O'Reilly logo

BackTrack 5 Cookbook by David De Smet, Willie Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Monitoring, capturing, and eavesdropping on VoIP traffic

In this recipe, we will explore the process of using BackTrack 5 tools to monitor, capture, and eavesdrop on VoIP traffic. During this process, we will utilize two programs to assist us in each phase. They include:

  • Arpspoof: This program allows us to perform an ARP Poisoning attack on the network.
  • Wireshark: This program allows us to capture network traffic. We will also use Wireshark to convert the RTP traffic captured into playable audio files that allow us to eavesdrop.

Getting ready

The following requirements need to be fulfilled:

  • You will need an Internet or intranet connection to complete this recipe
  • You will also need SIP or PBX devices on your network in an active call

How to do it...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required