Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions: Voice Over IP Security Secrets and Solutions

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions: Voice Over IP Security Secrets and Solutions


Yazar David Endler Mark Collier
Yayınevi McGraw-Hill Osborne
ISBN 9780072263640
Baskı yılı 2007
Sayfa sayısı 539
Ağırlık 0,93 kg
Edisyon 1
Stok durumu Tükendi   

Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way "This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, youll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks. Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware Fortify Cisco, Avaya, and Asterisk systems Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation Thwart number harvesting, call pattern tracking, and conversation eavesdropping Measure and maintain VoIP network quality of service and VoIP conversation quality Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks Avoid insertion/mixing of malicious audio Learn about voice SPAM/SPIT and how to prevent it Defend against voice phishing and identity theft scams
1 Footprinting a VoIP network 7
2 Scanning a VoIP network 29
3 Enumerating a VoIP network 55
4 VoIP network infrastructure denial of service (DoS) 121
5 VoIP network eavesdropping 147
6 VoIP network and modification 167
7 Cisco unified CallManager 205
8 Avaya Communication Manager 251
9 Asterisk 323
10 Emerging softphone technologies 351
11 VoIP fuzzing 369
12 Flood-based disruption of service 389
13 Signaling and media manipulation 429
14 SPAM over Internet telephony (SPIT) 487
15 Voice phishing 505