Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
| ||
| ||
|
As you can see, with the appropriate level of network access, an attacker can completely subvert and control the VoIP session, including eavesdropping, diverting, or squashing the conversations taking place. The countermeasures outlined in this chapter are obviously not just VoIP specific, but are also critical to preventing MITM attacks against all other critical applications flowing through your network.