O'Reilly logo

Hacking VoIP by Himanshu Dwivedi

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

VoIP Basics

Before we delve too far into VoIP's security issues, we should discuss the basics of the technology. Many buzzwords, protocols, and devices are associated with VoIP. In order to fully understand the security implications of all the protocols and devices that make up VoIP, we will discuss the major ones briefly.

How It Works

VoIP uses IP technology. In a manner similar to how your computer uses TCP/IP to transfer packets with data, VoIP transmits packets with audio. Instead of the data protocols—such as HTTP, HTTPS, POP3/IMAP, and SMTP—used in the transfer of data packets, VoIP packets use voice protocols, such as SIP (Session Initiation Protocol), H.323, IAX (Inter-Asterisk eXchange protocol), and RTP (Real-time Transport Protocol). ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required