Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second EditionThe latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.
|
Contents
Application Attacks | 107 |
Exploiting the UC Network | 233 |
UC Session and Application Hacking | 357 |
Index | 507 |
Common terms and phrases
ARP poisoning Asterisk authentication automated Call Monitor call pumping Call-ID caller calling number Chapter Cisco Unified command-line configuration connection contact center Content-Length Countermeasures CSeq CUCM default deployment detect devices DHCP dial DTMF encryption enterprise eth0 example Facebook Figure firewall flooding attacks fuzzing gateway Google hacker harassing calls header hijacking host ICMP Impact inbound calls Internet INVITE IP address IP PBX IPv4 Kamailio legitimate Lync MAC address Nmap OPTIONS password phishing phone numbers Popularity port Protocol public voice network REGISTER requests Risk Rating rogue scan server service provider Session Simplicity SIP endpoints SIP phone SIP proxy SIP trunks Skype smartphones SNMP social engineering softphone spoofing switch target TDoS attack techniques TFTP toll fraud tool traffic Trixbox UC network UC systems Unified Communications vendors VLAN voice phishing voice SPAM voicemail VoIP vulnerabilities Wireshark X-Lite