Useful Links
Computer Science
Cybersecurity
VoIP Security and Hacking
1. Introduction to VoIP Technology
2. VoIP Architecture and Components
3. The VoIP Threat Landscape
4. VoIP Reconnaissance and Enumeration
5. Common VoIP Attacks and Exploits
6. Securing VoIP Infrastructure
7. Cryptography in VoIP
8. Authentication and Authorization
9. VoIP Security Monitoring and Incident Response
10. VoIP Security Auditing and Penetration Testing
11. Advanced Topics and Future Trends
Cryptography in VoIP
Encrypting Signaling Traffic
Transport Layer Security (TLS) for SIP
SIP over TLS Configuration
TLS Version Selection
Cipher Suite Selection
Mutual TLS (mTLS) Authentication
Certificate-Based Authentication
Client Certificate Validation
Certificate Management
Certificate Authorities
Certificate Revocation
Certificate Lifecycle Management
Certificate Pinning
IPSec for VoIP
IPSec Tunnel Mode
IPSec Transport Mode
Key Management
Encrypting Media Streams
Secure Real-time Transport Protocol (SRTP)
SRTP Configuration
SRTP Key Management
SRTP Profiles
Authentication Tag Validation
Key Exchange Mechanisms
SDP Security Descriptions (SDES)
Multimedia Internet KEYing (MIKEY)
ZRTP Protocol
DTLS-SRTP
Advanced Media Encryption
End-to-End Encryption
Perfect Forward Secrecy
Key Rotation
Public Key Infrastructure (PKI) for VoIP
PKI Components
Certificate Authorities (CA)
Registration Authorities (RA)
Certificate Repositories
Certificate Lifecycle Management
Certificate Enrollment
Certificate Renewal
Certificate Revocation
Certificate Validation
Trust Models
Hierarchical Trust
Web of Trust
Cross-Certification
Previous
6. Securing VoIP Infrastructure
Go to top
Next
8. Authentication and Authorization