19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

270<br />

Part V: Hacking Applications<br />

Figure 13-13:<br />

A<br />

WebInspect<br />

scan of<br />

a VoIP<br />

network<br />

adapter<br />

showing<br />

several<br />

weaknesses.<br />

Looking at these results, apparently this device is just a basic web server.<br />

That’s exactly my point — VoIP systems are nothing more than networked<br />

computer systems that have vulnerabilities that can be exploited.<br />

On the other hand, two major security weaknesses are tied specifically to<br />

VoIP. The first is that of phone service disruption. Yep, VoIP is susceptible to<br />

denial of service just like any other system or application. VoIP is as vulnerable<br />

as the most timing-sensitive applications out there, given the low tolerance<br />

folks have for choppy and dropped phone conversations (cellphones<br />

aside, of course). The other big weakness with VoIP is that voice conversations<br />

are not encrypted and thus can be intercepted and recorded. Imagine<br />

the fun a bad guy could have recording conversations and blackmailing his<br />

victims. This is very easy on unsecured wireless networks, but as I show in<br />

the upcoming “Capturing and recording voice traffic” section, it’s also pretty<br />

simple to carry out on wired networks.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!