heads up - vlan hopping one was of the choices on my exam, but credential harvesting was not! IDK which one is correct besides vishing, but cred harvesting wasnt there.
after heavy consideration and reading through multiple sec+ books, i m kinda going with B & D. vishing and credential harvesting as being the most common attacks, as hopping doesnt ever seem to come up in the material.
https://fitsmallbusiness.com/voip-security-threats/
although they dont specifically mention VOMIT, a common result of VOMIT would be credntial harvesting.
"VOMIT, is a VoIP hacking technique that extracts confidential data and voice packets directly from calls. VOMIT works by eavesdropping on phone calls and converting phone conversations into files straight from your business phone system. This makes it easy to obtain company information, including usernames, passwords, bank details, phone numbers, and call origin."
Copilot says B+E.
Copilot: The two common VoIP-associated vulnerabilities from the options provided are:
B. Vishing: Vishing, or voice phishing, is a type of attack that attempts to trick victims into giving up sensitive personal information over the phone. Since VoIP systems are essentially transmitting voice as data over IP networks, they are susceptible to the same phishing attacks that can occur in data networks.
E. Credential Harvesting: VoIP systems can be vulnerable to attacks where credentials are harvested. Attackers can use various methods, such as brute force attacks or packet sniffing, to obtain user credentials. Once these credentials are obtained, attackers can gain unauthorized access to the VoIP system.
SPIM (Spam over Internet Messaging) is a type of VoIP-associated vulnerability that involves sending unsolicited or
fraudulent messages over an internet messaging service, such as Skype or WhatsApp. It can trick users into clicking on
malicious links, downloading malware, providing personal or financial information, etc., by impersonating a legitimate
entity or creating a sense of urgency or curiosity. Vishing (Voice Phishing) is a type of VoIP-associated vulnerability
that involves making unsolicited or fraudulent phone calls over an internet telephony service, such as Google Voice or
Vonage. It can trick users into disclosing personal or financial information, following malicious instructions,
transferring money, etc., by using voice spoofing, caller ID spoofing, or interactive voice response systems.
SPIM (Spam over Internet Messaging) is a type of VoIP-associated vulnerability that involves sending unsolicited or
fraudulent messages over an internet messaging service, such as Skype or WhatsApp. It can trick users into clicking on
malicious links, downloading malware, providing personal or financial information, etc., by impersonating a legitimate
entity or creating a sense of urgency or curiosity. Vishing (Voice Phishing) is a type of VoIP-associated vulnerability
that involves making unsolicited or fraudulent phone calls over an internet telephony service, such as Google Voice or
Vonage. It can trick users into disclosing personal or financial information, following malicious instructions,
transferring money, etc., by using voice spoofing, caller ID spoofing, or interactive voice response systems.
For those not convinced to Hopping (I was), one of many resources on to voip vlan hopping:
https://community.broadcom.com/symantecenterprise/viewdocument/voip-hopping-a-method-of-testing?CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68
The other one just must be Vishing.
SPIM (Spam over Instant Messaging) not with VoIP
Vishing yes as it is voice phishing...partly why when a spammer asks you a yes or no questions,,,,its best to hang up.
Cred harvisting can be exploited when you have voicemail set to be emailed to you
Only B & C answers are related to VOIP.
Vishing should be obvious
Hopping, not as obvious, but since putting VOIP devices on a separate network, physical or VLAN, is a recommended good practices, VLAN is susceptible to hopping.
Vishing is an obvious choice. However, all the others are questionable. Considering what's left, I'd say SPIM is the best logical conclusion (SPIT would be better but not listed). If you agree with credential harvesting, you have to agree with Phishing because that's how Professor Messer says credential harvesting takes place (by sending a malicious attachment over email and a user clicking it). Hopping from what I looked up has to do with moving around different avenues to gain access to a system or environment. I guess it could include using the phone. However, I looked up IM over VOIP and it appears to be possible. I could be wrong though. If I get the question, I'm going with A and B on the test.
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
serginljr
Highly Voted 2 years, 7 months agoNerdAlert
2 years agouser82
2 years agoMENAMONGMEN
2 years agoBlackMamba_4
1 year, 9 months agok9_462
Highly Voted 2 years, 7 months agoSkimbeeble
1 year, 2 months agok9_462
2 years, 7 months agoAlcpt
Most Recent 8 months agoroukettas
9 months, 4 weeks agoagfencer
10 months agoEromons
11 months agoGigaChungus
1 year agoshady23
1 year agoshady23
1 year agochriseatmon25
1 year agofryderyk
1 year, 1 month agoJustJess
1 year, 1 month agoBD69
1 year, 2 months ago[Removed]
1 year, 2 months agoBD69
1 year, 2 months agoBD69
1 year, 1 month ago6809276
1 year, 2 months ago8c4769c
1 year, 3 months agoDrCo6991
1 year, 4 months ago