N

National Vulnerability Database, 68
Nessus scanner, 69
nessus tool, 35
Netcap tool, 6673
Netstumbler tool, 150
network analyzers, 126129
network availability, 122, 136139
network eavesdropping, 165. See also eavesdropping
network hijacking, 169. See also hijacking
network hubs, 149150
Network Management System (NMS), 288
network nodes, 150152
network reconnaissance
ACM, 264295
Asterisk components , 326327
CCM, 220240
network sniffers, 126129. See also sniffers
network switches, 152154
network-based intrusion prevention systems. See NIPS
networking-based attacks
Asterisk, 339343
CCM, 240250
infrastucture attacks, 141146
network availability attacks, 136139
network hijacking, 169
networks
eavesdropping on. See eavesdropping attacks
enumerating. See enumeration
Ethernet, 38
footprinting. See footprinting
gaining access to, 149156, 186
hardening, 135136
latency, 123
physical access to, 186
privacy issues, 148149
scanning. See scanning
wireless (Wi-Fi), 149150
NeWT scanner, 69
Newt tool, 35
NIPS (network-based intrusion prevention systems)
ACM, 310
Asterisk, 342
CCM, 245
network availability attacks, 138139
Nmap tool
APR pings , 38
described, 34
enumerating VxWorks devices, 113116
OS detection option, 4853
ping sweeps , 3435
TCP pings, 3940
TCP SYN scanning, 4447
UDP scanning, 35, 4447
NMS (Network Management System), 288
Nomad tool, 42
Nortel IP Softphone 2050, 352
NOTIFY requests , 58, 467468
number harvesting , 149, 158159


Hacking Exposed VoIP. Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net