Summary

As you have no doubt noticed from this chapter, many unconventional attacks are possible with VoIP infrastructure. The descriptions of many of these attacks in this chapter have shown the most severe cases, which allow any user to download the Asterisk PBX system and within a few moments play games on trusted devices in our homes and offices (landlines and mobile phones, as well as VoIP phones). VoIP technology has a long way to go in terms of trust boundaries and security guarantees, because abuse of the system is not actively defended against or secured. History tells us that when abuse is allowed and can lead to financial gain, such as with email technologies, attackers will not hesitate to take advantage of the opportunity. Unfortunately ...

Get Hacking VoIP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.