O'Reilly logo

Hacking VoIP by Himanshu Dwivedi

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

RTP Security Attacks

Security attacks on VoIP are usually focused on capturing media (audio), which involves RTP. The lack of encryption and/or privacy allows several types of attacks from unauthorized users, including anonymous, unauthenticated users.

Note

While Secure RTP (SRTP), described in Chapter 9, does provide security for media communication, most enterprise organizations have not implemented SRTP because of performance and/or operational issues.

RTP is vulnerable to many types of attacks, including traditional ones, such as spoofing, hijacking, Denial of Service, and traffic manipulation, as well as newer ones, such as eavesdropping and voice injection. In the following sections, we'll focus on the most dangerous and severe attacks on RTP, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required