This document summarizes a presentation about analyzing the behavior of Voice over IP (VoIP) devices. The presentation describes how the speaker was able to gain administrative access to a UT Starcom ATA device by sniffing its traffic, spoofing the TFTP and DHCP servers, and uploading a modified configuration file. It provides steps on setting up spoofing servers and uploading the modified file to change the administrator password on the device. The speaker concludes by noting other devices with similar vulnerabilities and potential solutions for manufacturers.