Flylib.com
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158
Authors:
David Endler
,
Mark Collier
BUY ON AMAZON
Hacking Exposed VoIP: Voice Over IP Security Secrets Solutions
Back Cover
About
Introduction
How the Book is Organized
A Final Message to our Readers
Part I: Casing the Establishment
Chapter 1: Footprinting a VoIP Network
Why Footprint First?
VoIP Footprinting Methodology
Summary
References
Chapter 2: Scanning a VoIP Network
Our SIP Test Bed
HostDevice Discovery
Port Scanning and Service Discovery
HostDevice Identification
Summary
References
Chapter 3: Enumerating a VoIP Network
SIP 101
RTP 101
Banner Grabbing with Netcat
SIP UserExtension Enumeration
Enumeration of Other Voip Support Services
Summary
References
Part II: Exploiting the VoIP Network
Chapter 4: VoIP Network Infrastructure Denial of Service (DoS)
Measuring Voip Call Quality
What Are Dos and DDos Attacks?
Flooding Attacks
Network Availability Attacks
Dos and Availability Testing Against Popular Pbxs and PHones
Supporting Infrastructure Attacks
Summary
References
Chapter 5: VoIP Network Eavesdropping
First, Gain Access to The Network
Now That we have Access, Let s Sniff
Summary
References
Chapter 6: VoIP Interception and Modification
Interception Through Voip Signaling Manipulation
Traditional Network HIjacking (Man-in-the-Middle)
ARP Poisoning
Application-Level Interception Techniques
Summary
References
Part III: Exploiting Specific VoIP Platforms
Chapter 7: Cisco Unified CallManager
Introduction to the Basic Cisco Voip (AVVID) Components
Cisco s Solution Reference Network Design (SRND) Document for Voice Security
Basic Deployment Scenarios
Simple Network Reconnaissance
Exploiting the Network
Summary
References
Chapter 8: Avaya Communication Manager
Introduction to the Basic Communication Manager Components
Basic DEployment Scenarios
Simple Network Reconnaissance
Exploiting the Network
IP PBX Remote Access
Default System Passwords
Other IP Phone Attacks
Summary
References
Chapter 9: Asterisk
Introduction to Basic Asterisk Components
Basic Deployment Scenarios
Simple Network Reconnaissance
Exploiting the Network
Default System Passwords
Other IP Phone Attacks
Miscellaneous Potential Security Weaknesses
Summary
References
Chapter 10: Emerging Softphone Technologies
Softphone Security
Skype
Security Issues
Gizmo Project
Instant Messaging Clients VoIPMillions of Softphones
Summary
References
Part IV: VoIP Session and Application Hacking
Chapter 11: VoIP Fuzzing
What is Fuzzing?
Why Fuzz?
Vulnerabilities 101
Commercial VoIP Fuzzing Tools
What do You do With your Fuzzing Results?
Summary
References
Chapter 12: Flood-based Disruption of Service
SIP Proxy Attacks
SIP Phone Attacks
Other Flood-Generation Tools
Summary
References
Chapter 13: Signaling and Media Manipulation
Registration Removal
Registration Addition
Registration Hijacking
Redirection Attacks
Session Teardown With Bye Requests Using the Teardown Tool
SIP Phone Reboot
Spoofing Caller ID
RTP InsertionMixing
Other Signaling and Media Manipulation Tools
Summary
References
Part V: Social Threats
Chapter 14: SPAM over Internet Telephony (SPIT)
Will SPIT be Worse than Spam?
When Will SPIT be a Problem?
Impact and Probability of Occurrence
Countermeasures
Summary
References
Chapter 15: Voice Phishing
Anatomy of a Traditional Email-Based Phishing Attack
Here Comes Voice Phishing
Voice Phishing Countermeasures
Summary
References
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
List of Sidebars
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158
Authors:
David Endler
,
Mark Collier
BUY ON AMAZON
VBScript Programmers Reference
What VBScript Is and Isn™t!
Regular Expressions
Appendix C Coding Convention
Appendix D Visual Basic Constants Supported in VBScript
Appendix J VBA Features not in VBScript
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
The Cisco 7902G IP Phone
Basic Calls Between Cisco CallManager and Cisco CME
Configuring the Cisco UE AA
Managing Cisco IPC Express with Cisco Partner Applications
General Troubleshooting Techniques
Cisco Voice Gateways and Gatekeepers
Description of SIP
Numbering Plans
Call Admission Control
Implementing COR
Microsoft WSH and VBScript Programming for the Absolute Beginner
Overview of the Windows Script Host
Conditional Logic
Using the Windows Registry to Configure Script Settings
Combining Different Scripting Languages
Appendix B Built-In VBScript Functions
Web Systems Design and Online Consumer Behavior
Chapter III Two Models of Online Patronage: Why Do Consumers Shop on the Internet?
Chapter IX Extrinsic Plus Intrinsic Human Factors Influencing the Web Usage
Chapter XI User Satisfaction with Web Portals: An Empirical Study
Chapter XII Web Design and E-Commerce
Chapter XV Customer Trust in Online Commerce
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Line Editing
Running SQL Queries
Report Headers and Footers
Formatting Object Columns
Commenting Your Scripts
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies