp/</loc><lastmod>2010-05-28T00:21:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/05/new-tool-in-works-tftptheft/</loc><lastmod>2010-05-28T00:21:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/tftp-brute-force/</loc><lastmod>2010-05-28T00:21:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/tftptheft/</loc><lastmod>2010-05-28T00:21:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/trixbox-tftp/</loc><lastmod>2010-05-28T00:21:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/05/sipvicious-025-out/</loc><lastmod>2010-05-19T10:01:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/invite-scans/</loc><lastmod>2010-02-03T16:10:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/ripe-labs/</loc><lastmod>2010-02-03T16:10:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/02/rtp-traffic-to-1111/</loc><lastmod>2010-02-03T16:10:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/cellcrypt/</loc><lastmod>2010-02-01T16:23:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/encryption/</loc><lastmod>2010-02-01T16:23:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/fake-research/</loc><lastmod>2010-02-01T16:23:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/fake-security/</loc><lastmod>2010-02-01T16:23:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/gold-lock/</loc><lastmod>2010-02-01T16:23:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2010/02/on-breaking-phonecall-encryption-and/</loc><lastmod>2010-02-01T16:23:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/phone-encryption/</loc><lastmod>2010-02-01T16:23:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/phonecrypt/</loc><lastmod>2010-02-01T16:23:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/securstar/</loc><lastmod>2010-02-01T16:23:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/</loc><lastmod>2009-12-10T07:33:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/12/getting-phonecalls-during-middle-of/</loc><lastmod>2009-12-10T07:33:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sip-open-relay/</loc><lastmod>2009-12-10T07:33:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-open-relay/</loc><lastmod>2009-12-10T07:33:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/python/</loc><lastmod>2009-10-05T08:01:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/vast/</loc><lastmod>2009-10-05T08:01:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/viper/</loc><lastmod>2009-10-05T08:01:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/10/viper-vast-includes-sipvicious/</loc><lastmod>2009-10-05T08:01:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/iax2lib.py/</loc><lastmod>2009-09-17T03:03:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/invite-flood/</loc><lastmod>2009-09-17T03:03:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/pbx-security/</loc><lastmod>2009-09-17T03:03:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sip-digest-leak/</loc><lastmod>2009-09-17T03:03:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/siplib.py/</loc><lastmod>2009-09-17T03:03:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-ids/</loc><lastmod>2009-09-17T03:03:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-ips/</loc><lastmod>2009-09-17T03:03:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/09/voip-security-workshop-at-brucon-2009/</loc><lastmod>2009-09-17T03:03:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/x-lite/</loc><lastmod>2009-09-17T03:03:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sec-t/</loc><lastmod>2009-09-07T06:02:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/09/sec-t-in-sweden-and-sipvicious-update/</loc><lastmod>2009-09-07T06:02:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/svn/</loc><lastmod>2009-09-07T06:02:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sweden/</loc><lastmod>2009-09-07T06:02:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/har/</loc><lastmod>2009-08-13T07:29:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/har2009/</loc><lastmod>2009-08-13T07:29:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/08/harrrr-hacking-at-random/</loc><lastmod>2009-08-13T07:29:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/iax2/</loc><lastmod>2009-08-13T07:29:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/netherlands-hacking/</loc><lastmod>2009-08-13T07:29:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sip/</loc><lastmod>2009-08-13T07:29:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/calea/</loc><lastmod>2009-07-27T00:46:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/e911/</loc><lastmod>2009-07-27T00:46:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/07/how-law-enforcement-sees-voip/</loc><lastmod>2009-07-27T00:46:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sip-law/</loc><lastmod>2009-07-27T00:46:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-crime/</loc><lastmod>2009-07-27T00:46:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-law/</loc><lastmod>2009-07-27T00:46:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/07/scan-your-public-facing-pbx-with/</loc><lastmod>2009-07-17T00:29:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-security-report/</loc><lastmod>2009-07-17T00:29:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-tools/</loc><lastmod>2009-07-17T00:29:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voipscanner/</loc><lastmod>2009-07-17T00:29:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voipscanner.com/</loc><lastmod>2009-07-17T00:29:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/confidence-2009/