First page Back Continue Last page Graphics
Registration/Call Hijacking
Vulnerability:
- Signaling protocols are unencrypted
Attack:
- Sniff a legitimate endpoint registration
- Use sniffed information and credentials to replace the legitimate registration
- Sniff a call-setup message
Effect
- New calls for the endpoint are routed to the malicious device rather than the legitimate device