VoIP is a communications technology that is prone to attacks such as SPIT, Voicemail Brute forcing, Caller ID Spoofing, Registration Hijacking, active directory number harvesting, and more. This book shows you how to proactively fuzz VoIP components for potential vulnerabilities using freely and commercially available tools.