From the Hacker's Point of View: Why SIP Attacks are Child's Play
We often talk about how important it is for enterprises to secure their SIP implementations against hackers. What we don't often talk about is how easy it is for hackers to get into an unsecured SIP. (Spoiler alert: It's pretty easy.) The media often depicts hacking as a complicated process involving obscure entries in a command-line interface, but taking control of an unsecured SIP is literally a three-step process.