February 2018
Intermediate to advanced
396 pages
9h 38m
English
In order to learn how to pentest VoIP, we need to have a clear understanding of how the VoIP infrastructure actually works. We are going to dissect VoIP protocols in order to learn later how to attack VoIP systems. The following subsections are some well-known standards that voice and video communications make possible. Let's explore them one by one.
Read now
Unlock full access