Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
by David Endler and Mark Collier
McGraw-Hill/Osborne ฉ 2007 (574 pages)
ISBN:9780072263640

Table of Contents
Hacking Exposed VoIP—Voice Over IP Security Secrets & Solutions
Introduction
Part I - Casing the Establishment
Case Study - My VOIP Gear is Secure From Outsiders, Right?
Probing and Enumerating Our Way to Success
Chapter 1 - Footprinting a VoIP Network
Chapter 2 - Scanning a VoIP Network
Chapter 3 - Enumerating a VoIP Network
Part II - Exploiting the VoIP Network
Case Study - Who's Listening in?
Chapter 4 - VoIP Network Infrastructure Denial of Service (DoS)
Chapter 5 - VoIP Network Eavesdropping
Chapter 6 - VoIP Interception and Modification
Part III - Exploiting Specific VoIP Platforms
Case Study - Shutting Down a Vendor's VoIP System
Chapter 7 - Cisco Unified CallManager
Chapter 8 - Avaya Communication Manager
Chapter 9 - Asterisk
Chapter 10 - Emerging Softphone Technologies
Part IV - VoIP Session and Application Hacking
Case Study - John Smith Gets Even
Chapter 11 - VoIP Fuzzing
Chapter 12 - Flood-based Disruption of Service
Chapter 13 - Signaling and Media Manipulation
Part V - Social Threats
Case Study - Tom N. Jerry Sets Up A Spit Generator
Chapter 14 - SPAM over Internet Telephony (SPIT)
Chapter 15 - Voice Phishing
Index
List of Figures
List of Tables
List of Sidebars

**Hidden Content: To see this hidden content your post count must be 20 or greater.**