O'Reilly logo

Metasploit Penetration Testing Cookbook - Second Edition by Abhinav Singh, Monika Agarwal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. VoIP Penetration Testing

In this chapter, we will cover:

  • Scanning and enumeration
  • Yielding passwords
  • VLAN hopping
  • VoIP MAC spoofing
  • Impersonation attack
  • DoS attack

Introduction

VoIP is a technology providing many benefits and cost economic methods for better communication. Now a days, more and more small businesses and enterprises are substituting their old conventional PSTNs with IP-based ones. A VoIP-based PBX can provide us with many feature's such as multiple extensions, caller ID, voicemail, IVR capabilities, recording, logging, and usage with hardware or software-based telephones. In the market, there are many vendors for PBX, IP telephones, VoIP services, and equipment such as CISCO, Avaya and Asterisk, SNOM, THOMSON, and so on. With ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required