October 2013
Intermediate to advanced
156 pages
3h 37m
English
This chapter discusses VoIP signaling attacks that provide a means to attack and manipulate the VoIP call flow.
VoIP; VoIP signaling attacks; Forensics; VoIP attacks; Voice over IP; VoIP PenTesting
Now that we have a basic understanding of the protocols and the various requests and responses that can be utilized, we can start looking at the various attacks we can carry out within the VoIP environment. If you plan to follow along and attempt these attacks within your ...