References

  • Arkin, Ofir. "Registration Hijacking Presentation." Black Hat Conference. http://www.blackhat.com/presentations/win-usa-02/arkin-winsec02.ppt

  • Borderware. http://www.borderware.com

  • Ingate. http://www.ingate.com

  • PacketStorm (source of basic udpflood tool). http://www.packetstorm.org

  • Registration Hijacking Presentation. http://www.securityfocus.com/infocus/1862

  • SecureLogix. http://www.securelogix.com

  • SIP: Session Initiation Protocol. http://www.ietf.org/rfc/rfc3261.txt

  • Sipera. http://www.sipera.com

  • SiVuS. http://www.vopsecurity.org

  • TLS: Transport Layer Security. http://www.rfc.net/rfc2246.html

  • Trammel, Dustin. "Dustin Trammell's Presentation on VoIP Attacks." http://www.dustintrammell.com/presentations/VoIP-Attacks/



Hacking Exposed VoIP. Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net