Summary
In this chapter, we talked about the misconfigured VoIP risks and attacks that an attacker can perform on a misconfigured IP telephony network, such as MITM, fake registrations, call flooding, and so on. We also talked about how to perform vulnerability scanning and bypass loopholes to compromise SIP servers.
Now we have completed the chapter, you will be able to perform penetration testing and red-teaming on the IP telephony network and also be able to protect against attacks on the real-time production environment.
We really would like to extend our gratitude for reading this book. We are very confident that this book will have shown you best practices for performing penetration testing and applying security to an organization's network. There is still a long way to go and more to add from the technical aspect in our bucket.
We wish you great success in securing organizations from real-time attacks.