VoIP fundamentals

In order to learn how to pentest VoIP, we need to have a clear understanding of how the VoIP infrastructure actually works. We are going to dissect VoIP protocols in order to learn later how to attack VoIP systems. The following subsections are some well-known standards that voice and video communications make possible. Let's explore them one by one.

Get Advanced Infrastructure Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.