Summary

In this chapter, we demonstrated how to exploit the VoIP infrastructure. We started by studying the core protocols involved in VoIP. Then, we explored the major VoIP attacks and how to defend against them, in addition to the tools and utilities most commonly used by penetration testers. We finished the chapter with an overview of some of the state-of-the-art attacks against VoLTE.

Get Advanced Infrastructure Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.