When SIP Attacks
Abstract
This chapter discusses VoIP signaling attacks that provide a means to attack and manipulate the VoIP call flow.
Keywords
VoIP; VoIP signaling attacks; Forensics; VoIP attacks; Voice over IP; VoIP PenTesting
SIP Attacks: Introduction
Now that we have a basic understanding of the protocols and the various requests and responses that can be utilized, we can start looking at the various attacks we can carry out within the VoIP environment. If you plan to follow along and attempt these attacks within your ...
Get Unified Communications Forensics now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.