Risk Rating: 9
As already explained, eavesdropping is defined as the intercepting of conversations by unintended recipients. This is probably the simplest VoIP attack to carry out with numerous readily available software tools able to implement it effectively. Information on the used CoDec can be retrieved from the header of every RTP packet, inside the PT header field. An attacker with the ability to intercept unencrypted VoIP media traffic has, therefore, no problem in saving RTP streams for later analysis and decoding.
This passive attack impacts the confidentiality requirement of the CIA paradigm and can have important and unexpected consequences for an organization.
Was this article helpful?
Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.