Understanding and combating SIP-based VoIP abuse
· 5 min read
Introduction: The Hidden World of SIP Security
I was browsing around on Hacker News and if you're not familiar, the good stuff is usually in the comments. I was intrigued by this comment (by @kkielhofner) and how he/she illustrates a common but often overlooked misconception about SIP. Specifically, the misunderstanding pertains to the role and implications of port 5060 and its associated traffic in a standard SIP deployment.