{"id":661,"date":"2014-07-15T11:12:25","date_gmt":"2014-07-15T11:12:25","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=661"},"modified":"2022-12-02T17:00:16","modified_gmt":"2022-12-02T11:30:16","slug":"voip-penetration-testing-part-iv","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/","title":{"rendered":"VoIP Penetration Testing Part \u2013 IV"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2014\/06\/voip-Copy-1024x600.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"voip Copy - Varutra Consulting\"><br \/>\n&nbsp;<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">In the previous tutorial <span style=\"color: #0000ff\"><a href=\"https:\/\/www.varutra.com\/blog\/?p=599\"><span style=\"color: #0000ff\">VoIP Penetration Testing Part \u2013 III<\/span><\/a><\/span> we have learnt about SIP User extension enumeration. This is the last article in which we will focus on various VoIP attacks such as attacking VoIP authentication, DoS Attack and Caller ID Spoofing.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #000000\"><strong>Attacking VoIP Authentication :<br \/>\n<\/strong><\/span><\/h3>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">SIP uses Digest Authentication, which is vulnerable to a basic offline dictionary attack.<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\"> In order to perform an offline dictionary attack, the attacker needs to sniff the username, realm,<\/span>\u00a0<span style=\"color: #000000\">Method,URI and MD5 response hash over the network.<\/span><\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"decoded shrinkToFit aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/1.jpg\" alt=\"Attacking VoIP Authentication\" width=\"576\" height=\"313\" \/><\/a><\/p>\n<p style=\"text-align: center\">Figure : Attacking VoIP Authentication<\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">All of these are available over the network in clear text. Once this information has been obtained using sniffing, attacker can perform offline dictionary attack.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #000000\"><b>Lab Setup<\/b> :<\/span><\/p>\n<p><span style=\"color: #000000\">1.\u00a0 Install Backtrack 4<\/span><br \/>\n<span style=\"color: #000000\"> 2. Two Softphone on two systems. In our case<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000\">First Softphone (sachin-100)<\/span><\/li>\n<li><span style=\"color: #000000\">Second Softphone\u00a0 (wagh-200)<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000\"><b>\u00a0Steps<\/b> :<\/span><\/p>\n<p><span style=\"color: #888888\">1.<\/span><span style=\"color: #000000\">\u00a0 Using wireshark first capture few <strong>REGISTER<\/strong>\u00a0 requests and save it in a file called voip_attack.<\/span><\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"decoded shrinkToFit aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/2.jpg\" alt=\"REGISTER\u00a0 requests\" width=\"576\" height=\"313\" \/><\/a><\/p>\n<p style=\"text-align: left\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Figure : Capturing REGISTER Request.<\/p>\n<p style=\"text-align: left\"><span style=\"color: #888888\">2.<\/span>\u00a0 <span style=\"color: #000000\">Now use <strong>sipcrack<\/strong> suite, which is available in Backtrack under <strong>\/pentest\/voip<\/strong> directory.<\/span><\/p>\n<p style=\"text-align: left\"><span style=\"color: #000000\">SIPcrack is a SIP login sniffer\/cracker that contains two programs:<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000\"><strong>sipdump<\/strong> to capture the digest authentication.<\/span><\/li>\n<li><span style=\"color: #000000\"><strong>sipcrack<\/strong> to bruteforcethe password hash using a wordlist or standard input<\/span><\/li>\n<\/ul>\n<p style=\"text-align: left\"><span style=\"color: #000000\"><span style=\"color: #888888\">3.<\/span>\u00a0 Using sipdump tool, let us dump the authentication data to a file and name it as <b>Auth.txt<\/b><br \/>\n<\/span><\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"decoded aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/3.jpg\" alt=\"Auth\" width=\"576\" height=\"185\" \/><\/a><\/p>\n<p style=\"text-align: center\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Figure : Dumping authentication data using sipdump<\/p>\n<p style=\"text-align: left\"><span style=\"color: #888888\">4.\u00a0<\/span> <span style=\"color: #000000\">This authentication data includes User ID, SIP extension, password hash (MD5) and victim\u2019s IP address.