Image for post
Image for post

Most of the Corporates do not focus on their internal security. They think that they are secure because their internal assets are accessible by internally. But Red Team Members know very well that How can attacker exploit internal infrastructures.

Voice over Internet Protocol (VoIP) has seen rapid implementation over the past few years. Most of the organisations which have implemented VoIP are either unaware or ignore the security issues with VoIP and its implementation. Like every other network, a VoIP network is also susceptible to abuse.

You can read more about VoIP here & SIP here.

Possible attacks against VoIP:

  1. Denial of Service (DoS)…

About

Harshit Sengar

Synack Red Team Member. I am a cyber security enthusiast and security researcher. https://harshitsengar.in

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store