O'Reilly logo

BackTrack 5 Cookbook by David De Smet, Willie Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Attacking VoIP using Metasploit

In this recipe, we will use Metasploit to attack a VoIP network. Metasploit contains several auxiliaries and modules to be utilized specifically against a VoIP network. Metasploit is a penetration testing framework that is included with BackTrack 5. We explore Metasploit in the recipes of Chapter 5, Exploitation.

Getting ready

The following requirements need to be fulfilled:

  • You will need an Internet or intranet connection to complete this recipe
  • You will also need SIP or PBX devices on your network

How to do it...

Let's begin the process of attacking VoIP using Metasploit by launching the MSFCONSOLE through a terminal window:

  1. Open a terminal window and start the MSFCONSOLE:
    msfconsole
    
  2. Search for SIP modules:
    search SIP ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required