Flylib.com
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158
Authors:
David Endler
,
Mark Collier
BUY ON AMAZON
Hacking Exposed VoIP: Voice Over IP Security Secrets Solutions
Back Cover
About
Introduction
How the Book is Organized
A Final Message to our Readers
Part I: Casing the Establishment
Chapter 1: Footprinting a VoIP Network
Why Footprint First?
VoIP Footprinting Methodology
Summary
References
Chapter 2: Scanning a VoIP Network
Our SIP Test Bed
HostDevice Discovery
Port Scanning and Service Discovery
HostDevice Identification
Summary
References
Chapter 3: Enumerating a VoIP Network
SIP 101
RTP 101
Banner Grabbing with Netcat
SIP UserExtension Enumeration
Enumeration of Other Voip Support Services
Summary
References
Part II: Exploiting the VoIP Network
Chapter 4: VoIP Network Infrastructure Denial of Service (DoS)
Measuring Voip Call Quality
What Are Dos and DDos Attacks?
Flooding Attacks
Network Availability Attacks
Dos and Availability Testing Against Popular Pbxs and PHones
Supporting Infrastructure Attacks
Summary
References
Chapter 5: VoIP Network Eavesdropping
First, Gain Access to The Network
Now That we have Access, Let s Sniff
Summary
References
Chapter 6: VoIP Interception and Modification
Interception Through Voip Signaling Manipulation
Traditional Network HIjacking (Man-in-the-Middle)
ARP Poisoning
Application-Level Interception Techniques
Summary
References
Part III: Exploiting Specific VoIP Platforms
Chapter 7: Cisco Unified CallManager
Introduction to the Basic Cisco Voip (AVVID) Components
Cisco s Solution Reference Network Design (SRND) Document for Voice Security
Basic Deployment Scenarios
Simple Network Reconnaissance
Exploiting the Network
Summary
References
Chapter 8: Avaya Communication Manager
Introduction to the Basic Communication Manager Components
Basic DEployment Scenarios
Simple Network Reconnaissance
Exploiting the Network
IP PBX Remote Access
Default System Passwords
Other IP Phone Attacks
Summary
References
Chapter 9: Asterisk
Introduction to Basic Asterisk Components
Basic Deployment Scenarios
Simple Network Reconnaissance
Exploiting the Network
Default System Passwords
Other IP Phone Attacks
Miscellaneous Potential Security Weaknesses
Summary
References
Chapter 10: Emerging Softphone Technologies
Softphone Security
Skype
Security Issues
Gizmo Project
Instant Messaging Clients VoIPMillions of Softphones
Summary
References
Part IV: VoIP Session and Application Hacking
Chapter 11: VoIP Fuzzing
What is Fuzzing?
Why Fuzz?
Vulnerabilities 101
Commercial VoIP Fuzzing Tools
What do You do With your Fuzzing Results?
Summary
References
Chapter 12: Flood-based Disruption of Service
SIP Proxy Attacks
SIP Phone Attacks
Other Flood-Generation Tools
Summary
References
Chapter 13: Signaling and Media Manipulation
Registration Removal
Registration Addition
Registration Hijacking
Redirection Attacks
Session Teardown With Bye Requests Using the Teardown Tool
SIP Phone Reboot
Spoofing Caller ID
RTP InsertionMixing
Other Signaling and Media Manipulation Tools
Summary
References
Part V: Social Threats
Chapter 14: SPAM over Internet Telephony (SPIT)
Will SPIT be Worse than Spam?
When Will SPIT be a Problem?
Impact and Probability of Occurrence
Countermeasures
Summary
References
Chapter 15: Voice Phishing
Anatomy of a Traditional Email-Based Phishing Attack
Here Comes Voice Phishing
Voice Phishing Countermeasures
Summary
References
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
List of Sidebars
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158
Authors:
David Endler
,
Mark Collier
BUY ON AMAZON
Java I/O
Selectors
Random-Access Files
UTF-8
Finding Devices
The Bluetooth Protocol
Postfix: The Definitive Guide
Unix Topics
Customized Restriction Classes
Postfix Anti-Spam Example
Other Considerations
Appendix D. Frequently Asked Questions
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Character Values
Extending the PostgreSQL Server with Custom Data Types
Client 3Processing Queries
Securing Functions
Subscribing to a Replication Set
Special Edition Using Crystal Reports 10
Using the Report Creation Wizards
Using Advanced Cross-Tab Features
Recently Added or Changed OLAP Features in Crystal Reports
Establishing Project Requirements
Accessing the Java SDK
Special Edition Using FileMaker 8
Scripts in FileMaker Pro
Custom Functions
Formatting Exported Data
Custom Web Publishing Versus Instant Web Publishing
Using XSLT with Custom Web Publishing
GDI+ Programming with C#
Summary
Working with Colors
Using a Picture Box to View Images
Overview of the Printing Process
Drawing Simple Graphics
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies