UsefulLinks
Computer Science
Cybersecurity
VoIP Security and Hacking
1. Introduction to VoIP Technology
2. VoIP Architecture and Components
3. The VoIP Threat Landscape
4. VoIP Reconnaissance and Enumeration
5. Common VoIP Attacks and Exploits
6. Securing VoIP Infrastructure
7. Cryptography in VoIP
8. Authentication and Authorization
9. VoIP Security Monitoring and Incident Response
10. VoIP Security Auditing and Penetration Testing
11. Advanced Topics and Future Trends
7.
Cryptography in VoIP
7.1.
Encrypting Signaling Traffic
7.1.1.
Transport Layer Security (TLS) for SIP
7.1.1.1.
SIP over TLS Configuration
7.1.1.2.
TLS Version Selection
7.1.1.3.
Cipher Suite Selection
7.1.2.
Mutual TLS (mTLS) Authentication
7.1.2.1.
Certificate-Based Authentication
7.1.2.2.
Client Certificate Validation
7.1.3.
Certificate Management
7.1.3.1.
Certificate Authorities
7.1.3.2.
Certificate Revocation
7.1.3.3.
Certificate Lifecycle Management
7.1.3.4.
Certificate Pinning
7.1.4.
IPSec for VoIP
7.1.4.1.
IPSec Tunnel Mode
7.1.4.2.
IPSec Transport Mode
7.1.4.3.
Key Management
7.2.
Encrypting Media Streams
7.2.1.
Secure Real-time Transport Protocol (SRTP)
7.2.1.1.
SRTP Configuration
7.2.1.2.
SRTP Key Management
7.2.1.3.
SRTP Profiles
7.2.1.4.
Authentication Tag Validation
7.2.2.
Key Exchange Mechanisms
7.2.2.1.
SDP Security Descriptions (SDES)
7.2.2.2.
Multimedia Internet KEYing (MIKEY)
7.2.2.3.
ZRTP Protocol
7.2.2.4.
DTLS-SRTP
7.2.3.
Advanced Media Encryption
7.2.3.1.
End-to-End Encryption
7.2.3.2.
Perfect Forward Secrecy
7.2.3.3.
Key Rotation
7.3.
Public Key Infrastructure (PKI) for VoIP
7.3.1.
PKI Components
7.3.1.1.
Certificate Authorities (CA)
7.3.1.2.
Registration Authorities (RA)
7.3.1.3.
Certificate Repositories
7.3.2.
Certificate Lifecycle Management
7.3.2.1.
Certificate Enrollment
7.3.2.2.
Certificate Renewal
7.3.2.3.
Certificate Revocation
7.3.2.4.
Certificate Validation
7.3.3.
Trust Models
7.3.3.1.
Hierarchical Trust
7.3.3.2.
Web of Trust
7.3.3.3.
Cross-Certification
Previous
6. Securing VoIP Infrastructure
Go to top
Next
8. Authentication and Authorization