Flylib.com
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158
Authors:
David Endler
,
Mark Collier
BUY ON AMAZON
Hacking Exposed VoIP: Voice Over IP Security Secrets Solutions
Back Cover
About
Introduction
How the Book is Organized
A Final Message to our Readers
Part I: Casing the Establishment
Chapter 1: Footprinting a VoIP Network
Why Footprint First?
VoIP Footprinting Methodology
Summary
References
Chapter 2: Scanning a VoIP Network
Our SIP Test Bed
HostDevice Discovery
Port Scanning and Service Discovery
HostDevice Identification
Summary
References
Chapter 3: Enumerating a VoIP Network
SIP 101
RTP 101
Banner Grabbing with Netcat
SIP UserExtension Enumeration
Enumeration of Other Voip Support Services
Summary
References
Part II: Exploiting the VoIP Network
Chapter 4: VoIP Network Infrastructure Denial of Service (DoS)
Measuring Voip Call Quality
What Are Dos and DDos Attacks?
Flooding Attacks
Network Availability Attacks
Dos and Availability Testing Against Popular Pbxs and PHones
Supporting Infrastructure Attacks
Summary
References
Chapter 5: VoIP Network Eavesdropping
First, Gain Access to The Network
Now That we have Access, Let s Sniff
Summary
References
Chapter 6: VoIP Interception and Modification
Interception Through Voip Signaling Manipulation
Traditional Network HIjacking (Man-in-the-Middle)
ARP Poisoning
Application-Level Interception Techniques
Summary
References
Part III: Exploiting Specific VoIP Platforms
Chapter 7: Cisco Unified CallManager
Introduction to the Basic Cisco Voip (AVVID) Components
Cisco s Solution Reference Network Design (SRND) Document for Voice Security
Basic Deployment Scenarios
Simple Network Reconnaissance
Exploiting the Network
Summary
References
Chapter 8: Avaya Communication Manager
Introduction to the Basic Communication Manager Components
Basic DEployment Scenarios
Simple Network Reconnaissance
Exploiting the Network
IP PBX Remote Access
Default System Passwords
Other IP Phone Attacks
Summary
References
Chapter 9: Asterisk
Introduction to Basic Asterisk Components
Basic Deployment Scenarios
Simple Network Reconnaissance
Exploiting the Network
Default System Passwords
Other IP Phone Attacks
Miscellaneous Potential Security Weaknesses
Summary
References
Chapter 10: Emerging Softphone Technologies
Softphone Security
Skype
Security Issues
Gizmo Project
Instant Messaging Clients VoIPMillions of Softphones
Summary
References
Part IV: VoIP Session and Application Hacking
Chapter 11: VoIP Fuzzing
What is Fuzzing?
Why Fuzz?
Vulnerabilities 101
Commercial VoIP Fuzzing Tools
What do You do With your Fuzzing Results?
Summary
References
Chapter 12: Flood-based Disruption of Service
SIP Proxy Attacks
SIP Phone Attacks
Other Flood-Generation Tools
Summary
References
Chapter 13: Signaling and Media Manipulation
Registration Removal
Registration Addition
Registration Hijacking
Redirection Attacks
Session Teardown With Bye Requests Using the Teardown Tool
SIP Phone Reboot
Spoofing Caller ID
RTP InsertionMixing
Other Signaling and Media Manipulation Tools
Summary
References
Part V: Social Threats
Chapter 14: SPAM over Internet Telephony (SPIT)
Will SPIT be Worse than Spam?
When Will SPIT be a Problem?
Impact and Probability of Occurrence
Countermeasures
Summary
References
Chapter 15: Voice Phishing
Anatomy of a Traditional Email-Based Phishing Attack
Here Comes Voice Phishing
Voice Phishing Countermeasures
Summary
References
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
List of Sidebars
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158
Authors:
David Endler
,
Mark Collier
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Study Strategies
Key Terms
Ethics and Legality
Sniffers
Contacting Que Certification
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Organizational change
Restructuring
Mergers and acquisitions
IT-based process change
Cisco IOS Cookbook (Cookbooks (OReilly))
Setting the Source Address for Telnet
Disabling EIGRP on an Interface
Defining DHCP Configuration Options
Debugging NAT
VRRP
File System Forensic Analysis
Server-based Partitions
Summary
Bibliography
Introduction
UFS1 Group Descriptor
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Working with 1-D and 2-D Shapes
Working with Groups
Creating Organization Charts
Importing Data to Create Organization Charts
Creating Network Diagrams
Comparing, Designing, and Deploying VPNs
Review Questions
Deploying Site-to-Site IPsec VPNs
Ensuring High Availability in an IPsec VPN
Implementing L2TP Voluntary/Client-Initiated Tunnel Mode Remote Access VPNs
Designing and Deploying IPsec Remote Access and Teleworker VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies