This document discusses penetration testing of voice over IP (VoIP) systems. It begins with an overview of VoIP, describing how it allows phone calls over the internet and its common protocols like SIP and RTP. It then covers attacks like information gathering, eavesdropping on traffic, VLAN hopping, spoofing caller ID, and denial of service vulnerabilities. The document concludes with a checklist of penetration testing techniques for VoIP systems, such as VLAN hopping, extension enumeration, capturing SIP authentication, eavesdropping on calls, and callerID spoofing.