Skip to content

Hacking Exposed VoIP: Voice over IP Security Secrets and Solutions

ISBN-10: 0072263644

ISBN-13: 9780072263640

Edition: 2007

Authors: David Endler, Mark Collier

List price: $55.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Covering the latest attack methods and countermeasures, risk ratings, case studies, hands-on implementation examples and VoIP security tools, this text demonstrates how to protect your network and devices from the malicious intruder.
Customers also bought

Book details

List price: $55.00
Copyright year: 2007
Publisher: McGraw-Hill Osborne
Publication date: 11/28/2006
Binding: Paperback
Pages: 539
Size: 7.25" wide x 9.00" long x 1.25" tall
Weight: 2.046
Language: English

David Endler is the director of security research for 3Com's security division, TippingPoint, where he oversees product security testing, the VoIP security research center, and their vulnerability research team. While at TippingPoint, David founded an industry-wide group called the Voice over IP Security Alliance (VOIPSA) in 2005. VOIPSA’s mission is to help VoIP adoption by promoting the current state of VoIP security research, testing methodologies, best practices, and tools. David is currently the chairman of VOIPSA which boasts over 100 members from the VoIP vendor, carrier, and security space (http://www.voipsa.org).Prior to TippingPoint, David was the technical director at…    

Mark Collier is Lecturer in Egyptology at the University of Liverpool. Bill Manley teaches Egyptology at the University of Glasgow. Richard Parkinson is Curator in the Department of Egyptian Antiquities at the British Museum.

Casing the Establishment
Footprinting a VoIP Network
Scanning a VoIP Network
Enumerating a VoIP Network
Exploiting the VoIP Underlying Platforms
VoIP Network Infrastructure Denial of Service (DoS)
VoIP Network Eavesdropping
VoIP Interception and Modification
Exploiting Specific VoIP Platforms
Cisco Unified CallManager
Avaya Communication Manager
Asterisk
Emerging Softphone Technologies
VoIP Session and Application Hacking
VoIP Fuzzing
Flood-based Disruption of Service
Signaling and Media Manipulation
Social Threats
SPAM over Internet Technology (SPIT)
Voice Phishing
Index