Flylib.com
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158
Authors:
David Endler
,
Mark Collier
BUY ON AMAZON
Hacking Exposed VoIP: Voice Over IP Security Secrets Solutions
Back Cover
About
Introduction
How the Book is Organized
A Final Message to our Readers
Part I: Casing the Establishment
Chapter 1: Footprinting a VoIP Network
Why Footprint First?
VoIP Footprinting Methodology
Summary
References
Chapter 2: Scanning a VoIP Network
Our SIP Test Bed
HostDevice Discovery
Port Scanning and Service Discovery
HostDevice Identification
Summary
References
Chapter 3: Enumerating a VoIP Network
SIP 101
RTP 101
Banner Grabbing with Netcat
SIP UserExtension Enumeration
Enumeration of Other Voip Support Services
Summary
References
Part II: Exploiting the VoIP Network
Chapter 4: VoIP Network Infrastructure Denial of Service (DoS)
Measuring Voip Call Quality
What Are Dos and DDos Attacks?
Flooding Attacks
Network Availability Attacks
Dos and Availability Testing Against Popular Pbxs and PHones
Supporting Infrastructure Attacks
Summary
References
Chapter 5: VoIP Network Eavesdropping
First, Gain Access to The Network
Now That we have Access, Let s Sniff
Summary
References
Chapter 6: VoIP Interception and Modification
Interception Through Voip Signaling Manipulation
Traditional Network HIjacking (Man-in-the-Middle)
ARP Poisoning
Application-Level Interception Techniques
Summary
References
Part III: Exploiting Specific VoIP Platforms
Chapter 7: Cisco Unified CallManager
Introduction to the Basic Cisco Voip (AVVID) Components
Cisco s Solution Reference Network Design (SRND) Document for Voice Security
Basic Deployment Scenarios
Simple Network Reconnaissance
Exploiting the Network
Summary
References
Chapter 8: Avaya Communication Manager
Introduction to the Basic Communication Manager Components
Basic DEployment Scenarios
Simple Network Reconnaissance
Exploiting the Network
IP PBX Remote Access
Default System Passwords
Other IP Phone Attacks
Summary
References
Chapter 9: Asterisk
Introduction to Basic Asterisk Components
Basic Deployment Scenarios
Simple Network Reconnaissance
Exploiting the Network
Default System Passwords
Other IP Phone Attacks
Miscellaneous Potential Security Weaknesses
Summary
References
Chapter 10: Emerging Softphone Technologies
Softphone Security
Skype
Security Issues
Gizmo Project
Instant Messaging Clients VoIPMillions of Softphones
Summary
References
Part IV: VoIP Session and Application Hacking
Chapter 11: VoIP Fuzzing
What is Fuzzing?
Why Fuzz?
Vulnerabilities 101
Commercial VoIP Fuzzing Tools
What do You do With your Fuzzing Results?
Summary
References
Chapter 12: Flood-based Disruption of Service
SIP Proxy Attacks
SIP Phone Attacks
Other Flood-Generation Tools
Summary
References
Chapter 13: Signaling and Media Manipulation
Registration Removal
Registration Addition
Registration Hijacking
Redirection Attacks
Session Teardown With Bye Requests Using the Teardown Tool
SIP Phone Reboot
Spoofing Caller ID
RTP InsertionMixing
Other Signaling and Media Manipulation Tools
Summary
References
Part V: Social Threats
Chapter 14: SPAM over Internet Telephony (SPIT)
Will SPIT be Worse than Spam?
When Will SPIT be a Problem?
Impact and Probability of Occurrence
Countermeasures
Summary
References
Chapter 15: Voice Phishing
Anatomy of a Traditional Email-Based Phishing Attack
Here Comes Voice Phishing
Voice Phishing Countermeasures
Summary
References
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
List of Sidebars
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158
Authors:
David Endler
,
Mark Collier
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Principles to Practices
Phase: Adapt
Practice: Product Architecture
The Commitment-Accountability Protocol
Structure and Tools
Visual C# 2005 How to Program (2nd Edition)
Method Call Stack and Activation Records
Self-Review Exercises
C.5. Other Features
G.2. Basic XHTML Tables
J.1. ATM Case Study Implementation
The Java Tutorial: A Short Course on the Basics, 4th Edition
Example Two: SwingApplication
Example Four: LunarPhases
Example Five: VoteDialog
Algorithms
Appendix D. Deprecated Thread Methods
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
The Evolution of SOA
Service layer abstraction
Classifying service model logic
Service design overview
A.1. RailCo Ltd.
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Basic Commands to Get Started
Setting Up a Drawing
Working with Hatches and Fills
Managing External References
Using Layouts to Set Up a Print
.NET System Management Services
Using the System.Management Namespace
Querying WMI
Handling WMI Events
The WMI Schema
WMI Providers
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies