Summary

VoIP infrastructure systems are the backbone of voice communication. H.323 endpoints and SIP User Agents rely on these systems to ensure that calls are managed properly and securely. This chapter showed how VoIP software and hardware appliances can be attacked and/or abused similarly to the way any other technology with a TCP/IP stack can be attacked and/or abused.

For example, a vulnerable Cisco router running TFTP is not much different from a vulnerable Cisco/Avaya hard phone running TFTP. Both devices are vulnerable to all attacks that fall under the TFTP umbrella. Whether it is a hard phone or Cisco/Avaya CallManager software, each service running on these systems needs to be secured.

Advanced applications using VoIP technology, such ...

Get Hacking VoIP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.