Chapter 6. ATTACKING VOIP INFRASTRUCTURE
VoIP networks are vulnerable to many forms of common network attacks, and devices that support VoIP infrastructure are also vulnerable to similar issues. In this chapter, we will discuss the security weaknesses that affect the functional components that make up a VoIP network, from devices (hard phones, gatekeepers, registrars, and proxies) to applications (e.g., Cisco CallManager, Avaya Call Center/Server, and voicemail applications). Specifically, you will learn about:
Vendor-specific VoIP sniffing
Common hard phone vulnerabilities
Cisco CallManager and Avaya Call Center/Server attacks
Security holes in the Avaya Modular Messaging Voicemail application
Infrastructure server impersonation/redirection
Attacks ...
Get Hacking VoIP now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.