Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
David Endler, Mark Collier
- 出版商: McGraw-Hill Education
- 出版日期: 2006-11-28
- 定價: $1,730
- 售價: 5.0 折 $865
- 語言: 英文
- 頁數: 539
- 裝訂: Paperback
- ISBN: 0072263644
- ISBN-13: 9780072263640
-
相關分類:
資訊安全、駭客 Hack
立即出貨(限量) (庫存=1)
買這商品的人也買了...
-
$600$199 -
$1,200$1,140 -
$780$616 -
$580$551 -
$540$427 -
$650$553 -
$780$663 -
$650$507 -
$550$468 -
$550$468 -
$580$458 -
$2,400$2,280 -
$550$429 -
$480$408 -
$299Hacking Exposed Wireless
-
$880$695 -
$600$480 -
$299CCNA ICND2 Official Exam Certification Guide (CCNA Exams 640-816 and 640-802), 2/e
-
$107資料庫技術與應用:Visual FoxPro.第2版
-
$133Visual FoxPro 9.0專案開發案例教程
-
$148Visual FoxPro課程設計
-
$143Visual FoxPro及其應用系統開發(第二版)
-
$102Visual FoxPro程式設計習題.實驗.應用案例
-
$163Visual FoxPro 數據庫應用教程
-
$590$531
商品描述
Description
Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way
"This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security
Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.
Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware Fortify Cisco, Avaya, and Asterisk systems Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation Thwart number harvesting, call pattern tracking, and conversation eavesdropping Measure and maintain VoIP network quality of service and VoIP conversation quality Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks Avoid insertion/mixing of malicious audio Learn about voice SPAM/SPIT and how to prevent it Defend against voice phishing and identity theft scams
Table of contents
Part I: Casing the Establishment
Chapter 1: Footprinting a VoIP Network
Chapter 2: Scanning a VoIP Network
Chapter 3: Enumerating a VoIP Network
Part II: Exploiting the VoIP Underlying Platforms
Chapter 4: VoIP Network Infrastructure Denial of Service (DoS)
Chapter 5: VoIP Network Eavesdropping
Chapter 6: VoIP Interception and Modification
Part III: Exploiting Specific VoIP Platforms
Chapter 7: Cisco Unified CallManager
Chapter 8: Avaya Communication Manager
Chapter 9: Asterisk
Chapter 10: Emerging Softphone Technologies
Part IV : VoIP Session and Application Hacking
Chapter 11: VoIP Fuzzing
Chapter 12: Flood-based Disruption of Service
Chapter 13: Signaling and Media Manipulation
Part V: Social Threats
Chapter 14: SPAM over Internet Technology (SPIT)
Chapter 15: Voice Phishing
Index