Monitoring, capturing, and eavesdropping on VoIP traffic
In this recipe, we will explore the process of using BackTrack 5 tools to monitor, capture, and eavesdrop on VoIP traffic. During this process, we will utilize two programs to assist us in each phase. They include:
- Arpspoof: This program allows us to perform an ARP Poisoning attack on the network.
- Wireshark: This program allows us to capture network traffic. We will also use Wireshark to convert the RTP traffic captured into playable audio files that allow us to eavesdrop.
The following requirements need to be fulfilled:
- You will need an Internet or intranet connection to complete this recipe
- You will also need SIP or PBX devices on your network in an active call