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: left\"><span style=\"color: #000000\"><strong>sipcrack Usage<\/strong> :<\/span><\/h3>\n<p style=\"text-align: center\"><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"decoded aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/4.jpg\" alt=\"sipcrack Usage\" width=\"576\" height=\"277\" \/><\/a><\/p>\n<p style=\"text-align: center\">Figure : sipcrack Usage<\/p>\n<p style=\"text-align: left\"><span style=\"color: #888888\">5.\u00a0<\/span> <span style=\"color: #000000\">Let us now use sipcrack tool to crack the authentication hashes using a custom word list.<\/span><\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"decoded aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/5.jpg\" alt=\"Cracking authentication hash using sipcrack\" width=\"576\" height=\"302\" \/><\/a><\/p>\n<p style=\"text-align: center\">Figure : Cracking authentication hash using sipcrack<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #000000\"><b>Denial of Service (DOS) attack On VoIP Network <\/b>:<\/span><\/h3>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">Denial of Server (DOS) attack is a dangerous attack that can cause the\u00a0 VoIP network and devices to crash. Inviteflood is the tool used to launch DoS attacks.This attack can occur on two levels, standard network DoS attacks and VoIP specific DoS attacks. Generally we will send tons of data by flooding the network to consume all its resources or a specific protocol in order to overwhelm it with tons of requests.<\/span><\/p>\n<p><span style=\"color: #000000\"><strong>inviteflood usage :<\/strong><\/span><\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"decoded aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/6.jpg\" alt=\"inviteflood usage\" width=\"576\" height=\"255\" \/><\/a><\/p>\n<p style=\"text-align: center\">Figure : inviteflood usage<\/p>\n<p><span style=\"color: #000000\">As long as the tool keeps flooding the SIP gateway it will prevent users from making phone calls resulting in a DoS attack.<\/span><\/p>\n<p><span style=\"text-decoration: underline\"><span style=\"color: #000000;text-decoration: underline\"><strong>Syntax:<\/strong><\/span><\/span><br \/>\n<span style=\"color: #000000\"> <strong>.\/inviteflood interface\u00a0 Extension Target_domain target_ip Number_of_packets<\/strong><\/span><\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/7.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"decoded aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/7.jpg\" alt=\"DoS attack using inviteflood\" width=\"576\" height=\"165\" \/><\/a><\/p>\n<p style=\"text-align: center\">Figure : DoS attack using inviteflood<\/p>\n<p><b><span style=\"color: #000000\">Caller ID Spoofing :<\/span><br \/>\n<\/b><\/p>\n<p style=\"text-align: justify\"><span style=\"color: #000000\">This is one of the easiest attacks on VoIP networks. Caller ID spoofing creates a scenario where an unknown user may impersonate a legitimate user to call other legitimate users on VoIP network. For demonstration, let us use metasploit\u2019 auxiliary module named <b>sip_invite_spoof.<\/b><\/span><\/p>\n<p><span style=\"color: #000000\"><b>Lab Setup<\/b> :<\/span><\/p>\n<p><span style=\"color: #000000\">Configure two Softphone on two different machines. In our case<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000\">First Softphone\u00a0 (sachin-100) &#8211; 192.168.0.3<\/span><\/li>\n<li><span style=\"color: #000000\">Second Softphone\u00a0 (wagh-200) -192.168.0.139<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000\"><strong>Steps :<\/strong><\/span><\/p>\n<p><span style=\"color: #000000\"><span style=\"color: #888888\">1.<\/span>\u00a0\u00a0 Start your metasploit and load <strong>\/auxiliary\/voip\/sip_invite_spoof<\/strong> auxiliary module.<\/span><br \/>\n<span style=\"color: #000000\"><span style=\"color: #888888\"> 2. \u00a0<\/span> Configure the option.<\/span><\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/9.jpg\"><\/p>\n<p><\/a><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/9.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"decoded alignnone\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/9.jpg\" alt=\"Caller ID Spoofing 1\" width=\"576\" height=\"194\" \/><\/a><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/9.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"decoded alignnone\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/8.jpg\" alt=\"Caller ID Spoofing\" width=\"576\" height=\"250\" \/><\/a><\/p>\n<p style=\"text-align: center\">Figure : Caller ID Spoofing<\/p>\n<p><span style=\"color: #000000\">In our case<\/span><br \/>\n<span style=\"color: #000000\"> Set MSG 200&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-Caller ID<\/span><br \/>\n<span style=\"color: #000000\"> Set RHOSTS 192.168.0.3&#8212;&#8212;&#8212;&#8212;-Victim IP Address<\/span><br \/>\n<span style=\"color: #000000\"> Set SRCADDR 192.168.0.139&#8212;&#8212;-Caller IP Address<\/span><br \/>\n<span style=\"color: #000000\"><span style=\"color: #888888\"> 3.