E

eavesdropping attacks, 147165
ACM, 311
Asterisk, 343
call pattern tracking, 158159
CCM, 245250
countermeasures, 164165
extracting touch tones from calls, 164165
gaining network access, 149156
network eavesdropping, 165
number harvesting , 158159
performing with Cain and Abel, 160162, 163
performing with Oreka, 163
performing with voipong, 162
performing with vomit, 162
performing with Wireshark, 160, 161
phone conversations, 149, 160165
privacy issues, 148149
references, 165
sip_rogue tool, 186198, 455
sniffing for TFTP configuration files, 157158
VLANs and, 120
eBay, 362
email phishing, 505516
email SPAM, 484, 488
encryption
CCM, 248250
IPSEC, 164
session, 184
SIP systems, 479
encryption schemes, 165
endless loops , 375
endpoints, 66
enumeration, 55117
ACM, 287295
Asterisk, 327333, 338339
banner grabbing , 6673
CCM, 237240
described, 56
goal of, 56
IAX, 338
INVITE username, 7883
MAC addresses, 9798
OPTIONS username, 8490
port scanning and, 47
REGISTER username, 7478
RTP basics, 6466
SIP basics, 5663
SIP URIs, 57
SIP users/extensions, 7395
SNMP. See SNMP enumeration
TFTP, 237, 338339
TFTP servers, 95100
VNC, 239240
VoIP support services, 95116
VxWorks devices, 113116
erase_registrations tool, 431432, 437
established connection floods, 133
Ethereal. See Wireshark
Ethernet networks, 38
ettercap tool, 178182


Hacking Exposed VoIP. Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net