First page Back Continue Last page Graphics
Flooding
Vulnerabilities:
- Most hard-phones are limited or underpowered hardware
- Protocols provide unauthenticated and unauthorized functions
Attack:
- Flood the device with VoIP protocol packets:
- SIP INVITE, OPTIONS
- Bogus RTP media packets
- Flood the device with network protocol packets:
Effect:
- Degraded call quality
- Device crash, halt, freeze, or respond poorly