<\/span> \u00a0 Auxiliary module will send a spoofed invite request to the victim user.<\/span><\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/10.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"decoded shrinkToFit aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/07\/10.jpg\" alt=\"Spoofed invite request\" width=\"364\" height=\"313\" \/><\/a><\/p>\n<p style=\"text-align: center\">Figure : Spoofed invite request.<\/p>\n<p><span style=\"color: #888888\">4.\u00a0<\/span> <span style=\"color: #000000\">Victim considers it as legitimate call from other legitimate user. Bingo \ud83d\ude42 \ud83d\ude42 \ud83d\ude42<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><strong><span style=\"color: #000000\">Summary :<\/span><\/strong><\/h3>\n<p style=\"text-align: justify\">In this series of VoIP Penetration Testing we have learnt VoIP installation, Information gathering, Scanning, Banner Grabbing, Enumerating TFTP Server, User enumeration, attacking VoIP authentication, DoS attack, Caller ID spoofing, etc.<\/p>\n<p style=\"text-align: justify\">Hope you will find this article informative and useful in understanding the VoIp security issues and for conducting penetration testing. Do let us know your views.<\/p>\n<p>Written By,<\/p>\n<p><em>Attack &amp; PenTest Team,<\/em><\/p>\n<p><em>Varutra Consulting<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; In the previous tutorial VoIP Penetration Testing Part \u2013 III we have learnt about SIP User extension enumeration. This is the last article in&#8230;<\/p>\n","protected":false},"author":3,"featured_media":3259,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[261,278,274,275],"tags":[62,63,64],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"This is the last article in which we will focus on various VoIP attacks such as attacking VoIP authentication, DoS Attack and Caller ID Spoofing.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"VoIP Penetration Testing Part IV - VoIP attacks\" \/>\n\t\t<meta property=\"og:description\" content=\"This is the last article in which we will focus on various VoIP attacks such as attacking VoIP authentication, DoS Attack and Caller ID Spoofing.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/06\/voip-Copy.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/06\/voip-Copy.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t\t<meta property=\"article:section\" content=\"Ethical Hacking\" \/>\n\t\t<meta property=\"article:tag\" content=\"attacking voip\" \/>\n\t\t<meta property=\"article:tag\" content=\"voip penetration testing\" \/>\n\t\t<meta property=\"article:tag\" content=\"voip pentest\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2014-07-15T11:12:25+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T11:30:16+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"VoIP Penetration Testing Part IV - VoIP attacks\" \/>\n\t\t<meta name=\"twitter:description\" content=\"This is the last article in which we will focus on various VoIP attacks such as attacking VoIP authentication, DoS Attack and Caller ID Spoofing.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/06\/voip-Copy.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-part-iv\\\/#article\",\"name\":\"VoIP Penetration Testing Part IV - VoIP attacks\",\"headline\":\"VoIP Penetration Testing Part \\u2013 IV\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2014\\\/06\\\/voip-Copy.png\",\"width\":1280,\"height\":750,\"caption\":\"voip - Copy\"},\"datePublished\":\"2014-07-15T11:12:25+05:30\",\"dateModified\":\"2022-12-02T17:00:16+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-part-iv\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-part-iv\\\/#webpage\"},\"articleSection\":\"Ethical Hacking, Network Pentesting, Security Hardening, VoIP Penetration Testing, Attacking VoIP, VoIP Penetration Testing, VoIP Pentest\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-part-iv\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-part-iv\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-part-iv\\\/#listItem\",\"position\":2,\"name\":\"VoIP Penetration Testing Part \\u2013 IV\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-part-iv\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-part-iv\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-part-iv\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-part-iv\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-part-iv\\\/\",\"name\":\"VoIP Penetration Testing Part IV - VoIP attacks\",\"description\":\"This is the last article in which we will focus on various VoIP attacks such as attacking VoIP authentication, DoS Attack and Caller ID Spoofing.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-part-iv\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2014\\\/06\\\/voip-Copy.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-part-iv\\\/#mainImage\",\"width\":1280,\"height\":750,\"caption\":\"voip - Copy\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/voip-penetration-testing-part-iv\\\/#mainImage\"},\"datePublished\":\"2014-07-15T11:12:25+05:30\",\"dateModified\":\"2022-12-02T17:00:16+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>VoIP Penetration Testing Part IV - VoIP attacks<\/title>\n\n","aioseo_head_json":{"title":"VoIP Penetration Testing Part IV - VoIP attacks","description":"This is the last article in which we will focus on various VoIP attacks such as attacking VoIP authentication, DoS Attack and Caller ID Spoofing.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"VoIP Penetration Testing Part IV - VoIP attacks","og:description":"This is the last article in which we will focus on various VoIP attacks such as attacking VoIP authentication, DoS Attack and Caller ID Spoofing.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/06\/voip-Copy.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/06\/voip-Copy.png","og:image:width":"1280","og:image:height":"750","article:section":"Ethical Hacking","article:tag":["attacking voip","voip penetration testing","voip pentest"],"article:published_time":"2014-07-15T11:12:25+00:00","article:modified_time":"2022-12-02T11:30:16+00:00","twitter:card":"summary_large_image","twitter:title":"VoIP Penetration Testing Part IV - VoIP attacks","twitter:description":"This is the last article in which we will focus on various VoIP attacks such as attacking VoIP authentication, DoS Attack and Caller ID Spoofing.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/06\/voip-Copy.png","twitter:label1":"Written by","twitter:data1":"kalpadmin","twitter:label2":"Est. reading time","twitter:data2":"3 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/#article","name":"VoIP Penetration Testing Part IV - VoIP attacks","headline":"VoIP Penetration Testing Part \u2013 IV","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/06\/voip-Copy.png","width":1280,"height":750,"caption":"voip - Copy"},"datePublished":"2014-07-15T11:12:25+05:30","dateModified":"2022-12-02T17:00:16+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/#webpage"},"articleSection":"Ethical Hacking, Network Pentesting, Security Hardening, VoIP Penetration Testing, Attacking VoIP, VoIP Penetration Testing, VoIP Pentest"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/#listItem","position":2,"name":"VoIP Penetration Testing Part \u2013 IV","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/","name":"VoIP Penetration Testing Part IV - VoIP attacks","description":"This is the last article in which we will focus on various VoIP attacks such as attacking VoIP authentication, DoS Attack and Caller ID Spoofing.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2014\/06\/voip-Copy.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/#mainImage","width":1280,"height":750,"caption":"voip - Copy"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/#mainImage"},"datePublished":"2014-07-15T11:12:25+05:30","dateModified":"2022-12-02T17:00:16+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"661","title":"VoIP Penetration Testing Part IV - VoIP attacks","description":"This is the last article in which we will focus on various VoIP attacks such as attacking VoIP authentication, DoS Attack and Caller ID Spoofing.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"VoIP\",\"score\":100,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2014\/06\/voip-Copy.png","og_image_width":"1280","og_image_height":"750","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Ethical Hacking","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:18:04","updated":"2022-12-02 11:30:59"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/ethical-hacking\/\" title=\"Ethical Hacking\">Ethical Hacking<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tVoIP Penetration Testing Part \u2013 IV\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Ethical Hacking","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/ethical-hacking\/"},{"label":"VoIP Penetration Testing Part \u2013 IV","link":"https:\/\/www.varutra.com\/varutravrt3\/voip-penetration-testing-part-iv\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/661"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=661"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/661\/revisions"}],"predecessor-version":[{"id":20377,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/661\/revisions\/20377"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/3259"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}