Summary

As you can see, with the appropriate level of network access, an attacker can completely subvert and control the VoIP session, including eavesdropping, diverting, or squashing the conversations taking place. The countermeasures outlined in this chapter are obviously not just VoIP specific, but are also critical to preventing MITM attacks against all other critical applications flowing through your network.



Hacking Exposed VoIP. Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net