References

  • Aharoni, Matti. " SNMP Enumeration and Hacking ." SecurityProNews . September 9, 2003. http://www.securitypronews.com/securitypronews-24-20030909SNMPEnumerationandHacking.html

  • Arkin, Ofir. "The Trivial Cisco IP Phones Compromise." September 2002. http://www.sys-security.com/archive/papers/The_Trivial_Cisco_IP_Phones_Compromise.pdf

  • GDB and VxWorks. http://developer.apple.com/documentation/DeveloperTools/gdb/gdb/gdb_19.html#SEC164

  • Merdinger, Shawn. "VoIP WifiPhone Handset Security Analysis." Shmoocon 2006. http://www.shmoocon.org/2006/presentations/shmoocon_preso_voip_wifi_phone_merdinger.pdf

  • RTP News. http://www.cs. columbia .edu/~hgs/rtp/

  • Sinnreich, Henry, Alan B. Johnston, Robert J. Sparks, and Vinton G. Cerf. SIP Beyond VoIP: The Next Step in IP Communications . Melville: VON Publishing LLC, 2005.

  • SIP Resource Center. http://www.cs.columbia.edu/sip/

  • SiVuS User Guide . http://www.vopsecurity.org/SiVuS-User-Doc.pdf



Hacking Exposed VoIP. Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net