VoIP Security and Hacking

  1. Cryptography in VoIP
    1. Encrypting Signaling Traffic
      1. Transport Layer Security (TLS) for SIP
        1. SIP over TLS Configuration
          1. TLS Version Selection
            1. Cipher Suite Selection
            2. Mutual TLS (mTLS) Authentication
              1. Certificate-Based Authentication
                1. Client Certificate Validation
                2. Certificate Management
                  1. Certificate Authorities
                    1. Certificate Revocation
                      1. Certificate Lifecycle Management
                        1. Certificate Pinning
                        2. IPSec for VoIP
                          1. IPSec Tunnel Mode
                            1. IPSec Transport Mode
                              1. Key Management
                            2. Encrypting Media Streams
                              1. Secure Real-time Transport Protocol (SRTP)
                                1. SRTP Configuration
                                  1. SRTP Key Management
                                    1. SRTP Profiles
                                      1. Authentication Tag Validation
                                      2. Key Exchange Mechanisms
                                        1. SDP Security Descriptions (SDES)
                                          1. Multimedia Internet KEYing (MIKEY)
                                            1. ZRTP Protocol
                                              1. DTLS-SRTP
                                              2. Advanced Media Encryption
                                                1. End-to-End Encryption
                                                  1. Perfect Forward Secrecy
                                                    1. Key Rotation
                                                  2. Public Key Infrastructure (PKI) for VoIP
                                                    1. PKI Components
                                                      1. Certificate Authorities (CA)
                                                        1. Registration Authorities (RA)
                                                          1. Certificate Repositories
                                                          2. Certificate Lifecycle Management
                                                            1. Certificate Enrollment
                                                              1. Certificate Renewal
                                                                1. Certificate Revocation
                                                                  1. Certificate Validation
                                                                  2. Trust Models
                                                                    1. Hierarchical Trust
                                                                      1. Web of Trust
                                                                        1. Cross-Certification