VoIP Can Still Be Exploited – Badly

11/20/2021
by   Pietro Biondi, et al.
0

VoIP phones are early representatives as well as present enhancers of the IoT. This paper observes that they are still widely used in a traditional, unsecured configuration and demonstrates the Phonejack family of attacks: Phonejack 1 conjectures the exploitation of phone vulnerabilities; Phonejack 2 demonstrates how to mount a denial-of-service attack on a network of phones; Phonejack 3 sniffs calls. It is reassuring, however, that inexpensive devices such as a Raspberry Pi can be configured and programmed as effective countermeasures, thus supporting the approach of integrating both technologies. We demonstrate both attacks and defence measures in a video clip. The concluding evaluations argue that trusting the underlying network security measures may turn out overly optimistic; moreover, VoIP phones really ought to be protected as laptops routinely are today

READ FULL TEXT
research
05/14/2021

Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies

Internet of Things (IoT) devices are becoming ubiquitous in our lives, w...
research
01/07/2021

SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning

Cyber-physical systems (CPS) and Internet-of-Things (IoT) devices are in...
research
02/14/2022

Vulnerability Assessment and Penetration Testing on IP cameras

IP cameras have always been part of the Internet of Things (IoT) and are...
research
10/04/2019

HDMI-Walk: Attacking HDMI Distribution Networks via Consumer Electronic Control Protocol

The High Definition Multimedia Interface (HDMI) is the de-facto standard...
research
03/01/2022

Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review

Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks ...
research
01/19/2022

Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits

Internet of Things devices are widely adopted by the general population....
research
11/20/2021

You Overtrust Your Printer

Printers are common devices whose networked use is vastly unsecured, per...

Please sign up or login with your details

Forgot password? Click here to reset