When SIP Attacks
This chapter discusses VoIP signaling attacks that provide a means to attack and manipulate the VoIP call flow.
VoIP; VoIP signaling attacks; Forensics; VoIP attacks; Voice over IP; VoIP PenTesting
SIP Attacks: Introduction
Now that we have a basic understanding of the protocols and the various requests and responses that can be utilized, we can start looking at the various attacks we can carry out within the VoIP environment. If you plan to follow along and attempt these attacks within your ...