Infrastructure Server Impersonation
Moving beyond attacks against infrastructure systems, attacks impersonating infrastructure VoIP devices are a bit more interesting. An attacker's ability to spoof a legitimate gatekeeper, Registrar, Proxy server, or any other VoIP authentication entity can be quite harmful. This section describes the use of a fake infrastructure system to gain access to a user's VoIP credentials, eavesdrop on the user's calls, or redirect a call's destination. The VoIP entities we will discuss are:
Spoofing SIP Proxies and Registrars
Redirecting H.323 gatekeepers
Spoofing SIP Proxies and Registrars
Many spoofing attacks against VoIP networks that use SIP are possible, including the ability to spoof infrastructure systems such as ...
Get Hacking VoIP now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.