You should now be comfortable scanning for VoIP devices and supporting infrastructure, both externally and internally. This includes firewalls, routers, VoIP phones, VoIP softphones, VoIP PBXs, DHCP servers, TFTP servers, and so on. By using a combination of UDP, TCP, SNMP, and ICMP scanning techniques, you should now be able to visualize much of our target's network topology. In Chapter 3, "Enumerating a VoIP Network," the next phase we'll discuss involves conducting a more detailed investigation of many of the network services we just identified.

Hacking Exposed VoIP. Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158

Similar book on Amazon © 2008-2017.
If you may any questions please contact us: