{"id":14492,"date":"2021-09-24T06:34:10","date_gmt":"2021-09-24T06:34:10","guid":{"rendered":"https:\/\/www.sybercode.com\/?page_id=14492"},"modified":"2021-09-24T06:34:10","modified_gmt":"2021-09-24T06:34:10","slug":"voip","status":"publish","type":"page","link":"https:\/\/www.sybercode.com\/en\/voip\/","title":{"rendered":"VOIP"},"content":{"rendered":"<p>Attackers can attack an organization's infrastructures, such as VoIP phone systems. An attacker can eavesdrop on calls by performing a man-in-the-middle attack between the phone's incoming and outgoing connection. In case of using weak password or exploiting vulnerabilities in network devices, they can gain access to VoIP network. \n\nOur penetration testing experts evaluate the VoIP infrastructure and identify the risks that may arise for the network infrastructure. Our experts also evaluate different VoIP components for security, assessing their capacity to maintain the security and privacy of the environment and related traffic.<\/p>\n<p>S\u0131zma testi uzmanlar\u0131m\u0131z VoIP altyap\u0131s\u0131n\u0131 de\u011ferlendirir ve a\u011f altyap\u0131s\u0131 i\u00e7in olu\u015fabilecek riskleri tespit eder. Uzmanlar\u0131m\u0131z ayr\u0131ca farkl\u0131 VoIP bile\u015fenlerini g\u00fcvenlik a\u00e7\u0131s\u0131ndan de\u011ferlendirerek ortam\u0131n ve ilgili trafi\u011fin g\u00fcvenli\u011fini ve gizlili\u011fini koruma kapasitelerini de\u011ferlendirir.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sald\u0131rganlar VoIP telefon sistemleri gibi kurulu\u015fun altyap\u0131lar\u0131na sald\u0131r\u0131 d\u00fczenleyebilir. Sald\u0131rgan, telefonun gelen ve giden ba\u011flant\u0131s\u0131 aras\u0131nda ortadaki adam sald\u0131r\u0131s\u0131n\u0131 ger\u00e7ekle\u015ftirerek aramalar\u0131 dinleyebilir. A\u011f cihazlar\u0131nda zay\u0131f parola kullan\u0131lmas\u0131 veya g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n s\u00f6m\u00fcr\u00fclmesi durumunda VoIP a\u011f\u0131na eri\u015fim elde edebilirler. S\u0131zma testi uzmanlar\u0131m\u0131z [&hellip;]<\/p>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages\/14492"}],"collection":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/comments?post=14492"}],"version-history":[{"count":1,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages\/14492\/revisions"}],"predecessor-version":[{"id":14493,"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/pages\/14492\/revisions\/14493"}],"wp:attachment":[{"href":"https:\/\/www.sybercode.com\/en\/wp-json\/wp\/v2\/media?parent=14492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}