Thursday, April 25, 2019

VoIP recording with Cain

As VoIP technology becomes more prevalent, we must get used to the strange dichotomy of how people think and handle new communication environments. On the one hand, VoIP is a flexible Internet system that allows many different applications to be built on it to increase workplace productivity. On the other hand, this same flexibility allows hackers to exploit and compromise their less secure VoIP systems. So it is a double-edged sword. Of course, regular PSTN systems can also be hacked on insecure lines, but you need specialized hardware and technology. With VoIP, you can listen to it using only your computer and downloaded software programs, as we will see in this article.

But again, this recording may have many legitimate reasons. Businesses may find this a great feature, documenting conversations to avoid future legal challenges and even helping them with training.

A software called "Cain&Abel" can easily sniff VoIP traffic between two computers. Since VoIP works differently, there are different types of settings. If you are running a Windows machine with SOFTWARE software installed and a Windows machine for making SIP calls, simply install Cain on that system and set it to log all VoIP sessions. It can decode a large number of codecs - although proprietary codecs like Skype cannot be monitored.

Even when you can't access your computer or softphone, you can even record conversations between your computer or softphone on the same network. A technique called ARP poisoning can do this easily because it can be illegal no matter where you live, and only if you have the right to do so.

However, secure VoIP systems such as VPNs can use encryption to defeat such sniffing software. The challenge is to ensure that VoIP recordings can only be made by authorized personnel, not by anyone else. Now that voice communication has entered the IT arena, we are seeing familiar battles between hackers and security experts - and there are many systems that can be attacked and not properly secured.

Therefore, ask your ITSP for the security measures they have taken to protect you from this "man in the middle" attack.




Orignal From: VoIP recording with Cain

No comments:

Post a Comment