Skip to Main Content
Unified Communications Forensics
book

Unified Communications Forensics

by Nicholas Mr. Grant, Joseph II Shaw
October 2013
Intermediate to advanced content levelIntermediate to advanced
156 pages
3h 37m
English
Syngress
Content preview from Unified Communications Forensics
Chapter 8

VoIP Bots

Abstract

This chapter describes utilization of the RTP stream as a covert communication channel for exfiltration of data, and command and control of botnets.

Keywords

VoIP,; VoIP session attacks,; Forensics,; VoIP attacks,; Voice over IP,; VoIP PenTesting,; Botnet,; Zombies

Introduction

VoIP has an interesting place in the current landscape of IT infrastructure. In the past, Telephony has always been viewed as being outside the purview of the standard IT infrastructure. However, this has become an issue as the data and voice networks converge. The typical mitigating controls have been slow, at best, to ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Seven Deadliest Network Attacks

Seven Deadliest Network Attacks

Stacy Prowell, Rob Kraus, Mike Borkin
Securing VoIP

Securing VoIP

Regis Jr (Bud) Bates

Publisher Resources

ISBN: 9781597499927