Praise for Hacking Exposed: Unified communications & VoIP Security Secrets & Solutions, Second Edition (2014)

Praise for Hacking Exposed: Unified communications & VoIP Security Secrets & Solutions, Second Edition (2014)

Introduction

PART I. CASING THE ESTABLISHMENT

CHAPTER 1. VOIP TARGETS, THREATS, AND COMPONENTS

CHAPTER 2. FOOTPRINTING A UC NETWORK

CHAPTER 3. SCANNING A UC NETWORK

CHAPTER 4. ENUMERATING A UC NETWORK

PART II. APPLICATION ATTACKS

CHAPTER 5. TOLL FRAUD AND SERVICE ABUSE

CHAPTER 6. CALLING NUMBER SPOOFING

CHAPTER 7. HARASSING CALLS AND TELEPHONY DENIAL OF SERVICE (TDOS)

CHAPTER 8. VOICE SPAM

CHAPTER 9. VOICE SOCIAL ENGINEERING AND VOICE PHISHING

PART III. EXPLOITING THE UC NETWORK

CHAPTER 10. UC NETWORK EAVESDROPPING

CHAPTER 11. UC INTERCEPTION AND MODIFICATION

CHAPTER 12. UC NETWORK INFRASTRUCTURE DENIAL OF SERVICE (DOS)

CHAPTER 13. CISCO UNIFIED COMMUNICATIONS MANAGER

PART IV. UC SESSION AND APPLICATION HACKING

CHAPTER 14. FUZZING, FLOODING, AND DISRUPTION OF SERVICE

CHAPTER 15. SIGNALING MANIPULATION

CHAPTER 16. AUDIO AND VIDEO MANIPULATION

CHAPTER 17. EMERGING TECHNOLOGIES