Summary

VoIP is an exciting emerging technology. While VoIP has been around for years, organizations and home users have only recently begun to adopt it. As with any new trend, the security impact on private and sensitive information needs to be addressed. The good news is that when done correctly, VoIP can be secure. However, similar to any technology that transports confidential information, security testing and evaluation needs to be performed to properly show the potential risk to an organization. This book is an attempt to start the discussion for vulnerability detection, by showing the security weaknesses and countermeasures for most current VoIP deployments.

Get Hacking VoIP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.