RTP (Real Time Protocol) is a protocol used in real-time applications. It is used in processes such as voice transfer with VOIP. When we use the phones we use within the company via VOIP, we provide communication over internet lines. If this phone call traffic is sniffed, can we make these captured packets meaningful?
We can make these captured packages meaningful with wireshark. We can even listen to and record the phone call. Apart from these, which number made the call, which number called this information can also be determined.
You can download Wireshark application from the link below for windows;
https://www.wireshark.org/download.html
First, let’s start wireshark and select the interface of the network we will listen to from the Interface list menu. (wireless or local network etc.)

We start listening to the network and filter the RTP packets.

There is traffic we recorded above. Let’s combine all RTP packets.

We select and analyze one of the links combined below.

Let’s listen to the packages.

The screen we see is as follows.

Let’s mark the fields below and start listening.

He translated the recorded data into sound. Here we can draw the following conclusion. If communication traffic can be caught with VOIP, the calls can be listened to. This is due to VOIP processing without encryption. In order to catch the traffic, we need to be able to attack in the middle.