Hacking Exposed VoIP

By: David Endler,Mark Collier

Catalogue Number: XX4-32DP

Hacking Exposed VoIP

  • Format: Paperback
  • Publisher: McGraw-Hill Education - Europe
  • ISBN: 9780072263640
More product information
Back to top

Sorry, there are currently no sellers for this product.

seller-pdp-logo

We've carefully chosen all our Tesco Partners, to give you even more choice when you shop with us online.

  • Browse a wider range of specialist products, all in one place
  • Collect Clubcard points on every order
  • Stay protected with the Tesco Partner Guarantee – we’re here to support you when buying from an approved Tesco Partner.
Need help deciding? Take a look at our buying guide

Synopsis

Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies. --Ron Gula, CTO of Tenable Network Security Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAMSPIT, and voice phishing attacks. Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware Fortify Cisco, Avaya, and Asterisk systems Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation Thwart number harvesting, call pattern tracking, and conversation eavesdropping Measure and maintain VoIP network quality of service and VoIP conversation quality Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks Avoid insertionmixing of malicious audio Learn about voice SPAMSPIT and how to prevent it Defend against voice phishing and identity theft scams

Author's Biography

David Endler is the Director of Security Research for TippingPoint, a division of 3Com. Previously, he performed security research for Xerox Corporation, the NSA, and MIT. Endler is also the chairman and founder of the Voice over IP Security Alliance. Mark Collier is CTO for SecureLogix Corporation. He is an expert author and frequent presenter on the topic of VoIP security. Collier is also a founding member of the Voice over IP Security Alliance.

1 1