</loc><lastmod>2009-05-10T20:23:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/krakow/</loc><lastmod>2009-05-10T20:23:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/poland/</loc><lastmod>2009-05-10T20:23:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/05/scanning-intertubes-for-voip-at/</loc><lastmod>2009-05-10T20:23:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sip-iax2/</loc><lastmod>2009-05-10T20:23:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-presentation/</loc><lastmod>2009-05-10T20:23:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/beer/</loc><lastmod>2009-04-15T07:18:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/iax2autohack/</loc><lastmod>2009-04-15T07:18:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/munich/</loc><lastmod>2009-04-15T07:18:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/troopers09/</loc><lastmod>2009-04-15T07:18:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/04/troopers09-iax2-support/</loc><lastmod>2009-04-15T07:18:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/twitter-security/</loc><lastmod>2009-04-15T07:18:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/04/saas-voip-security-scanning-with/</loc><lastmod>2009-04-07T05:47:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/digest-authentication/</loc><lastmod>2009-04-01T03:50:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/digest-leak/</loc><lastmod>2009-04-01T03:50:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/ip-phone-hack/</loc><lastmod>2009-04-01T03:50:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sip-scan/</loc><lastmod>2009-04-01T03:50:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/04/voipscanner-sip-digest-leak-tutorial/</loc><lastmod>2009-04-01T03:50:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/03/how-to-set-up-voip-lab/</loc><lastmod>2009-03-24T07:11:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/tutorial/</loc><lastmod>2009-03-24T07:11:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-lab/</loc><lastmod>2009-03-24T07:11:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/fingerprinting-sip/</loc><lastmod>2009-03-17T10:17:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/ghostcall/</loc><lastmod>2009-03-17T10:17:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/ip-phone/</loc><lastmod>2009-03-17T10:17:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/03/late-march-updates/</loc><lastmod>2009-03-17T10:17:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/02/how-to-identify-asterisk-servers-and/</loc><lastmod>2009-02-18T06:11:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/mosdef/</loc><lastmod>2009-02-18T06:11:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/call-forwarding/</loc><lastmod>2009-01-21T10:59:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/pbx-hacked/</loc><lastmod>2009-01-21T10:59:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/pbx-phreak/</loc><lastmod>2009-01-21T10:59:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/phone-phreak/</loc><lastmod>2009-01-21T10:59:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/01/phone-phreaks-are-now-using-call/</loc><lastmod>2009-01-21T10:59:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/canvas/</loc><lastmod>2009-01-06T14:39:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/immunity/</loc><lastmod>2009-01-06T14:39:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sipautohack/</loc><lastmod>2009-01-06T14:39:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/01/voippack-released/</loc><lastmod>2009-01-06T14:39:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/port-5060/</loc><lastmod>2009-01-06T13:34:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/scans/</loc><lastmod>2009-01-06T13:34:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-scanning/</loc><lastmod>2009-01-06T13:34:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2009/01/voip-scanning-on-increase/</loc><lastmod>2009-01-06T13:34:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/</loc><lastmod>2008-12-13T01:34:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/12/introducing-enablesecurity-voippack/</loc><lastmod>2008-12-13T01:34:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/10/off-to-rsa-europe-2008/</loc><lastmod>2008-10-26T03:47:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/rsa-europe-2008/</loc><lastmod>2008-10-26T03:47:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/10/analysis-of-voip-attack/</loc><lastmod>2008-10-24T00:06:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-spam/</loc><lastmod>2008-10-24T00:06:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sipvicious-tools/</loc><lastmod>2008-09-09T22:24:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/09/upcoming-changes-in-sipvicious/</loc><lastmod>2008-09-09T22:24:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/update/</loc><lastmod>2008-09-09T22:24:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/hacked/</loc><lastmod>2008-08-21T07:21:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/homeland-security/</loc><lastmod>2008-08-21T07:21:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/08/homeland-security-depts-pbx-hacked/</loc><lastmod>2008-08-21T07:21:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-hacker/</loc><lastmod>2008-08-21T07:21:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/cookies/</loc><lastmod>2008-08-11T04:07:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/enablesecurity/</loc><lastmod>2008-08-11T04:07:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/08/