Request spoofing and Call masquerading VoIP-SIP Security

1- Request spoofing:The aim of this attack is to modify the identity of the sender of a message to make his target (either a person or a network server) believe that he’s communicating with  a legitimate user, while in fact he’s talking to the attacker. To do this the attacker listens to the network to gather a REGISTER or INVITE message. He can then use the message to forge messages using the victim’s identity.
The attacker must be able to gather INVITE of REGISTER requests from the network,and send a forged message to the target.
2-Call masquerading:The attacker simply masks his identity, increasing the chance that the call will be taken. The call can then be telemarketing, pre-recorded publicity or other SPAM.
The attacker must be able to mask his information
Read More: http://www.vadese.org/files/upload/Best_practices_VoIP_en_v20.pdf


  

Related post



Newer Post Older Post

0 comments:

Post a Comment

 

Wiki Voip And Fax Tutorials Copyright © 2010 Labloub