VoIP Basics
Before we delve too far into VoIP's security issues, we should discuss the basics of the technology. Many buzzwords, protocols, and devices are associated with VoIP. In order to fully understand the security implications of all the protocols and devices that make up VoIP, we will discuss the major ones briefly.
How It Works
VoIP uses IP technology. In a manner similar to how your computer uses TCP/IP to transfer packets with data, VoIP transmits packets with audio. Instead of the data protocols—such as HTTP, HTTPS, POP3/IMAP, and SMTP—used in the transfer of data packets, VoIP packets use voice protocols, such as SIP (Session Initiation Protocol), H.323, IAX (Inter-Asterisk eXchange protocol), and RTP (Real-time Transport Protocol). ...
Get Hacking VoIP now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.