The goal of this attack is to listen to or record an ongoing conversation. The attacker simply either uses a tool to intercept the packets (such as placing a hub on the line the data will follow) or plugs onto a switch to captures the packets through ARP poisoning. The content of the packets can then be replayed.
The attacker must have physical access to the network equipment.
Read More:http://www.vadese.org/files/upload/Best_practices_VoIP_en_v20.pdf
VoIP-SIP Security Physical eavesdropping
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment