Hacking Phone Calls with Kali Linux and Wireshark (MITM / VoIP replay)

This video tutorial demonstrates various methods to capture and replay voice calls using Voice over IP (VoIP) technology, specifically focusing on SIP and RTP traffic. Techniques discussed include utilizing a network tap, performing a man-in-the-middle attack with Kali Linux, and capturing voice traffic using Wireshark. The tutorial also highlights the importance of encryption for VoIP calls and provides insights on the workings of Free PBX. Affected: VoIP Systems

Keypoints :

  • VoIP call traffic can be captured using Wireshark, with specific focus on SIP (Session Initiation Protocol) and RTP (Real-Time Protocol) streams.
  • A network tap is necessary to intercept traffic from a switch, which does not forward traffic like a hub does.
  • Kali Linux can be utilized to perform ARP poisoning to capture traffic between VoIP devices when a network tap is not present.
  • Free PBX setups can be created within a virtual machine, requiring only basic configuration of extensions to register phones and establish call connectivity.
  • The RTP streams captured are typically in clear text, highlighting the need for encryption to secure VoIP communications.
  • Alternative methods for capturing VoIP traffic include using a simple hub or employing port mirroring on a switch.
  • Monitoring and capturing voice traffic through these methods can expose vulnerabilities in VoIP systems if calls are not encrypted.