IAX (Inter-Asterisk eXchange) protocol, 325
ICMP (Internet Control Message Protocol), 32, 133
ICMP flooding attacks, 133
ICMP_ECHO REQUEST packets, 36
IEEE (Institute of Electrical and Electronics Engineers), 34
information gathering. See footprinting
instant messaging clients , 359362
Institute of Electrical and Electronics Engineers (IEEE), 34
interactive voice response. See IVR
Inter-Asterisk eXchange. See IAX
interception attacks, 167200
ACM, 311
application-level, 185199
ARP poisoning , 120, 156, 169185
Asterisk, 343
CCM, 245250
man-in-the-middle. See MITM attacks
references, 200
via VoIP signaling manipulation, 168
International Alliance of Avaya Users, 20
International Nortel Networks Users Association, 20
International Telecommunication Union, 123
Internet Control Message Protocol. See ICMP
Internet search engines. See search engines
Inter-Switch Link. See ISL
INVITE floods, 395414, 420427
INVITE requests
breaking authentication, 441, 443444
described, 58
flooding SIP proxies with, 395414
redirection attacks, 456458
registration removal, 434
username enumeration, 7883
INVITE scanning, 7883, 9093, 95
INVITE username enumeration, 7883
inviteflood tool, 395411, 420427, 470
IP addresses. See also MAC addresses
ACM, 265, 269274
pinging. See pinging
researching , 2327
spoofing, 133
TFTP servers, 3, 20, 21
IP source guard (IPSG), 246, 247
IP Stack Integrity Checker (ISIC), 137
IPSG (IP source guard), 246, 247
ISIC (IP Stack Integrity Checker), 137
ISL (Inter-Switch Link), 154
IVR phishing system, 510515
IVR (interactive voice response) system, 510515