Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "SIP"
From NetSec
WillieArce (Talk | contribs) m |
|||
| Line 1: | Line 1: | ||
<b>S</b>ession <b>I</b>nitiation <b>P</b>rotocol | <b>S</b>ession <b>I</b>nitiation <b>P</b>rotocol | ||
SIP is used by Voice Over IP to initiate phone calls. These packets can be modified, monitored, or overwritten during a [[MITM attack|Man in the Middle]] attack. | SIP is used by Voice Over IP to initiate phone calls. These packets can be modified, monitored, or overwritten during a [[MITM attack|Man in the Middle]] attack. | ||
| − | + | ||
| + | {{series | ||
| + | | Name = SIP | ||
| + | | PartOf = Protocols | ||
| + | }} | ||
Revision as of 22:54, 18 October 2011
Session Initiation Protocol SIP is used by Voice Over IP to initiate phone calls. These packets can be modified, monitored, or overwritten during a Man in the Middle attack.
|
SIP Visit the Protocols Portal for complete coverage.
|