Flylib.com
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158
Authors:
David Endler
,
Mark Collier
BUY ON AMAZON
Hacking Exposed VoIP: Voice Over IP Security Secrets Solutions
Back Cover
About
Introduction
How the Book is Organized
A Final Message to our Readers
Part I: Casing the Establishment
Chapter 1: Footprinting a VoIP Network
Why Footprint First?
VoIP Footprinting Methodology
Summary
References
Chapter 2: Scanning a VoIP Network
Our SIP Test Bed
HostDevice Discovery
Port Scanning and Service Discovery
HostDevice Identification
Summary
References
Chapter 3: Enumerating a VoIP Network
SIP 101
RTP 101
Banner Grabbing with Netcat
SIP UserExtension Enumeration
Enumeration of Other Voip Support Services
Summary
References
Part II: Exploiting the VoIP Network
Chapter 4: VoIP Network Infrastructure Denial of Service (DoS)
Measuring Voip Call Quality
What Are Dos and DDos Attacks?
Flooding Attacks
Network Availability Attacks
Dos and Availability Testing Against Popular Pbxs and PHones
Supporting Infrastructure Attacks
Summary
References
Chapter 5: VoIP Network Eavesdropping
First, Gain Access to The Network
Now That we have Access, Let s Sniff
Summary
References
Chapter 6: VoIP Interception and Modification
Interception Through Voip Signaling Manipulation
Traditional Network HIjacking (Man-in-the-Middle)
ARP Poisoning
Application-Level Interception Techniques
Summary
References
Part III: Exploiting Specific VoIP Platforms
Chapter 7: Cisco Unified CallManager
Introduction to the Basic Cisco Voip (AVVID) Components
Cisco s Solution Reference Network Design (SRND) Document for Voice Security
Basic Deployment Scenarios
Simple Network Reconnaissance
Exploiting the Network
Summary
References
Chapter 8: Avaya Communication Manager
Introduction to the Basic Communication Manager Components
Basic DEployment Scenarios
Simple Network Reconnaissance
Exploiting the Network
IP PBX Remote Access
Default System Passwords
Other IP Phone Attacks
Summary
References
Chapter 9: Asterisk
Introduction to Basic Asterisk Components
Basic Deployment Scenarios
Simple Network Reconnaissance
Exploiting the Network
Default System Passwords
Other IP Phone Attacks
Miscellaneous Potential Security Weaknesses
Summary
References
Chapter 10: Emerging Softphone Technologies
Softphone Security
Skype
Security Issues
Gizmo Project
Instant Messaging Clients VoIPMillions of Softphones
Summary
References
Part IV: VoIP Session and Application Hacking
Chapter 11: VoIP Fuzzing
What is Fuzzing?
Why Fuzz?
Vulnerabilities 101
Commercial VoIP Fuzzing Tools
What do You do With your Fuzzing Results?
Summary
References
Chapter 12: Flood-based Disruption of Service
SIP Proxy Attacks
SIP Phone Attacks
Other Flood-Generation Tools
Summary
References
Chapter 13: Signaling and Media Manipulation
Registration Removal
Registration Addition
Registration Hijacking
Redirection Attacks
Session Teardown With Bye Requests Using the Teardown Tool
SIP Phone Reboot
Spoofing Caller ID
RTP InsertionMixing
Other Signaling and Media Manipulation Tools
Summary
References
Part V: Social Threats
Chapter 14: SPAM over Internet Telephony (SPIT)
Will SPIT be Worse than Spam?
When Will SPIT be a Problem?
Impact and Probability of Occurrence
Countermeasures
Summary
References
Chapter 15: Voice Phishing
Anatomy of a Traditional Email-Based Phishing Attack
Here Comes Voice Phishing
Voice Phishing Countermeasures
Summary
References
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
List of Sidebars
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158
Authors:
David Endler
,
Mark Collier
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
Challenging the Unpredictable: Changeable Order Management Systems
ERP System Acquisition: A Process Model and Results From an Austrian Survey
The Effects of an Enterprise Resource Planning System (ERP) Implementation on Job Characteristics – A Study using the Hackman and Oldham Job Characteristics Model
Distributed Data Warehouse for Geo-spatial Services
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Qshell for iSeries
Scripting
Using Parameters and Variables
Archives and Compression
Appendix A Summary of Changes by Release
Appendix C Qshell and CL Commands for the IFS
The .NET Developers Guide to Directory Services Programming
Executing the Query and Enumerating Results
Searching the Global Catalog
Reading and Writing LDAP Attributes
Binding and Delegation
Managing Passwords for ADAM Users
The CISSP and CAP Prep Guide: Platinum Edition
Access Control
Physical (Environmental) Security
Understanding Certification and Accreditation
The Certification Phase
Appendix G Control Baselines
Special Edition Using Crystal Reports 10
Introduction to Crystal Repository
Ad-Hoc Application and Excel Plug-in for Ad-Hoc and Analytic Reporting
Introduction
Programming with the Report Engine Object Model
Troubleshooting
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Configuring Static Routes
Defining an Authentication Server
Security Contexts
Architectural Overview
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies