First page Back Continue Last page Graphics
Signaling Manipulation Overview
Vulnerabilities:
- Protocols are unencrypted and unauthenticated
- Signaling extends to endpoint device
Attacks:
- Inject malicious signaling messages into a signaling channel
- Send new signaling messages to endpoints or services
Effects:
- Forced call tear-down DoS
- Media redirection, injection, or call hijacking
- Registration manipulation DoS / hijack