Useful Links
Computer Science
Cybersecurity
VoIP Security and Hacking
1. Introduction to VoIP Technology
2. VoIP Architecture and Components
3. The VoIP Threat Landscape
4. VoIP Reconnaissance and Enumeration
5. Common VoIP Attacks and Exploits
6. Securing VoIP Infrastructure
7. Cryptography in VoIP
8. Authentication and Authorization
9. VoIP Security Monitoring and Incident Response
10. VoIP Security Auditing and Penetration Testing
11. Advanced Topics and Future Trends
Common VoIP Attacks and Exploits
Eavesdropping and Interception
Call Sniffing on the Local Network
ARP Spoofing for VoIP Traffic
Port Mirroring Attacks
Switch CAM Table Flooding
Man-in-the-Middle (MITM) Attacks
SIP Proxying
RTP Stream Interception
DNS Spoofing
DHCP Spoofing
Capturing RTP Streams
Tools for RTP Capture
Identifying RTP Flows
Stream Correlation Techniques
Reconstructing Audio from Captured Packets
RTP Stream Reassembly
Audio Playback Techniques
Codec Decoding
Toll Fraud and Service Abuse
Unauthorized Call Forwarding
Exploiting Call Forward Features
Remote Call Forwarding
International Revenue Share Fraud (IRSF)
Premium Number Abuse
Revenue Sharing Schemes
Exploiting Voicemail Systems
Voicemail PIN Cracking
Unauthorized Access to Messages
Voicemail Forwarding Abuse
Compromising IP-PBX for Outbound Calls
Gaining Administrative Access
Placing Unauthorized Calls
Trunk Hijacking
Conference Bridge Abuse
Unauthorized Conference Access
Conference Room Hijacking
Denial of Service (DoS) and Disruption
SIP INVITE Floods
Overloading Call Setup
Resource Exhaustion
SIP REGISTER Floods
Exhausting Registration Resources
Memory Exhaustion Attacks
Malformed Packet Attacks
Protocol Fuzzing
Exploiting Parsing Bugs
Invalid Header Attacks
RTP Stream Flooding
Bandwidth Exhaustion
Media Server Overload
Tearing Down Active Calls
Sending BYE or CANCEL Messages
Call Hijacking
Distributed Denial of Service (DDoS)
Amplification Attacks
Botnet-Based Attacks
Identity and Trust Exploitation
Caller ID Spoofing
Manipulating SIP Headers
P-Asserted-Identity Spoofing
Display Name Manipulation
Voice Phishing (Vishing)
Social Engineering via VoIP
Impersonation Attacks
SIP Registration Hijacking
Stealing Registration Credentials
Registration Replacement
Message Tampering
Modifying SIP/SDP Content
Header Manipulation
Media Description Alteration
Session and Device Hijacking
Replay Attacks
Reusing Captured Packets
Authentication Replay
Exploiting Weak Digest Authentication
Brute Forcing SIP Authentication
Dictionary Attacks
Rainbow Table Attacks
Taking Control of Endpoints
Remote Code Execution
Unauthorized Configuration Changes
Firmware Exploitation
Call Redirection Attacks
Unauthorized Call Transfers
Call Forwarding Manipulation
Previous
4. VoIP Reconnaissance and Enumeration
Go to top
Next
6. Securing VoIP Infrastructure