Attack Vectors
All technology has a security issue, from electronic voting machines to VoIP. One of the items that often confuses or inappropriately diffuses matters is the perceived difficulty involved in launching and carrying out an attack. The truth is that with sufficient motivation, including possible wealth, fame, or vengeance, any security issue can be exposed and exploited. VoIP attack vectors are similar to traditional vectors in networking equipment. For example, there is no need to have physical access to a phone or to the PBX closet. The access needed to perform VoIP attacks depend on the type of VoIP deployment. The most popular attack vectors for VoIP networks are shown in the following list.
A local subnet, such as an internal network, ...
Get Hacking VoIP now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.