surf-jack-https-will-not-save-you/</loc><lastmod>2008-08-11T04:07:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/08/new-sipvicious-release-024/</loc><lastmod>2008-08-10T09:32:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/backtrack/</loc><lastmod>2008-06-20T05:40:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/backtrack-3/</loc><lastmod>2008-06-20T05:40:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/06/backtrack-3-out-with-voip-security/</loc><lastmod>2008-06-20T05:40:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/independent-research/</loc><lastmod>2008-06-17T01:10:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/06/ladies-and-gentlemen-please-welcome/</loc><lastmod>2008-06-17T01:10:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/research-and-design/</loc><lastmod>2008-06-17T01:10:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/reverse-engineering/</loc><lastmod>2008-06-17T01:10:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/security-consultancy-x-security-vulnerability/</loc><lastmod>2008-06-17T01:10:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/web-application-security/</loc><lastmod>2008-06-17T01:10:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/wireless-security/</loc><lastmod>2008-06-17T01:10:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/security-tools/</loc><lastmod>2008-06-11T08:06:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/06/sipvicious-tools-roadmap/</loc><lastmod>2008-06-11T08:06:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/06/sipvicious-version-023-with/</loc><lastmod>2008-06-03T05:37:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/hacking/</loc><lastmod>2008-05-15T02:37:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/underground/</loc><lastmod>2008-05-15T02:37:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/05/voip-and-identity-fraud-on-bbc/</loc><lastmod>2008-05-15T02:37:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/defcon-15/</loc><lastmod>2008-05-02T10:13:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/05/defcon-15-videos-voip-related-talks/</loc><lastmod>2008-05-02T10:13:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/hids/</loc><lastmod>2008-05-02T01:05:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/ossec/</loc><lastmod>2008-05-02T01:05:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/05/ossec-v15-now-has-builtin-asterisk/</loc><lastmod>2008-05-02T01:05:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/infosec-europe/</loc><lastmod>2008-04-22T07:03:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/04/infosec-europe-2008/</loc><lastmod>2008-04-22T07:03:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/04/new-instructional-videos-and-articles/</loc><lastmod>2008-04-20T02:32:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/storming-sip-security/</loc><lastmod>2008-04-01T12:46:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/04/storming-sip-security-now-available/</loc><lastmod>2008-04-01T12:46:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-article/</loc><lastmod>2008-04-01T12:46:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/03/blackhat-europe-briefings-day-2/</loc><lastmod>2008-03-29T23:39:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/black-hat/</loc><lastmod>2008-03-28T00:17:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/blackhat-europe/</loc><lastmod>2008-03-28T00:17:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/03/blackhat-europe-briefings-day-1/</loc><lastmod>2008-03-28T00:17:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/03/blackhat-europe-twitter/</loc><lastmod>2008-03-27T03:35:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/blackhat/</loc><lastmod>2008-03-23T15:35:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/03/blackhat-europe/</loc><lastmod>2008-03-23T15:35:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/penetration-testing/</loc><lastmod>2008-03-21T13:21:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/03/sipvicious-tool-suite-on-backtrack-3/</loc><lastmod>2008-03-21T13:21:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/ids/</loc><lastmod>2008-03-15T02:15:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/03/using-ossec-to-detect-attacks-on/</loc><lastmod>2008-03-15T02:15:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/spoof-call/</loc><lastmod>2008-03-14T11:00:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/03/swatters-using-voip-to-spoof-caller-id/</loc><lastmod>2008-03-14T11:00:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/hakin9/</loc><lastmod>2008-02-22T07:56:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/02/storming-sip-security/</loc><lastmod>2008-02-22T07:56:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/02/detecting-sip-attacks-with-snort/</loc><lastmod>2008-02-17T07:44:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/snort-rules/</loc><lastmod>2008-02-17T07:44:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/snort-sip/</loc><lastmod>2008-02-17T07:44:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-snort/</loc><lastmod>2008-02-17T07:44:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/secure-sip/</loc><lastmod>2008-02-08T06:33:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/02/sip-tls-and-asterisk-16/</loc><lastmod>2008-02-08T06:33:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sips/</loc><lastmod>2008-02-08T06:33:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/tls/</loc><lastmod>2008-02-08T06:33:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/02/most-popular-topics-on-sipvicious-blog/</loc><lastmod>2008-02-04T09:30:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/01/sip-fingerprinting-in-svn/</loc><lastmod>2008-01-27T06:58:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/01/call-jacking-phreaking-bt-home-hub/</loc><lastmod>2008-01-21T07:19:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/phreak/</loc><lastmod>2008-01-21T07:19:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-phreak/</loc><lastmod>2008-01-21T07:19:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/spam/</loc><lastmod>2008-01-21T06:54:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/vishing/</loc><lastmod>2008-01-21T06:54:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/01/vishing-alarming-rise/</loc><lastmod>2008-01-21T06:54:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-phishing/</loc><lastmod>2008-01-21T06:54:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2008/01/voip-security-vulnerabilities-sans-giac/</loc><lastmod>2008-01-11T06:58:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/</loc><lastmod>2007-12-31T00:31:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/24c3/</loc><lastmod>2007-12-31T00:31:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/12/24c3-quick-roundup/</loc><lastmod>2007-12-31T00:31:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/12/24c3-photos/</loc><lastmod>2007-12-28T04:22:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/fingerprint/</loc><lastmod>2007-12-19T09:25:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/svmap/</loc><lastmod>2007-12-19T09:25:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/12/whats-brewing-on-sipvicious-front/</loc><lastmod>2007-12-19T09:25:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/password-policies/</loc><lastmod>2007-12-11T06:14:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/12/password-policies-for-pbx-servers/</loc><lastmod>2007-12-11T06:14:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/12/24c3-coming-up/</loc><lastmod>2007-12-01T09:04:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/ccc/</loc><lastmod>2007-12-01T09:04:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/conference/</loc><lastmod>2007-12-01T09:04:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/congress/</loc><lastmod>2007-12-01T09:04:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/11/introduction-to-svcrack/</loc><lastmod>2007-11-29T10:06:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/replay/</loc><lastmod>2007-11-29T10:06:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sip-security/</loc><lastmod>2007-11-29T10:06:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/site-news/</loc><lastmod>2007-11-29T10:06:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/11/siptap-and-tapping-phone-calls/</loc><lastmod>2007-11-24T11:10:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/analysis/</loc><lastmod>2007-11-21T08:41:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/11/its-end-of-world-as-we-know-it/</loc><lastmod>2007-11-21T08:41:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-report/</loc><lastmod>2007-11-21T08:41:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/11/introduction-to-svmap/</loc><lastmod>2007-11-20T07:00:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip-security-paper-analysis-encryption-zrtp-mikey-sdes-sip/</loc><lastmod>2007-11-20T07:00:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/11/sipvicious-version-021-released/</loc><lastmod>2007-11-07T04:41:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/exploit/</loc><lastmod>2007-11-05T02:04:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/madyes/</loc><lastmod>2007-11-05T02:04:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/re-invite/</loc><lastmod>2007-11-05T02:04:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/11/re-invite-and-authentication/</loc><lastmod>2007-11-05T02:04:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/security-exploit/</loc><lastmod>2007-11-05T02:04:00-08:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/11/sipvicious-021-public-beta/</loc><lastmod>2007-11-03T02:38:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/grandstream/</loc><lastmod>2007-10-30T09:06:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/10/more-on-inviteing-phones-to-ring/</loc><lastmod>2007-10-30T09:06:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/open-source/</loc><lastmod>2007-10-30T09:06:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sjphone/</loc><lastmod>2007-10-30T09:06:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/spit/</loc><lastmod>2007-10-30T09:06:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/vulnerability/</loc><lastmod>2007-10-30T09:06:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/caller-id/</loc><lastmod>2007-10-30T08:40:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/10/how-not-to-get-your-ex-back/</loc><lastmod>2007-10-30T08:40:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/callid/</loc><lastmod>2007-10-28T11:54:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/ekiga/</loc><lastmod>2007-10-28T11:54:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/10/server-impersonation-and-sip/</loc><lastmod>2007-10-28T11:54:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sniff-phone-calls/</loc><lastmod>2007-10-28T11:54:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/softphone/</loc><lastmod>2007-10-28T11:54:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/spoof/</loc><lastmod>2007-10-28T11:54:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/hacker/</loc><lastmod>2007-10-23T07:54:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/10/how-to-get-job-done-short-story/</loc><lastmod>2007-10-23T07:54:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/literature/</loc><lastmod>2007-10-23T07:54:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/short-story/</loc><lastmod>2007-10-23T07:54:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/goodies/</loc><lastmod>2007-10-20T09:51:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/10/tshirts-and-mugs/</loc><lastmod>2007-10-20T09:51:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/10/wiki-updates/</loc><lastmod>2007-10-18T06:40:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/10/bluebox-podcast-mentions-sipvicious/</loc><lastmod>2007-10-13T01:08:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/flaw/</loc><lastmod>2007-10-12T08:28:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/xss/</loc><lastmod>2007-10-12T08:28:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/10/xss-in-linksys-spa941/</loc><lastmod>2007-10-12T08:28:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/10/on-reporting-bugs-and-recent-bug-fixes/</loc><lastmod>2007-10-11T13:22:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/crack/</loc><lastmod>2007-10-08T15:07:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/10/sipvicious-02-released/</loc><lastmod>2007-10-08T15:07:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/10/ladies-and-gentlemen-please-welcome/</loc><lastmod>2007-10-06T01:04:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/10/sipvicious-tools-019-aka-02-beta/</loc><lastmod>2007-10-03T01:33:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/09/sip-introduction/</loc><lastmod>2007-09-27T03:57:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/09/another-interview-with-robert-moore/</loc><lastmod>2007-09-26T22:55:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/mediadefender/</loc><lastmod>2007-09-18T22:49:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/09/mediadefender-phone-call-was-over-voip/</loc><lastmod>2007-09-18T22:49:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sniff-voip/</loc><lastmod>2007-09-18T22:49:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/microsoft/</loc><lastmod>2007-09-18T01:48:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/microsoft-office-communicator/</loc><lastmod>2007-09-18T01:48:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/microsoft-outlook/</loc><lastmod>2007-09-18T01:48:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/microsoft-voip/</loc><lastmod>2007-09-18T01:48:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/09/microsoft-voip-as-you-are/</loc><lastmod>2007-09-18T01:48:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/unified-communications/</loc><lastmod>2007-09-18T01:48:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/blog/</loc><lastmod>2007-09-11T04:54:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/09/sipvicious-tools-in-works/</loc><lastmod>2007-09-11T04:54:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/blue-box/</loc><lastmod>2007-09-08T01:05:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/podcast/</loc><lastmod>2007-09-08T01:05:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/09/sip-security-with-cullen-jennings-of/</loc><lastmod>2007-09-08T01:05:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/mikey/</loc><lastmod>2007-09-07T07:14:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/paper/</loc><lastmod>2007-09-07T07:14:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/sdes/</loc><lastmod>2007-09-07T07:14:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/09/security-analysis-of-voice-over-ip/</loc><lastmod>2007-09-07T07:14:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/security-paper/</loc><lastmod>2007-09-07T07:14:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/voip/</loc><lastmod>2007-09-07T07:14:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/white-paper/</loc><lastmod>2007-09-07T07:14:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/zrtp/</loc><lastmod>2007-09-07T07:14:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/08/voip-related-blogs/</loc><lastmod>2007-08-30T06:25:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/hardphone/</loc><lastmod>2007-08-24T04:31:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/08/how-to-turn-grandstream-sip-phone-into/</loc><lastmod>2007-08-24T04:31:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/08/updates-to-sipvicious-tools/</loc><lastmod>2007-08-24T00:22:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/08/cisco-ip-phone-7940-exploits/</loc><lastmod>2007-08-22T05:59:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/buffer-overflow/</loc><lastmod>2007-08-08T23:19:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/08/sip-softphone-buffer-overflow-demo/</loc><lastmod>2007-08-08T23:19:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/h.323-voip-interview-robert-moore/</loc><lastmod>2007-08-03T16:24:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/08/interview-with-voip-hacker/</loc><lastmod>2007-08-03T16:24:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/07/sipvicious-tools-for-auditing-sip/</loc><lastmod>2007-07-29T10:50:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/2007/07/sipvicious-launched/</loc><lastmod>2007-07-29T09:51:00-07:00</lastmod></url><url><loc>https://blog.sipvicious.org/about/</loc><lastmod>1957-05-10T00:00:00+00:00</lastmod></url><url><loc>https://blog.sipvicious.org/tags/1/8-pollution/</loc></url></urlset>