This document discusses security vulnerabilities in hosted VoIP environments. It summarizes techniques for attacking Cisco phones and VoIP infrastructure, including spoofing caller ID, manipulating SIP trust relationships, and escalating privileges on Cisco Unified Communications Manager and VOSS Domain Manager services. The document outlines methods for gaining persistent access to networks and manipulating call forwarding, speed dials and other phone settings.
Related topics: