This chapter describes utilization of the RTP stream as a covert communication channel for exfiltration of data, and command and control of botnets.
VoIP,; VoIP session attacks,; Forensics,; VoIP attacks,; Voice over IP,; VoIP PenTesting,; Botnet,; Zombies
VoIP has an interesting place in the current landscape of IT infrastructure. In the past, Telephony has always been viewed as being outside the purview of the standard IT infrastructure. However, this has become an issue as the data and voice networks converge. The typical mitigating controls have been slow, at best, to ...