Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

VOIP SIP User Enumeration Attack could be possible using which method?

VOIP Enumeration Security Vulnerability

user-image
Question added by Ashokkumar Nadar , Cyber Security Consultant , Independent Consultant
Date Posted: 2017/09/12
Ashokkumar Nadar
by Ashokkumar Nadar , Cyber Security Consultant , Independent Consultant

VOIP by suing error messages from SIP proxy severs and registrars or by sniffing. 

More Questions Like This