Chapter 6

When SIP Attacks

Abstract

This chapter discusses VoIP signaling attacks that provide a means to attack and manipulate the VoIP call flow.

Keywords

VoIP; VoIP signaling attacks; Forensics; VoIP attacks; Voice over IP; VoIP PenTesting

SIP Attacks: Introduction

Now that we have a basic understanding of the protocols and the various requests and responses that can be utilized, we can start looking at the various attacks we can carry out within the VoIP environment. If you plan to follow along and attempt these attacks within your ...

Get Unified Communications Forensics now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.