Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "SIP"
From NetSec
WillieArce (Talk | contribs) m |
|||
Line 1: | Line 1: | ||
<b>S</b>ession <b>I</b>nitiation <b>P</b>rotocol | <b>S</b>ession <b>I</b>nitiation <b>P</b>rotocol | ||
SIP is used by Voice Over IP to initiate phone calls. These packets can be modified, monitored, or overwritten during a [[MITM attack|Man in the Middle]] attack. | SIP is used by Voice Over IP to initiate phone calls. These packets can be modified, monitored, or overwritten during a [[MITM attack|Man in the Middle]] attack. | ||
− | + | ||
+ | {{series | ||
+ | | Name = SIP | ||
+ | | PartOf = Protocols | ||
+ | }} |
Revision as of 22:54, 18 October 2011
Session Initiation Protocol SIP is used by Voice Over IP to initiate phone calls. These packets can be modified, monitored, or overwritten during a Man in the Middle attack.
SIP Visit the Protocols Portal for complete coverage.
|