2
VOIP Landscape IP networks are increasingly being
used to carry voice, video, and other communication streams.
New IP voice applications will emerge encouraging the further adoption of this technology.
The combined services provide triple the attack targets and triples the risk.
4
VOIP Vulnerabilities
Eavesdropping – Sniffing SIP Signals Identity Spoofing – Call Redirection Identity and Toll Fraud – Stolen
Credentials Call Integrity – Altered Voice Packets DOS – Against SIP, RTP
5
Interception Attack
AttackerPING PING
Phone-APhone-B
192.168.1.100:50:56:01:01:01
192.168.1.200:50:56:01:01:02
192.168.1.500:50:56:01:01:05
192.168.1.1 00:50:56:01:01:01
192.168.1.200:50:56:01:01:02
192.168.1.1 192.168.1.2
ARP Spoof
To get to 192.168.1.2 useMAC 00:50:56:01:01:05
ARP Spoof
To get to 192.168.1.1 useMAC 00:50:56:01:01:05
ARP Spoofing on Switched LAN
6
Interception Attack
AttackerPhone-APhone-B
192.168.1.100:50:56:01:01:01
192.168.1.200:50:56:01:01:02
192.168.1.500:50:56:01:01:05
Call Interception
SIP INVITE to Phone-B Forward SIP INVITE
to Phone-B
SIP Response to Phone-A
Forward SIP Response to Phone-A
Conversation
RTP (UDP) RTP (UDP)