Chapter 8

VoIP Bots


This chapter describes utilization of the RTP stream as a covert communication channel for exfiltration of data, and command and control of botnets.


VoIP,; VoIP session attacks,; Forensics,; VoIP attacks,; Voice over IP,; VoIP PenTesting,; Botnet,; Zombies


VoIP has an interesting place in the current landscape of IT infrastructure. In the past, Telephony has always been viewed as being outside the purview of the standard IT infrastructure. However, this has become an issue as the data and voice networks converge. The typical mitigating controls have been slow, at best, to ...

Get Unified Communications Forensics now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.