VoIP Security and Hacking

  1. Common VoIP Attacks and Exploits
    1. Eavesdropping and Interception
      1. Call Sniffing on the Local Network
        1. ARP Spoofing for VoIP Traffic
          1. Port Mirroring Attacks
            1. Switch CAM Table Flooding
            2. Man-in-the-Middle (MITM) Attacks
              1. SIP Proxying
                1. RTP Stream Interception
                  1. DNS Spoofing
                    1. DHCP Spoofing
                    2. Capturing RTP Streams
                      1. Tools for RTP Capture
                        1. Identifying RTP Flows
                          1. Stream Correlation Techniques
                          2. Reconstructing Audio from Captured Packets
                            1. RTP Stream Reassembly
                              1. Audio Playback Techniques
                                1. Codec Decoding
                              2. Toll Fraud and Service Abuse
                                1. Unauthorized Call Forwarding
                                  1. Exploiting Call Forward Features
                                    1. Remote Call Forwarding
                                    2. International Revenue Share Fraud (IRSF)
                                      1. Premium Number Abuse
                                        1. Revenue Sharing Schemes
                                        2. Exploiting Voicemail Systems
                                          1. Voicemail PIN Cracking
                                            1. Unauthorized Access to Messages
                                              1. Voicemail Forwarding Abuse
                                              2. Compromising IP-PBX for Outbound Calls
                                                1. Gaining Administrative Access
                                                  1. Placing Unauthorized Calls
                                                    1. Trunk Hijacking
                                                    2. Conference Bridge Abuse
                                                      1. Unauthorized Conference Access
                                                        1. Conference Room Hijacking
                                                      2. Denial of Service (DoS) and Disruption
                                                        1. SIP INVITE Floods
                                                          1. Overloading Call Setup
                                                            1. Resource Exhaustion
                                                            2. SIP REGISTER Floods
                                                              1. Exhausting Registration Resources
                                                                1. Memory Exhaustion Attacks
                                                                2. Malformed Packet Attacks
                                                                  1. Protocol Fuzzing
                                                                    1. Exploiting Parsing Bugs
                                                                      1. Invalid Header Attacks
                                                                      2. RTP Stream Flooding
                                                                        1. Bandwidth Exhaustion
                                                                          1. Media Server Overload
                                                                          2. Tearing Down Active Calls
                                                                            1. Sending BYE or CANCEL Messages
                                                                              1. Call Hijacking
                                                                              2. Distributed Denial of Service (DDoS)
                                                                                1. Amplification Attacks
                                                                                  1. Botnet-Based Attacks
                                                                                2. Identity and Trust Exploitation
                                                                                  1. Caller ID Spoofing
                                                                                    1. Manipulating SIP Headers
                                                                                      1. P-Asserted-Identity Spoofing
                                                                                        1. Display Name Manipulation
                                                                                        2. Voice Phishing (Vishing)
                                                                                          1. Social Engineering via VoIP
                                                                                            1. Impersonation Attacks
                                                                                            2. SIP Registration Hijacking
                                                                                              1. Stealing Registration Credentials
                                                                                                1. Registration Replacement
                                                                                                2. Message Tampering
                                                                                                  1. Modifying SIP/SDP Content
                                                                                                    1. Header Manipulation
                                                                                                      1. Media Description Alteration
                                                                                                    2. Session and Device Hijacking
                                                                                                      1. Replay Attacks
                                                                                                        1. Reusing Captured Packets
                                                                                                          1. Authentication Replay
                                                                                                          2. Exploiting Weak Digest Authentication
                                                                                                            1. Brute Forcing SIP Authentication
                                                                                                              1. Dictionary Attacks
                                                                                                                1. Rainbow Table Attacks
                                                                                                                2. Taking Control of Endpoints
                                                                                                                  1. Remote Code Execution
                                                                                                                    1. Unauthorized Configuration Changes
                                                                                                                      1. Firmware Exploitation
                                                                                                                      2. Call Redirection Attacks
                                                                                                                        1. Unauthorized Call Transfers
                                                                                                                          1. Call Forwarding Manipulation