This document summarizes a presentation on hacking VoIP systems. It begins with introductions of the presenters and an overview of VoIP security risks. The agenda is then outlined, covering footprinting, scanning, and enumerating VoIP systems to obtain information. Techniques for exploiting the underlying network through man-in-the-middle attacks and eavesdropping are discussed. Finally, exploiting VoIP applications through fuzzing, denial of service, and signaling manipulation will be covered.