Chapter 6

When SIP Attacks


This chapter discusses VoIP signaling attacks that provide a means to attack and manipulate the VoIP call flow.


VoIP; VoIP signaling attacks; Forensics; VoIP attacks; Voice over IP; VoIP PenTesting

SIP Attacks: Introduction

Now that we have a basic understanding of the protocols and the various requests and responses that can be utilized, we can start looking at the various attacks we can carry out within the VoIP environment. If you plan to follow along and attempt these attacks within your ...

Get Unified Communications Forensics now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.