Jump to content
Nytro

Enumerating and Breaking VoIP

Recommended Posts

Posted

Enumerating and Breaking VoIP

Introduction

Voice over Internet Protocol (VoIP) has seen rapid implementation over the past few years. Most of the organizations which have implemented VoIP are either unaware or ignore the security issues with VoIP and its implementation. Like every other network, a VoIP network is also susceptible to abuse. In this article, I would discuss about various enumeration techniques followed by demonstration of few VoIP attacks. I deliberately will not go to protocol level details as this article is aimed at Penetration Testers who want to get a taste of the basics first, though it is strongly encouraged to understand the protocols used in VoIP networks.

Possible attacks against VoIP

Denial of Service (DoS) attacks

Registration Manipulation and Hijacking

Authentication attacks

Caller ID spoofing

Man-in-the-middle attacks

VLAN Hopping

Passive and Active Eavesdropping

Spamming over Internet Telephony (SPIT)

VoIP phishing (Vishing)

Download:

http://www.exploit-db.com/download_pdf/18136

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...