Flylib.com
M
Previous page
Table of content
Next page
MAC Address Discovery tool, 38
MAC addresses.
See also
IP addresses
ARP pinging, 3839
flooding, 152154, 155
IP ping sweeps , 34
scanning for, 171172
TFTP server enumeration, 9798
VLAN membership, 154
macof tool, 152153
mailing lists, 1920
malicious IVR, 510515
man-in-the-middle attacks.
See
MITM attacks
Mean Opinion Score (MOS), 126
Media Access Control.
See
MAC
media gateways
ACM, 254256
Asterisk, 325
compromising , 151152
DoS, 426428
passwords, 313
targeting, 426428
media servers, 253254, 313
MERLIN MAIL, 314315
Metasploit framework, 152, 153, 241245
Ministumbler tool, 151
Mitel Softphone, 352
MITM (man-in-the-middle) attacks
ARP poisoning and, 148, 156
described, 169, 455
network-level, 169, 186
registration hijacking, 455
rogue applications, 186
RTP packets and, 65
SIP phones, 455
TLS and, 184
MOS (Mean Opinion Score), 126
Previous page
Table of content
Next page
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158
Authors:
David Endler
,
Mark Collier
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Understanding the Attacker
Building the Final Report
Information Request Form
Statement of Work
Recommendations
High-Speed Signal Propagation[c] Advanced Black Magic
Issues with Screening
Making Glass Fiber
The Underlying Simulation Engine
Nature of EMC Work
Complicated Configurations
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Microsoft Client Library for AJAX
The Pulsing Heart of ASP.NET AJAX
Remote Method Calls with ASP.NET AJAX
Building AJAX Applications with ASP.NET
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Executing SQL*Plus Commands
Creating HTML Reports
Extracting and Loading Data
Indexes
Section B.2. Formatting Character Strings
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Making Quantitative Decisions
Risk-Adjusted Financial Management
Expense Accounting and Earned Value
Quantitative Time Management
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Objects, Interfaces, and Patterns
Reflection
Windows Controls
Web Services
Security and Cryptography
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies